Security Measures to Image Steganography and Steganalysis: An Overview

Authors

  • Dipankar Dey Global Institute of Science and Technology, Haldia, India Author
  • Sabyasachi Samanta Haldia Institute of Technology, Haldia, WB, INDIA Author

DOI:

https://doi.org/10.61841/fngwzn83

Keywords:

Security parameters, Chaotic Map, Sensitivity analysis, Attacks, Steganalysis

Abstract

 Nowadays, the security system draws an important role to protect sensitive information from theft and implement data confidentiality, data integrity, authentication, and access controls. This article focuses on different parameters used to implement a security system in digital image processing. These parameters illustrate different mathematical and statistical analysis and state thestrongest point of an algorithm. These parameters are mainly used for image encryption, image steganography, image compression and Steganalysis etc. The optimized value of different analysis protects from different types of attacks such as Brute Force Attacks, Known plaintext Attacks, Statistical Attacks, Analytic Attacks, etc. The parameters are used to algorithm better which are Histogram Analysis, Information Entropy, NPCR, UACI, Correlations of two adjacent pixels, Key sensitivity, MSE, PNSR, NCC, AD, SC, MD, LMSE, NAE, SSIM, RMSE, etc. This article illustrates the application of these different statistical parameters on 512 × 512 grayscale and color images. 

Downloads

Download data is not yet available.

References

[1] A. Kanso,M. Ghebleh, “An efficient and robust image encryption schemefor medical applications”, Commun

Nonlinear Sci Numer Simulat, Vol. 24, pp. 98-116, 2015.

[2] L. M. Jawad, G. Sulong, “Chaotic map-embedded Blowfish algorithm for security enhancement of colour

image encryption”, Nonlinear Dynamics, Vol. 81, pp. 2079-2093, 2015.

[3] J. X. Chen, Z. L. Zhu, C. Fu and H. Yu, “Optical image encryption scheme using 3-D chaotic map based joint

image scrambling and random encoding in gyrator domains”, Optics Communications, Vol. 341, pp. 263-270,

2015.

[4] L. Hongjun and W. Xingyuan, “Color image encryption based on one-time keys and robust chaotic maps”,

Computers and Mathematics with Applications, Vol. 59, pp. 3320-3327, 2010.

[5] S. Mukherjee, S. Roy and G. Sanyal, “Image Steganography Using Mid Position Value Technique”,

International Conference on Computational Intelligence and Data Science, Vol. 132, pp. 461-468, 2018.

[6] K. M. Jeevan and S. Krishnakumar, “An Image Steganography Method Us- ing Pseudo Hexagonal Image”,

International Journal of Pure and Applied Mathematics, Vol. 118, pp. 2729-2735, 2018.

[7] M. C. Kasapbasi and W. Elmasry, “ New LSB-based colour image steganography method to enhance the

efficiency in payload capacity, se- curity and integrity check”, pp. 43-68, 2018.

[8] E. Emad, A. Safey, A. Refaat, Z. Osama, E. Sayed and E. Mohamed, “A secure image steganography

algorithm based on least significant bit and in- teger wavelet transform”, Journal of Systems Engineering and

Electronics,Vol. 29, pp. 639-649, 2018.

[9] K. Joshi, S. Gill and R. Yadav, “A New Method of Image Steganography Using 7th Bit of a Pixel as

Indicator by Introducing the Successive Tempo rary Pixel in the Gray Scale Image”, JJournal of Computer

Networks and Communications, Vol. 2018, Article ID 9475142, pp. 10 pages, 2018.

[10] P. A. Watters, F. Martin and S. H. Stripf, ”Visual steganalysis of LSB- encoded natural images”, Third

International Conference on Informa- tion Technology and Applications (ICITA’05), Vol.1, pp. 746-751 , doi:

10.1109/ICITA.2005.308, 2005.

[11] I. Avcibas, N. Memon and B. Sankur, “Steganalysis using image qualitymetrics”, in IEEE Transactions on

Image Processing, Vol. 12, No. 2, pp. 221-229, doi: 10.1109/TIP.2002.807363, 2003.

[12] I. Avcibas, N. Memon and B. Sankur, “Image steganalysis with binary similarity measures”, Proceedings.

International Conference on Image Processing, Vol.3, pp. 645-648 , doi: 10.1109/ICIP.2002.1039053, 2002

Downloads

Published

28.02.2021

How to Cite

Security Measures to Image Steganography and Steganalysis: An Overview. (2021). International Journal of Psychosocial Rehabilitation, 25(1), 623-633. https://doi.org/10.61841/fngwzn83