Security Measures to Image Steganography and Steganalysis: An Overview
DOI:
https://doi.org/10.61841/fngwzn83Keywords:
Security parameters, Chaotic Map, Sensitivity analysis, Attacks, SteganalysisAbstract
Nowadays, the security system draws an important role to protect sensitive information from theft and implement data confidentiality, data integrity, authentication, and access controls. This article focuses on different parameters used to implement a security system in digital image processing. These parameters illustrate different mathematical and statistical analysis and state thestrongest point of an algorithm. These parameters are mainly used for image encryption, image steganography, image compression and Steganalysis etc. The optimized value of different analysis protects from different types of attacks such as Brute Force Attacks, Known plaintext Attacks, Statistical Attacks, Analytic Attacks, etc. The parameters are used to algorithm better which are Histogram Analysis, Information Entropy, NPCR, UACI, Correlations of two adjacent pixels, Key sensitivity, MSE, PNSR, NCC, AD, SC, MD, LMSE, NAE, SSIM, RMSE, etc. This article illustrates the application of these different statistical parameters on 512 × 512 grayscale and color images.
Downloads
References
[1] A. Kanso,M. Ghebleh, “An efficient and robust image encryption schemefor medical applications”, Commun
Nonlinear Sci Numer Simulat, Vol. 24, pp. 98-116, 2015.
[2] L. M. Jawad, G. Sulong, “Chaotic map-embedded Blowfish algorithm for security enhancement of colour
image encryption”, Nonlinear Dynamics, Vol. 81, pp. 2079-2093, 2015.
[3] J. X. Chen, Z. L. Zhu, C. Fu and H. Yu, “Optical image encryption scheme using 3-D chaotic map based joint
image scrambling and random encoding in gyrator domains”, Optics Communications, Vol. 341, pp. 263-270,
2015.
[4] L. Hongjun and W. Xingyuan, “Color image encryption based on one-time keys and robust chaotic maps”,
Computers and Mathematics with Applications, Vol. 59, pp. 3320-3327, 2010.
[5] S. Mukherjee, S. Roy and G. Sanyal, “Image Steganography Using Mid Position Value Technique”,
International Conference on Computational Intelligence and Data Science, Vol. 132, pp. 461-468, 2018.
[6] K. M. Jeevan and S. Krishnakumar, “An Image Steganography Method Us- ing Pseudo Hexagonal Image”,
International Journal of Pure and Applied Mathematics, Vol. 118, pp. 2729-2735, 2018.
[7] M. C. Kasapbasi and W. Elmasry, “ New LSB-based colour image steganography method to enhance the
efficiency in payload capacity, se- curity and integrity check”, pp. 43-68, 2018.
[8] E. Emad, A. Safey, A. Refaat, Z. Osama, E. Sayed and E. Mohamed, “A secure image steganography
algorithm based on least significant bit and in- teger wavelet transform”, Journal of Systems Engineering and
Electronics,Vol. 29, pp. 639-649, 2018.
[9] K. Joshi, S. Gill and R. Yadav, “A New Method of Image Steganography Using 7th Bit of a Pixel as
Indicator by Introducing the Successive Tempo rary Pixel in the Gray Scale Image”, JJournal of Computer
Networks and Communications, Vol. 2018, Article ID 9475142, pp. 10 pages, 2018.
[10] P. A. Watters, F. Martin and S. H. Stripf, ”Visual steganalysis of LSB- encoded natural images”, Third
International Conference on Informa- tion Technology and Applications (ICITA’05), Vol.1, pp. 746-751 , doi:
10.1109/ICITA.2005.308, 2005.
[11] I. Avcibas, N. Memon and B. Sankur, “Steganalysis using image qualitymetrics”, in IEEE Transactions on
Image Processing, Vol. 12, No. 2, pp. 221-229, doi: 10.1109/TIP.2002.807363, 2003.
[12] I. Avcibas, N. Memon and B. Sankur, “Image steganalysis with binary similarity measures”, Proceedings.
International Conference on Image Processing, Vol.3, pp. 645-648 , doi: 10.1109/ICIP.2002.1039053, 2002
Downloads
Published
Issue
Section
License
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.