Open Access   Article Go Back

Optimization of Secure Data for Steganography and Digital Watermarking Scheme

Avinash Rai1 , Vivek Todkar2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-6 , Page no. 1036-1040, Jun-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i6.10361040

Online published on Jun 30, 2019

Copyright © Avinash Rai, Vivek Todkar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Avinash Rai, Vivek Todkar, “Optimization of Secure Data for Steganography and Digital Watermarking Scheme,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.1036-1040, 2019.

MLA Style Citation: Avinash Rai, Vivek Todkar "Optimization of Secure Data for Steganography and Digital Watermarking Scheme." International Journal of Computer Sciences and Engineering 7.6 (2019): 1036-1040.

APA Style Citation: Avinash Rai, Vivek Todkar, (2019). Optimization of Secure Data for Steganography and Digital Watermarking Scheme. International Journal of Computer Sciences and Engineering, 7(6), 1036-1040.

BibTex Style Citation:
@article{Rai_2019,
author = {Avinash Rai, Vivek Todkar},
title = {Optimization of Secure Data for Steganography and Digital Watermarking Scheme},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2019},
volume = {7},
Issue = {6},
month = {6},
year = {2019},
issn = {2347-2693},
pages = {1036-1040},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4676},
doi = {https://doi.org/10.26438/ijcse/v7i6.10361040}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.10361040}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4676
TI - Optimization of Secure Data for Steganography and Digital Watermarking Scheme
T2 - International Journal of Computer Sciences and Engineering
AU - Avinash Rai, Vivek Todkar
PY - 2019
DA - 2019/06/30
PB - IJCSE, Indore, INDIA
SP - 1036-1040
IS - 6
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
389 250 downloads 176 downloads
  
  
           

Abstract

“Steganography” is a technique that thwarts unauthorized users to have access to the crucial data, to invisibility and payload capacity using the different technique like discrete cosine transform (DCT) and discrete wavelet transform (DWT).The available methods till date result in good robustness but they are not independent of file format. The aim of this research work is to develop a independent of file format and secure hiding data scheme. The independent of file format and secure hiding data scheme in increased by combining DWT and least significant bits (LSB) technique. Accordingly an efficient scheme is developed here that are having better MSE and PSNR against different characters.

Key-Words / Index Term

Discrete Wavelet Transform, SVD, PSNR, MSE

References

[1] N. Senthil Kumaran, and S. Abinaya, “Comparison Analysis of Digital Image Watermarking using DWT and LSB Technique”, International Conference on Communication and Signal Processing, April 6-8, 2016, India.
[2] Aase, S.O., Husoy, J.H. and Waldemar, P. (2014) A Critique of SVD-Based Image Coding Systems, IEEE International Symposium on Circuits and Systems VLSI, Orlando, FL, Vol. 4, Pp. 13-16.
[3] Ahmed, F. and Moskowitz, I.S. (2014) Composite Signature Based Watermarking for Fingerprint Authentication, ACM Multimedia and Security Workshop, New York, Pp.1-8.
[4] Akhaee, M.A., Sahraeian, S.M.E. and Jin, C. (2013) Blind Image Watermarking Using a Sample Projection Approach, IEEE Transactions on Information Forensics and Security, Vol. 6, Issue 3, Pp.883-893.
[5] Ali, J.M.H. and Hassanien, A.E. (2012) An Iris Recognition System to Enhance E-security Environment Based on Wavelet Theory, Advanced Modeling and Optimization, Vol. 5, No. 2, Pp. 93-104.
[6] Al-Otum, H.M. and Samara, N.A. (2009) A robust blind color image watermarking based on wavelet-tree bit host difference selection, Signal Processing, Vol. 90, Issue 8, Pp. 2498-2512.
[7] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D.R. (1996) Visual cryptography for general access structures, Information Computation, Vol. 129, Pp. 86-106.
[8] Baaziz, N., Zheng, D. and Wang, D. (2011) Image quality assessment based on multiple watermarking approach, IEEE 13th International Workshop on Multimedia Signal Processing (MMSP), Hangzhou, Pp.1-5.
[9] Bao, F., Deng, R., Deing, X. and Yang, Y. (2008) Private Query on Encrypted Data in Multi-User Settings, Proceedings of 4th International Conference on Information Security Practice and Experience (ISPEC 2008), Pp. 71-85, 2008.
[10] Barni, M. and Bartolini, F. (2004) Watermarking systems engineering: Enabling digital assets security and other application, Signal processing and communications series, Marcel Dekker Inc., New York.
[11] Barni, M., Bartolini, F. and Piva, A. (2001) Improved Wavelet based Watermarking Through Pixel-Wise Masking, IEEE Transactions on Image Processing, Vol. 10, Pp. 783-791.