Steganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images
Authors
Abstract:
In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed secret information into more significant bits of the image, it has improved embedding payload. The steps of extracting data from the host image are independent of the original image. Therefore, the proposed algorithm has a blind detection process which is more suitable for practical and online applications. The simulation results show that the proposed algorithm is also able to retrieve destroyed data by intentional or unintentional attacks such as addition of noise and filtering due to use of the error correction code. In addition, the payload is improved in comparison with the same techniques.
similar resources
A New Signature Scheme Based on Punctured Reed-Muller Code With Random Insertion
In this paper, we propose a new signature scheme based on a punctured Reed–Muller (RM) code with random insertion, which improves the Goppa code-based signature scheme developed by Courtois, Finiasz, and Sendrier (CFS). The CFS signature scheme has certain drawbacks in terms of scaling of the parameters and a lack of existential unforgeability under adaptive chosen message attacks (EUF-CMA) sec...
full textPunctured Reed-Muller code-based McEliece cryptosystems
The authors propose new McEliece cryptosystems based on punctured Reed–Muller (RM) codes. They successfully show that the commonly known attacks, such as the Minder–Shokrollahi attack, the Chizhov–Borodin attack, and the square code attack, are ineffective against the proposed RM code-based McEliece cryptosystem. We developed an optimal puncturing scheme to prevent the above-mentioned attacks f...
full textSteganography Based on Payload Transformation
Steganography is meant for covert communication of confidential data through internet. In this paper, we propose Steganography based on Payload Transformation (SPT) which is non LSB and non transform domain technique where the cover image is segmented into 2*2 matrices and the matrix for payload embedding is considered based on the threshold value fixed by computing adjacent pixel intensity dif...
full textusing c-test passages for improving reading comprehension ability and incidentally learned vocabulary of iranian efl learners
this study was an attempt to investigate the effect of using c-test passages on the reading comprehension and incidental vocabulary learning of iranian intermediate efl learners. the participants were 60 male efl learners at kish mehr institute in garmsar. in fact, there were two groups, an experimental group and a comparison group with 30 students in each. the participants were pretested throu...
15 صفحه اولImage Based Steganography Methods With High Payload
There is a lot of research going on to find a stenography technique which is not only imperceptible but also has other two features, namely, high embedding capacity and robustness. Imperceptibility is the most important requirement of steganography followed by high capacity. In this paper we give an overview of high capacity image steganographic techniques and propose a novel imperceptible and ...
full textWavelet based Secure Steganography with Scrambled Payload
The Steganography is used for secure communication of information by embedding information in a cover object. In this paper we propose Wavelet based Secure Steganography with Scrambled Payload (WSSSP). The Daubechies Lifting Wavelet Transform (LWT) is applied on cover image. The XD band is decomposed into upper and lower bands for payload embedding. The payload is segmented into four equal bloc...
full textMy Resources
Journal title
volume 49 issue 1
pages 53- 62
publication date 2017-06-01
By following a journal you will be notified via email when a new issue of this journal is published.
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023