Cargando…

A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image

In the recent couple of years, due to the accelerated popularity of the internet, various organizations such as government offices, military, private companies, etc. use different transferring methods for exchanging their information. The Internet has various benefits and some demerits, but the prim...

Descripción completa

Detalles Bibliográficos
Autores principales: Rahman, Shahid, Uddin, Jamal, Hussain, Hameed, Ahmed, Aftab, Khan, Ayaz Ali, Zakarya, Muhammad, Rahman, Afzal, Haleem, Muhammad
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10469209/
https://www.ncbi.nlm.nih.gov/pubmed/37648738
http://dx.doi.org/10.1038/s41598-023-41303-1
_version_ 1785099392189988864
author Rahman, Shahid
Uddin, Jamal
Hussain, Hameed
Ahmed, Aftab
Khan, Ayaz Ali
Zakarya, Muhammad
Rahman, Afzal
Haleem, Muhammad
author_facet Rahman, Shahid
Uddin, Jamal
Hussain, Hameed
Ahmed, Aftab
Khan, Ayaz Ali
Zakarya, Muhammad
Rahman, Afzal
Haleem, Muhammad
author_sort Rahman, Shahid
collection PubMed
description In the recent couple of years, due to the accelerated popularity of the internet, various organizations such as government offices, military, private companies, etc. use different transferring methods for exchanging their information. The Internet has various benefits and some demerits, but the primary bad mark is security of information transmission over an unreliable network, and widely uses of images. So, Steganography is the state of the art of implanting a message in the cover objects, that nobody can suspect or identify it. Therefore, in the field of cover steganography, it is very critical to track down a mechanism for concealing data by utilizing different blends of compression strategies. Amplifying the payload limit, and robustness, and working on the visual quality are the vital factors of this research to make a reliable mechanism. Different cover steganography research strategies have been recommended, and each adores its benefits and impediments but there is a need to foster some better cover steganography implements to accomplish dependability between the essential model of cover steganography. To handle these issues, in this paper we proposed a method in view of Huffman code, Least Significant Bits (LSB) based cover steganography utilizing Multi-Level Encryption (MLE) and colorless part (HC-LSBIS-MLE-AC) of the picture. It also used different substitution and flicking concepts, MLE, Magic matrix, and achromatic concepts for proving the proficiency, and significance of the method. The algorithm was also statistically investigated based on some Statistical Assessment Metrics (SAM) such as Mean Square Error (MSE), Peak Signal Noise Ratio (PSNR), Normalized Cross Correlation (NCC), Structural Similarity Index Metric (SSIM), etc. and different perspectives. The observational outcomes show the likelihood of the proposed algorithm and the capacity to give unwavering quality between security, payload, perception, computation, and temper protection.
format Online
Article
Text
id pubmed-10469209
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-104692092023-09-01 A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image Rahman, Shahid Uddin, Jamal Hussain, Hameed Ahmed, Aftab Khan, Ayaz Ali Zakarya, Muhammad Rahman, Afzal Haleem, Muhammad Sci Rep Article In the recent couple of years, due to the accelerated popularity of the internet, various organizations such as government offices, military, private companies, etc. use different transferring methods for exchanging their information. The Internet has various benefits and some demerits, but the primary bad mark is security of information transmission over an unreliable network, and widely uses of images. So, Steganography is the state of the art of implanting a message in the cover objects, that nobody can suspect or identify it. Therefore, in the field of cover steganography, it is very critical to track down a mechanism for concealing data by utilizing different blends of compression strategies. Amplifying the payload limit, and robustness, and working on the visual quality are the vital factors of this research to make a reliable mechanism. Different cover steganography research strategies have been recommended, and each adores its benefits and impediments but there is a need to foster some better cover steganography implements to accomplish dependability between the essential model of cover steganography. To handle these issues, in this paper we proposed a method in view of Huffman code, Least Significant Bits (LSB) based cover steganography utilizing Multi-Level Encryption (MLE) and colorless part (HC-LSBIS-MLE-AC) of the picture. It also used different substitution and flicking concepts, MLE, Magic matrix, and achromatic concepts for proving the proficiency, and significance of the method. The algorithm was also statistically investigated based on some Statistical Assessment Metrics (SAM) such as Mean Square Error (MSE), Peak Signal Noise Ratio (PSNR), Normalized Cross Correlation (NCC), Structural Similarity Index Metric (SSIM), etc. and different perspectives. The observational outcomes show the likelihood of the proposed algorithm and the capacity to give unwavering quality between security, payload, perception, computation, and temper protection. Nature Publishing Group UK 2023-08-30 /pmc/articles/PMC10469209/ /pubmed/37648738 http://dx.doi.org/10.1038/s41598-023-41303-1 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Article
Rahman, Shahid
Uddin, Jamal
Hussain, Hameed
Ahmed, Aftab
Khan, Ayaz Ali
Zakarya, Muhammad
Rahman, Afzal
Haleem, Muhammad
A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image
title A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image
title_full A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image
title_fullStr A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image
title_full_unstemmed A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image
title_short A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image
title_sort huffman code lsb based image steganography technique using multi-level encryption and achromatic component of an image
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10469209/
https://www.ncbi.nlm.nih.gov/pubmed/37648738
http://dx.doi.org/10.1038/s41598-023-41303-1
work_keys_str_mv AT rahmanshahid ahuffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage
AT uddinjamal ahuffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage
AT hussainhameed ahuffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage
AT ahmedaftab ahuffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage
AT khanayazali ahuffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage
AT zakaryamuhammad ahuffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage
AT rahmanafzal ahuffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage
AT haleemmuhammad ahuffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage
AT rahmanshahid huffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage
AT uddinjamal huffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage
AT hussainhameed huffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage
AT ahmedaftab huffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage
AT khanayazali huffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage
AT zakaryamuhammad huffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage
AT rahmanafzal huffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage
AT haleemmuhammad huffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage