INFORMATION CHANGE THE WORLD

International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.14, No.4, Aug. 2022

An Efficient Image Steganography Scheme Using Bit-plane Slicing with Elliptic Curve Cryptography and Wavelet Transform

Full Text (PDF, 2149KB), PP.43-59


Views:6   Downloads:0

Author(s)

Ganavi M, Prabhudeva S, Hemanth Kumar N P

Index Terms

Bit-plane Slicing;Elliptic Curve Cryptography;Discrete Wavelet Transform;Least-Significant-Bit;Scramble;Embed

Abstract

Information security is indispensable in the transmission of multimedia data. While accumulating and distributing such multimedia data, the access of data from a third person is the real security challenging issue. Information hiding plays an important role. Scramble the data before hiding it in carrier media gives enhanced security level for the data. In this paper, bit plane slicing is used to represent an input image with eight planes at bit-level instead of pixel-level. As the least significant bit contains noisy information, only the most significant bit plane can be used to represent an image. At the first level, an input image is processed through the spatial domain. Transform domain techniques are used to process the image at the middle level. Elliptic curve cryptography is used to scramble and descramble the MSB plane image. A logistic chaotic sequence of the input image is added to the most significant bit plane image to generate the final scrambled image. The discrete wavelet transform is used to embed the scrambled image in its high-frequency sub-bands. At the last level, a least significant bit technique, a spatial domain is used to embed the scrambled image in the carrier image. Message integrity is also verified by finding the hash of an input image. The performance of the proposed method is evaluated through various security measures. It gives good results as number of pixel change rate is closer to 100% and unified average changing intensity is 33.46. 

Cite This Paper

Ganavi M, Prabhudeva S, Hemanth Kumar N P, "An Efficient Image Steganography Scheme Using Bit-plane Slicing with Elliptic Curve Cryptography and Wavelet Transform", International Journal of Computer Network and Information Security(IJCNIS), Vol.14, No.4, pp.43-59, 2022. DOI:10.5815/ijcnis.2022.04.04

Reference

[1]A. Hambouz, Y. Shaheen, A. Manna, M. Al-Fayoumi, and S. Tedmori, “Achieving data integrity and confidentiality using image steganography and hashing techniques,” In 2019 2nd International Conference on New Trends in Computing Sciences (ICTCS), pp. 1–6, IEEE, 2019.

[2]Abhilash Ashok Bhadke, Surender Kannaiyan, and Vipin Kamble. “Symmetric Chaos-Based Image Encryption Technique on Image Bit-Planes using SHA-256”, 2018 Twenty Fourth National Conference on Communications (NCC), pp. 1-6, IEEE, 2018.

[3]Aumreesh Kumar Saxena, Sitesh Sinha, Piyush Shukla," Design and Development of Image Security Technique by Using Cryptography and Steganography: A Combine Approach", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.10, No.4, pp. 13-21, 2018.DOI: 10.5815/ijigsp.2018.04.02

[4]Eshraq S. Hureib, Adnan A. Gutub, “Enhancing medical data security via combining elliptic curve cryptography and image steganography”, International Journal of Computer Science and Network Security (IJCSNS), Vol.20, No.8, pp. 1-8, August 2020.

[5]U. A. Md. Ehsan Ali, Emran Ali, Md. Sohrawordi, Md. Nahid Sultan," A LSB Based Image Steganography Using Random Pixel and Bit Selection for High Payload ", International Journal of Mathematical Sciences and Computing(IJMSC), Vol.7, No.3, pp. 24-31, 2021. DOI: 10.5815/ijmsc.2021.03.03

[6]Gaurav Kumar, Rajeev Kumar, " Analysis of Arithmetic and Huffman Compression Techniques by Using DWT-DCT", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.13, No.4, pp. 63-70, 2021.DOI: 10.5815/ijigsp.2021.04.05

[7]Youxia Dong, Xiaoling Huang, Guodong Ye, “Visually Meaningful Image Encryption Scheme Based on DWT and Schur Decomposition”, Security and Communication Networks, pp. 1-16, 2021. DOI:10.1155/2021/6677325

[8]Dhanesh Kumar, Anand B. Joshi, Sonali Singh, Vishnu Narayan Mishra, “Digital color-image encryption scheme based on elliptic curve cryptography ElGamal encryption and 3D Lorenz map”, In AIP Conference Proceedings 2364, pp. 020026-1 to 020026-13, 2021. DOI:10.1063/5.0062877.

[9]Sonali Rout, Ramesh Kumar Mohapatra, “Video Steganography using Curvelet Transform and Elliptic Curve Cryptography”, In 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1-7.  IEEE, 2020

[10]Somayyeh Jafarali Jassbi, Ashkan Emami Ale Agha, " A New method for Image Encryption Using Chaotic Permutation", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.12, No.2, pp. 42-49, 2020.DOI: 10.5815/ijigsp.2020.02.05

[11]Ping Pan, Zeming Wu, Chen Yang, Bing Zhao, “Double-Matrix Decomposition Image Steganography Scheme Based on Wavelet Transform with Multi-Region Coverage”, Entropy, Vol. 24, no. 2, 2022. https://doi.org/ 10.3390/e24020246.

[12]Mustaqim Abrar M., Pal A., Shashriar Sazzad T.M, “Bit Plane Slicing and Quantization-Based Color Image Watermarking in Spatial Domain”, In: Uddin M.S., Bansal J.C. (eds) Proceedings of International Joint Conference on Advances in Computational Intelligence. Algorithms for Intelligent Systems. Springer, Singapore, pp.371-383, 2021. https://doi.org/10.1007/978-981-16-0586-4_30.

[13]Priyadharshini A, Umamaheswari R, Jayapandian N, Priyananci S, “Securing Medical Images using Encryption and LSB Steganography”, 2021 International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), pp. 1-5, 2021. DOI: 10.1109/ICAECT49130.2021.9392396

[14]Xintao Duan, Daidou Guo, Nao Liu, Baoxia Li, Mengxiao Gou, Chuan Qin, “A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network”, IEEE Access, pp. 25777-25788, 2020. DOI: 10.1109/ACCESS.2020.2971528

[15]Aree A. Mohammed, Dilman A. Salih, Ari M. Saeed, Mohammed Q. Kheder, “An imperceptible semi-blind image watermarking scheme in DWT-SVD domain using a zigzag embedding technique”, Multimedia Tools and Applications, Vol. 79, No. 43, pp.32095-32118, 2020. DOI: 10.1007/s11042-020-09694-9.

[16]Shafique, Arslan, Jameel Ahmed, Mujeeb Ur Rehman, Mohammad Mazyad Hazzazi, “Noise-Resistant Image Encryption Scheme for Medical Images in the Chaos and Wavelet Domain”, IEEE Access, Vol. 9, pp.59108-59130, 2021. DOI: 10.1109/ACCESS.2021.3071535

[17]USC-SIPI Image Database Website. http://sipi.usc.edu/database

[18]KODAK Image Dataset Website. http://r0k.us/graphics/kodak