Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
Using Quaternion Fourier Transform in Steganography Systems.
Author(s):
1. M I Khalil: Princess Norah Bent Abdurrahman University, Faculty of Computer and Information Sciences, Information Technology networks Department, Riyadh, Kingdom of Saudi Arabia
Abstract:
steganography is the discipline of exchanging information messages in such way that no one, other than the intended recipient, suspects the existence of the message. The transmitted message can be in textual or multimedia form (audio, image or video) and can be hidden within cover media. Moreover, the hidden message can be in either plain or cipher form. In steganography, the majority of hiding techniques are implemented either in spatial domain or in frequency domain of the cover media. The current contribution introduces a new a steganography technique for hiding a textual message within a cover image. Both the message and the cover image is converted to quaternion form and then only the quaternion message is converted to the frequency domain using Quaternion Fast Fourier Discrete Transform (QFFDT) technique. Simple quaternion mathematics are used to combine the message (in quaternion frequency domain) within the cover image (in quaternion form). Conversely, the hidden message can be revealed at the receiver using simple quaternion mathematics in presence of the original cover image. The proposed method allows hiding a huge amount of data and it is much complicated against steganalysis compared to the traditional methods. The method is assessed using the known performance metrics and the obtained results show that it is robust and more secure against steganalysis attacks without affecting the consumed bandwidth of the communication channel.
Page(s): 425-431
DOI: DOI not available
Published: Journal: International Journal of Communication Networks and Information Security, Volume: 10, Issue: 2, Year: 2018
Keywords:
Keywords are not available for this article.
References:
[1] ArunaVaranasi,M., March 2014.Lakshmi Anjana and Pravallika Pasupulate, “Image Steganography with Cryptography using Multiple Key Patterns,International Journal of Computer Applications (0975 - 8887) 90 -
[2] Amiruddin,December, 2017.New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks,International Journal of Communication Networks and Information Security (IJCNIS) 9 -
[3] UmarMujahid,M.,Islam,December, 2014.Ultralightweight Cryptography for Passive RFID Systems,International Journal of Communication Networks and Information Security (IJCNIS) 6 -
[4] ShamimAhmed,December, 2012.Laskar and Kattamanchi Hemachandran, “High Capacity data hiding using LSB Steganography and,International Journal of Database Management Systems 4 -
[5] S.K.Sabnis,R.N.Awale, 2016.Statistical Steganalysis of High Capacity Image Steganography with Cryptography,” 7th International Conference on Communication, Computing and Virtualization 321 -327
[6] PrashantKumar,Arya, 2015.Mahendra Singh Aswal and Vinod Kumar, “Comparative Study of Asymmetric Key Cryptographic Algorithms,International Journal of Computer Science & Communication Networks 5 17 -21
[7] ShilpaGupta,ISSN,July, 2012.Enhanced Least Significant Bit algorithm For Image Steganography”,International Journal of Computational Engineering & Management 15 2230 -7893
[8] Ki-HyunJung, February 2009.Steganographic method based on interpolation and LSB substitution of digital images,Computer Standards & Interfaces 31 465 -470
[9] G.Raj Kumar,M.Maruthi Prasada,T.Lalith,Kumar,Issue6,October-November, 2014.An Implementation of LSB Steganography Using DWT Technique,”,International Journal of Engineering Research and General Science, ISSN 2091- 2730 2 -
[10] ShilpaThakar,Issue12,December2013, .,International Journal of Advanced Research in Computer Science and Software Engineering 3 -
[11] GurpreetKaur, April 2013.Other Data Hiding Techniques,International Journal of Innovative Technology and Exploring Engineering 2 2278 -3075
[12] ChunlinSong, 2009PGNet.Recent Advances and Classification of Watermarking Techniques in Digital Images,”,ISBN: 978-1-902560- 22-9 -
[13] MariuszDzwonkowski, 2015.Michal Papaj and Roman Rykaczewski, “A New Quaternion-Based Encryption Method for DICOM Images”,IEEE Transactions on Image Processing, vo. 24 4614 -4622
[14] AnitaPradhan,K.Raja Sekhar, 2017.Adaptive PVD Steganography Using Horizontal, Vertical, and Diagonal Edges in Six-Pixel Blocks,” Security and Communication Networks, 1 -13
[15] M.I.Khalil, August 2017.Quaternion-based Encryption/Decryption of Audio Signal Using Digital Image as a Variable Key”,International Journal of Communication Networks and Information Security (IJCNIS) 9 -
[16] P. M. Rubesh Anand,March, 2009.Real-Time Symmetric Cryptography using Quaternion Julia Set,International Journal of Computer Science and Network Security 9 -
[17] EckhardHitzer,, 2016.The Quaternion Domain Fourier Transform,Clifford Algebras 26 969 -984
[18] Bihan , N.L.,Sangwine , S.J., 2003."Quaternion principal component analysis of color images,",IEEE International Conference on Image Processing 1 809 -812
[19] EllT.A., 1993."Quaternion-Fourier transforms for analysis of two dimensional linear time-invariant partial differential systems,",in Proc. 32nd Con 1830 -1841
Citations
Citations are not available for this document.
0

Citations

0

Downloads

27

Views