{"title":"一种基于CDF-DWT技术的隐写嵌入方法,用于利用Elgamal算法进行可逆数据隐藏","authors":"K. Raju, A. Nagarajan","doi":"10.1142/s0129054122420011","DOIUrl":null,"url":null,"abstract":"Steganography is a data hiding method mainly used in the security purposes. While hiding more data in the embedding process the data may be lost and also cause some security problems. To avoid this problem a Steganography Embedding method is used. In this manuscript, Steganography Embedding method based on Cohen–Daubechies–Feauveau Discrete Wavelet Transform (CDF-DWT) technique to data hiding application using Elgamal algorithm is proposed. In this the cover image is taken for hiding the secret data. Then the cover image edges are detected and filtered with Speeded-Up Robust Features (SURF) method. Then the input secret data is encrypted with Elgamal algorithm. Then the secret data is hided under cover image for obtaining the stego image by process of Embedding using CDF DWT technique. In this data in the stego images are unreadable. To get readable secured data is extracted from the stego image and the data’s are decrypted to get secured secret data. The objective of this method is to safe guard the secret using Steganography method and to increase embedding efficiency, Embedding capacity and carrier capacity and to reduce the execution time. The MATLAB simulation results of the proposed CDF DWT technique with Elgamal algorithm portrays better outcomes such as Peak to Signal Noise Ratio (PSNR), Mean Square Error (MSE) (lower), Bit Error Rate (BER) was Lower, Execution time provides is lower, Carrier Capacity and Embedding Capacity are much higher and the values are compared with the existing method such as Elliptic Galois in cryptography and in the Steganography method with Adaptive Firefly Algorithm (EGC-AFA), Reversible Data hiding within Encrypted images Via Adaptive Embedding Strategy with block selection (RDHEI-AES), Double Linear Regression Prediction based Reversible Data Hiding in Encrypted Image (DLRP-RDHEI) respectively.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":"33 1","pages":"489-512"},"PeriodicalIF":0.6000,"publicationDate":"2022-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Steganography Embedding Method Based on CDF-DWT Technique for Reversible Data Hiding Application Using Elgamal Algorithm\",\"authors\":\"K. Raju, A. Nagarajan\",\"doi\":\"10.1142/s0129054122420011\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Steganography is a data hiding method mainly used in the security purposes. While hiding more data in the embedding process the data may be lost and also cause some security problems. To avoid this problem a Steganography Embedding method is used. In this manuscript, Steganography Embedding method based on Cohen–Daubechies–Feauveau Discrete Wavelet Transform (CDF-DWT) technique to data hiding application using Elgamal algorithm is proposed. In this the cover image is taken for hiding the secret data. Then the cover image edges are detected and filtered with Speeded-Up Robust Features (SURF) method. Then the input secret data is encrypted with Elgamal algorithm. Then the secret data is hided under cover image for obtaining the stego image by process of Embedding using CDF DWT technique. In this data in the stego images are unreadable. To get readable secured data is extracted from the stego image and the data’s are decrypted to get secured secret data. The objective of this method is to safe guard the secret using Steganography method and to increase embedding efficiency, Embedding capacity and carrier capacity and to reduce the execution time. The MATLAB simulation results of the proposed CDF DWT technique with Elgamal algorithm portrays better outcomes such as Peak to Signal Noise Ratio (PSNR), Mean Square Error (MSE) (lower), Bit Error Rate (BER) was Lower, Execution time provides is lower, Carrier Capacity and Embedding Capacity are much higher and the values are compared with the existing method such as Elliptic Galois in cryptography and in the Steganography method with Adaptive Firefly Algorithm (EGC-AFA), Reversible Data hiding within Encrypted images Via Adaptive Embedding Strategy with block selection (RDHEI-AES), Double Linear Regression Prediction based Reversible Data Hiding in Encrypted Image (DLRP-RDHEI) respectively.\",\"PeriodicalId\":50323,\"journal\":{\"name\":\"International Journal of Foundations of Computer Science\",\"volume\":\"33 1\",\"pages\":\"489-512\"},\"PeriodicalIF\":0.6000,\"publicationDate\":\"2022-06-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Foundations of Computer Science\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1142/s0129054122420011\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Foundations of Computer Science","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1142/s0129054122420011","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
A Steganography Embedding Method Based on CDF-DWT Technique for Reversible Data Hiding Application Using Elgamal Algorithm
Steganography is a data hiding method mainly used in the security purposes. While hiding more data in the embedding process the data may be lost and also cause some security problems. To avoid this problem a Steganography Embedding method is used. In this manuscript, Steganography Embedding method based on Cohen–Daubechies–Feauveau Discrete Wavelet Transform (CDF-DWT) technique to data hiding application using Elgamal algorithm is proposed. In this the cover image is taken for hiding the secret data. Then the cover image edges are detected and filtered with Speeded-Up Robust Features (SURF) method. Then the input secret data is encrypted with Elgamal algorithm. Then the secret data is hided under cover image for obtaining the stego image by process of Embedding using CDF DWT technique. In this data in the stego images are unreadable. To get readable secured data is extracted from the stego image and the data’s are decrypted to get secured secret data. The objective of this method is to safe guard the secret using Steganography method and to increase embedding efficiency, Embedding capacity and carrier capacity and to reduce the execution time. The MATLAB simulation results of the proposed CDF DWT technique with Elgamal algorithm portrays better outcomes such as Peak to Signal Noise Ratio (PSNR), Mean Square Error (MSE) (lower), Bit Error Rate (BER) was Lower, Execution time provides is lower, Carrier Capacity and Embedding Capacity are much higher and the values are compared with the existing method such as Elliptic Galois in cryptography and in the Steganography method with Adaptive Firefly Algorithm (EGC-AFA), Reversible Data hiding within Encrypted images Via Adaptive Embedding Strategy with block selection (RDHEI-AES), Double Linear Regression Prediction based Reversible Data Hiding in Encrypted Image (DLRP-RDHEI) respectively.
期刊介绍:
The International Journal of Foundations of Computer Science is a bimonthly journal that publishes articles which contribute new theoretical results in all areas of the foundations of computer science. The theoretical and mathematical aspects covered include:
- Algebraic theory of computing and formal systems
- Algorithm and system implementation issues
- Approximation, probabilistic, and randomized algorithms
- Automata and formal languages
- Automated deduction
- Combinatorics and graph theory
- Complexity theory
- Computational biology and bioinformatics
- Cryptography
- Database theory
- Data structures
- Design and analysis of algorithms
- DNA computing
- Foundations of computer security
- Foundations of high-performance computing