Cargando…

A Graph Theory Practice on Transformed Image: A Random Image Steganography

Modern day information age is enriched with the advanced network communication expertise but unfortunately at the same time encounters infinite security issues when dealing with secret and/or private information. The storage and transmission of the secret information become highly essential and have...

Descripción completa

Detalles Bibliográficos
Autores principales: Thanikaiselvan, V., Arulmozhivarman, P., Subashanthini, S., Amirtharajan, Rengarajan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi Publishing Corporation 2013
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3885264/
https://www.ncbi.nlm.nih.gov/pubmed/24453857
http://dx.doi.org/10.1155/2013/464107
_version_ 1782298728766373888
author Thanikaiselvan, V.
Arulmozhivarman, P.
Subashanthini, S.
Amirtharajan, Rengarajan
author_facet Thanikaiselvan, V.
Arulmozhivarman, P.
Subashanthini, S.
Amirtharajan, Rengarajan
author_sort Thanikaiselvan, V.
collection PubMed
description Modern day information age is enriched with the advanced network communication expertise but unfortunately at the same time encounters infinite security issues when dealing with secret and/or private information. The storage and transmission of the secret information become highly essential and have led to a deluge of research in this field. In this paper, an optimistic effort has been taken to combine graceful graph along with integer wavelet transform (IWT) to implement random image steganography for secure communication. The implementation part begins with the conversion of cover image into wavelet coefficients through IWT and is followed by embedding secret image in the randomly selected coefficients through graph theory. Finally stegoimage is obtained by applying inverse IWT. This method provides a maximum of 44 dB peak signal to noise ratio (PSNR) for 266646 bits. Thus, the proposed method gives high imperceptibility through high PSNR value and high embedding capacity in the cover image due to adaptive embedding scheme and high robustness against blind attack through graph theoretic random selection of coefficients.
format Online
Article
Text
id pubmed-3885264
institution National Center for Biotechnology Information
language English
publishDate 2013
publisher Hindawi Publishing Corporation
record_format MEDLINE/PubMed
spelling pubmed-38852642014-01-21 A Graph Theory Practice on Transformed Image: A Random Image Steganography Thanikaiselvan, V. Arulmozhivarman, P. Subashanthini, S. Amirtharajan, Rengarajan ScientificWorldJournal Research Article Modern day information age is enriched with the advanced network communication expertise but unfortunately at the same time encounters infinite security issues when dealing with secret and/or private information. The storage and transmission of the secret information become highly essential and have led to a deluge of research in this field. In this paper, an optimistic effort has been taken to combine graceful graph along with integer wavelet transform (IWT) to implement random image steganography for secure communication. The implementation part begins with the conversion of cover image into wavelet coefficients through IWT and is followed by embedding secret image in the randomly selected coefficients through graph theory. Finally stegoimage is obtained by applying inverse IWT. This method provides a maximum of 44 dB peak signal to noise ratio (PSNR) for 266646 bits. Thus, the proposed method gives high imperceptibility through high PSNR value and high embedding capacity in the cover image due to adaptive embedding scheme and high robustness against blind attack through graph theoretic random selection of coefficients. Hindawi Publishing Corporation 2013-12-22 /pmc/articles/PMC3885264/ /pubmed/24453857 http://dx.doi.org/10.1155/2013/464107 Text en Copyright © 2013 V. Thanikaiselvan et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Thanikaiselvan, V.
Arulmozhivarman, P.
Subashanthini, S.
Amirtharajan, Rengarajan
A Graph Theory Practice on Transformed Image: A Random Image Steganography
title A Graph Theory Practice on Transformed Image: A Random Image Steganography
title_full A Graph Theory Practice on Transformed Image: A Random Image Steganography
title_fullStr A Graph Theory Practice on Transformed Image: A Random Image Steganography
title_full_unstemmed A Graph Theory Practice on Transformed Image: A Random Image Steganography
title_short A Graph Theory Practice on Transformed Image: A Random Image Steganography
title_sort graph theory practice on transformed image: a random image steganography
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3885264/
https://www.ncbi.nlm.nih.gov/pubmed/24453857
http://dx.doi.org/10.1155/2013/464107
work_keys_str_mv AT thanikaiselvanv agraphtheorypracticeontransformedimagearandomimagesteganography
AT arulmozhivarmanp agraphtheorypracticeontransformedimagearandomimagesteganography
AT subashanthinis agraphtheorypracticeontransformedimagearandomimagesteganography
AT amirtharajanrengarajan agraphtheorypracticeontransformedimagearandomimagesteganography
AT thanikaiselvanv graphtheorypracticeontransformedimagearandomimagesteganography
AT arulmozhivarmanp graphtheorypracticeontransformedimagearandomimagesteganography
AT subashanthinis graphtheorypracticeontransformedimagearandomimagesteganography
AT amirtharajanrengarajan graphtheorypracticeontransformedimagearandomimagesteganography