In steganography, secret data are invisible in cover media, such as text, audio, video and image. Hence, attackers have no knowledge of the original message contained in the media or which algorithm is used to embed or extract such message. Image steganography is a branch of steganography in which secret data are hidden in host images. In this study, image steganography using least significant bit and secret map techniques is performed by applying 3D chaotic maps, namely, 3D Chebyshev and 3D logistic maps, to obtain high security. This technique is based on the concept of performing random insertion and selecting a pixel from a host image. The proposed algorithm is comprehensively evaluated on the basis of different criteria, such as correlation coefficient, information entropy, homogeneity, contrast, image, histogram, key sensitivity, hiding capacity, quality index, mean square error (MSE), peak signal-to-noise ratio (PSNR) and image fidelity. Results show that the proposed algorithm satisfies all the aforementioned criteria and is superior to other previous methods. Hence, it is efficient in hiding secret data and preserving the good visual quality of stego images. The proposed algorithm is resistant to different attacks, such as differential and statistical attacks, and yields good results in terms of key sensitivity, hiding capacity, quality index, MSE, PSNR and image fidelity.
With the go on the evolution of both computer and internet technology, videos, sounds, and scripts are used more and more often. It can be used in sundry techniques in ciphering and data concealing. The objective of this paper is leading to the suggestion of a new method of the combination between encryption and concealment of information so as to make it difficult to identify the transmitted data via networks. This study has used two force secure (2FS) to encrypt the images, in other words, the SF is frequent twice on the image, to obtain powerful encryption then the concealing of the secret message is done inside the cryptography of the image has been performed using a secret key (cosine curve), and this stegoencryption image has been transformed for the Internet of things storage in the database in IoT (data flow), when the user needs any information can be access in via of internet of things (IoTs). The outcome of the proposed system is obtained to be evaluated through different measures, such as peak signal noise ratio (PSNR), mean square error (MSE), entropy, correlation coefficient, and histogram. The proposed system is good, efficient, fast, has high security, robustness, and transparency.
This article hides mystery texts in vidiums using cipher mystery message in vidiums, the objective that work is conceal big datum in frame of video. The fast of increase in rising speed communication nets technologies and make to forward of datum is simple. Thus, it can be suggested modern manner for conceal mystery texts that big size into frame of vidium efficiently, powerful and height capacity. This system depends on of three main steps: the first step: partition texts and ciphering, the second step: partition vidium to a collection of frames, and the final step: hide mystery texts in frame of vidium uses mystery key is magic square. The outcomes of system are excellent in conceal big text without sensible by attacker, through utilized the evaluation of system in each vidium frame in "PSNR, MSE, Entropy, Histogram, and correlation coefficient".
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.