Secured data transfer through images by using Data Hiding and Encryption

  • Siddhant Saka, M Manish, Debopam Dey, Thanikaiselvan V, Amirtharajan R

Abstract

In recent years, due to the increase in the generation of personal data and sophisticated cyberattacks, secure transfer of secret data is becoming more and more difficult. One popular security technique is Data hiding in Images using transforms which is based on the concept that it is not easy for the human eye to discern the minuscule changes in an image. This is exploited in the current study, and two multilevel robust security models for securing sensitive information in images are described. Reversible Data Hiding concept is also utilized to claim the cover image as well. The proposed first model utilizes the concept of LSB(Least Significant Substitution) Substitution in transform domain by performing Integer Wavelet transform (IWT) and then embedding the data in the bit planes. The second model utilizes Histogram Shifting and Substitution in the transfer domain by means of IWT to perform Reversible data hiding where the original cover image was recovered without any loss. Both the methodologies first preprocess the data by scrambling the original data by using the logistic chaotic map. After data embedding, both the proposed methods encrypt the resulting stego image by the use of coupled chaotic maps. Compared with popular methods, the methodologies delivered high payload capacity and less aberration.

Published
2020-06-01
How to Cite
Siddhant Saka, M Manish, Debopam Dey, Thanikaiselvan V, Amirtharajan R. (2020). Secured data transfer through images by using Data Hiding and Encryption. International Journal of Advanced Science and Technology, 29(7), 4753-4767. Retrieved from http://sersc.org/journals/index.php/IJAST/article/view/23357
Section
Articles