In recent years information hiding has got much attention as it acts as an alternate option for secured communication. The Secret content would get imbedded with the image using various possible image embodiment techniques, in which the Least Significant Bit (LSB) substitution is one of the preferred content embodiment strategy; however, asserting the quality and the originality of the content embedded image (stego) is yet a grievous concern in the field of Information Security. In this article, a proficient Scrambling Based Haar Wavelet Transform (SBHWT) approach has been sought to ensure the novelty of the stego-image that supports the safe transfer of data over the channel. In this process, the image is scrambled using a Sudoku pattern, and then streams of the secret content are embedded into the image blocks based on the proposals of the Bishop Traversal logic of chess. The content embodiment is attempted using normal LSB substitution and DNA pattern based substitution. Next, the image is descrambled to recover the original image, which is then subjected to Haar wavelet transformation for image resolution reduction. The resultant reduced image is channelized to the recipient and the inverse action of the SBHWT is made in order to get back the secret code stream. The experimental results demonstrate that the projected SBHWT approach is less predictable and exclusive in its pattern.
This paper is nominated for an image protection scheme in the area of government sectors based on discrete cosine transformation with digital watermarking scheme. A cover image has broken down into 8 × 8 non overlapped blocks and transformed from spatial domain into frequency domain. Apply DCT version II of the DCT family to each sub block of the original image. Then embed the watermarking image into the sub blocks. Apply IDCT of version II to send the image through communication channel with watermarked image. To recover the watermarked image, apply DCT and watermarking formula to the sub blocks. The experimental results show that the proposed watermarking procedure gives high security and watermarked image retrieved successfully.
With the improvement of current online communication schemes, it is now possible to successfully distribute and transport secured digital Content via the communication channel at a faster transmission rate. Traditional steganography and cryptography concepts are used to achieve the goal of concealing secret Content on a media and encrypting it before transmission. Both of the techniques mentioned above aid in the confidentiality of feature content. The proposed approach concerns secret content embodiment in selected pixels on digital image layers such as Red, Green, and Blue. The private Content originated from a medical client and was forwarded to a medical practitioner on the server end through the internet. The K-Means clustering principle uses the contouring approach to frame the pixel clusters on the image layers. The content embodiment procedure is performed on the selected pixel groups of all layers of the image using the Least Significant Bit (LSB) substitution technique to build the secret Content embedded image known as the stego image, which is subsequently transmitted across the internet medium to the server end. The experimental results are computed using the inputs from "Open-Access Medical Image Repositories (aylward.org)" and demonstrate the scheme's impudence as the Content concealing procedure progresses.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.