Cargando…
A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image
In the recent couple of years, due to the accelerated popularity of the internet, various organizations such as government offices, military, private companies, etc. use different transferring methods for exchanging their information. The Internet has various benefits and some demerits, but the prim...
Autores principales: | , , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10469209/ https://www.ncbi.nlm.nih.gov/pubmed/37648738 http://dx.doi.org/10.1038/s41598-023-41303-1 |
_version_ | 1785099392189988864 |
---|---|
author | Rahman, Shahid Uddin, Jamal Hussain, Hameed Ahmed, Aftab Khan, Ayaz Ali Zakarya, Muhammad Rahman, Afzal Haleem, Muhammad |
author_facet | Rahman, Shahid Uddin, Jamal Hussain, Hameed Ahmed, Aftab Khan, Ayaz Ali Zakarya, Muhammad Rahman, Afzal Haleem, Muhammad |
author_sort | Rahman, Shahid |
collection | PubMed |
description | In the recent couple of years, due to the accelerated popularity of the internet, various organizations such as government offices, military, private companies, etc. use different transferring methods for exchanging their information. The Internet has various benefits and some demerits, but the primary bad mark is security of information transmission over an unreliable network, and widely uses of images. So, Steganography is the state of the art of implanting a message in the cover objects, that nobody can suspect or identify it. Therefore, in the field of cover steganography, it is very critical to track down a mechanism for concealing data by utilizing different blends of compression strategies. Amplifying the payload limit, and robustness, and working on the visual quality are the vital factors of this research to make a reliable mechanism. Different cover steganography research strategies have been recommended, and each adores its benefits and impediments but there is a need to foster some better cover steganography implements to accomplish dependability between the essential model of cover steganography. To handle these issues, in this paper we proposed a method in view of Huffman code, Least Significant Bits (LSB) based cover steganography utilizing Multi-Level Encryption (MLE) and colorless part (HC-LSBIS-MLE-AC) of the picture. It also used different substitution and flicking concepts, MLE, Magic matrix, and achromatic concepts for proving the proficiency, and significance of the method. The algorithm was also statistically investigated based on some Statistical Assessment Metrics (SAM) such as Mean Square Error (MSE), Peak Signal Noise Ratio (PSNR), Normalized Cross Correlation (NCC), Structural Similarity Index Metric (SSIM), etc. and different perspectives. The observational outcomes show the likelihood of the proposed algorithm and the capacity to give unwavering quality between security, payload, perception, computation, and temper protection. |
format | Online Article Text |
id | pubmed-10469209 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-104692092023-09-01 A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image Rahman, Shahid Uddin, Jamal Hussain, Hameed Ahmed, Aftab Khan, Ayaz Ali Zakarya, Muhammad Rahman, Afzal Haleem, Muhammad Sci Rep Article In the recent couple of years, due to the accelerated popularity of the internet, various organizations such as government offices, military, private companies, etc. use different transferring methods for exchanging their information. The Internet has various benefits and some demerits, but the primary bad mark is security of information transmission over an unreliable network, and widely uses of images. So, Steganography is the state of the art of implanting a message in the cover objects, that nobody can suspect or identify it. Therefore, in the field of cover steganography, it is very critical to track down a mechanism for concealing data by utilizing different blends of compression strategies. Amplifying the payload limit, and robustness, and working on the visual quality are the vital factors of this research to make a reliable mechanism. Different cover steganography research strategies have been recommended, and each adores its benefits and impediments but there is a need to foster some better cover steganography implements to accomplish dependability between the essential model of cover steganography. To handle these issues, in this paper we proposed a method in view of Huffman code, Least Significant Bits (LSB) based cover steganography utilizing Multi-Level Encryption (MLE) and colorless part (HC-LSBIS-MLE-AC) of the picture. It also used different substitution and flicking concepts, MLE, Magic matrix, and achromatic concepts for proving the proficiency, and significance of the method. The algorithm was also statistically investigated based on some Statistical Assessment Metrics (SAM) such as Mean Square Error (MSE), Peak Signal Noise Ratio (PSNR), Normalized Cross Correlation (NCC), Structural Similarity Index Metric (SSIM), etc. and different perspectives. The observational outcomes show the likelihood of the proposed algorithm and the capacity to give unwavering quality between security, payload, perception, computation, and temper protection. Nature Publishing Group UK 2023-08-30 /pmc/articles/PMC10469209/ /pubmed/37648738 http://dx.doi.org/10.1038/s41598-023-41303-1 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) . |
spellingShingle | Article Rahman, Shahid Uddin, Jamal Hussain, Hameed Ahmed, Aftab Khan, Ayaz Ali Zakarya, Muhammad Rahman, Afzal Haleem, Muhammad A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image |
title | A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image |
title_full | A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image |
title_fullStr | A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image |
title_full_unstemmed | A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image |
title_short | A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image |
title_sort | huffman code lsb based image steganography technique using multi-level encryption and achromatic component of an image |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10469209/ https://www.ncbi.nlm.nih.gov/pubmed/37648738 http://dx.doi.org/10.1038/s41598-023-41303-1 |
work_keys_str_mv | AT rahmanshahid ahuffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage AT uddinjamal ahuffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage AT hussainhameed ahuffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage AT ahmedaftab ahuffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage AT khanayazali ahuffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage AT zakaryamuhammad ahuffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage AT rahmanafzal ahuffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage AT haleemmuhammad ahuffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage AT rahmanshahid huffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage AT uddinjamal huffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage AT hussainhameed huffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage AT ahmedaftab huffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage AT khanayazali huffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage AT zakaryamuhammad huffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage AT rahmanafzal huffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage AT haleemmuhammad huffmancodelsbbasedimagesteganographytechniqueusingmultilevelencryptionandachromaticcomponentofanimage |