Performance Evaluation of an approach for Secret data transfer using interpolation and LSB substitution with Watermarking
نویسندگان
چکیده
In the field of communication, security is the most important issue now days. Most probably of data asecurity and data hiding algorithms have been developed. In the last decade, these algorithms worked as motivation for our research. In this paper, Image Steganography with watermarking using LSB and interpolation Techniques are used. We have designed a system that will allow a user to securely transfer text messages by hiding them in a digital image file using the local characteristics within an image. A combination of image Steganography and interpolation with watermarking provides a strong backbone for its security. In this paper, the proposed system not only hides large volume of data within an image. But it also limits the perceivable distortion that might occur in an image while processing it. This thesis has an advantage over other information security thesis because the hidden text is in the form of image, which is not obvious text information carriers. The performance of hiding method was tested using Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR) and embedding capacity of proposed system.
منابع مشابه
A Novel Approach for Secret Data Transfer using Interpolation and LSB Substitution with Watermarking: A Survey
Today’s large demand of internet applications requires data to be transmitted in a better manner. Data is transferred in public communication system is not secure because of interception and improper manipulation by eavesdropper. So the better solution for this issue is Steganography, which is the technique of writing hidden messages in such a way that no one, apart from the sender and main rec...
متن کاملSecret Information Steganography Using LSB Insertion Methodwithout Bit Layout Section with Increasing Substitution Rate and High Reliability
In this paper, a faster method for embedding cryptographic information in the image ispresented by expressing the concept of latent prints (Steganography). Data is encrypted bytwo methods before embedding to increase reliability. Then they are embedded into the imageby a button, a method has been expressed to reduce potential noise impact on the wayinformation is encoded.
متن کاملOptimizing image steganography by combining the GA and ICA
In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded inside an image using an algorithm which combines the random patterns based on Space Fillin...
متن کاملNew Improved and Robust Watermarking Technique based on 3 rd LSB substitution method
With the rapid development and wide use of Internet, information transmission faces a big challenge of security. People need a safe and secured way to transmit information. Encryption is a common method, which is used for encrypting information. But it is easier to attract the attention of the attackers because the information cannot be read directly. The information will be intercepted, deciph...
متن کاملHigh capacity steganography tool for Arabic text using 'Kashida'
Steganography is the ability to hide secret information in a cover-media such as sound, pictures and text. A new approach is proposed to hide a secret into Arabic text cover media using "Kashida", an Arabic extension character. The proposed approach is an attempt to maximize the use of "Kashida" to hide more information in Arabic text cover-media. To approach this, some algorithms have been des...
متن کامل