
تعداد نشریات | 21 |
تعداد شمارهها | 610 |
تعداد مقالات | 9,029 |
تعداد مشاهده مقاله | 67,082,935 |
تعداد دریافت فایل اصل مقاله | 7,656,390 |
Secret data transmission using advanced steganography and image compression | ||
International Journal of Nonlinear Analysis and Applications | ||
دوره 12، Special Issue، اسفند 2021، صفحه 1243-1257 اصل مقاله (2.54 M) | ||
نوع مقاله: Research Paper | ||
شناسه دیجیتال (DOI): 10.22075/ijnaa.2021.5635 | ||
نویسندگان | ||
Digvijay Pandey* 1؛ Subodh Wairya1؛ Raghda Salam Al Mahdawi2؛ Saif Al-din M Najim3؛ Haitham Abbas Khalaf4؛ Shokhan M Al Barzinji3؛ Ahmed J Obaid5 | ||
1Department of Electronics Engineering, Institute of Engineering and Technology, Dr. A.P.J. Abdul Kalam Technical University, Lucknow, India | ||
2Department of Computer Engineering Collage of Engineering, University of Diyala: Baqubah, Diyala, Iraq | ||
3Department of Computer Science, College of Computer Science and Information Technology, University of Anbar, Ramadi, Iraq | ||
4College of Medicine, University of Anbar, Ramadi, Iraq | ||
5Faculty of Computer Science and Mathematics, University of Kufa, Iraq. | ||
تاریخ دریافت: 14 تیر 1400، تاریخ پذیرش: 19 شهریور 1400 | ||
چکیده | ||
Growing requirements for preservation as well as transportation of multi-media data have been a component of everyday routine throughout the last numerous decades. Multimedia data such as images and videos play a major role in creating an immersive experience. Data and information must be transmitted quickly and safely in today’s technologically advanced society, yet valuable data must be protected by unauthorised people. Throughout such work, a covert communication as well as textual data extraction approach relying on steganography and image compression is constructed by utilising a deep neural network. Using spatial steganography, the initial input textual image and cover image are all first pre-processed, and afterwards the covert text-based images are further separated and implanted into the least meaningful bit of the cover image picture element. Thereafter, stego- images are compressed to create an elevated quality image and to save storage capacity at the sender’s end. After all this, the receiver will receive this stego-image through a communication channel. Subsequently, steganography and compression are reversed at the receiver’s end. This work has a multitude of problems that make it a fascinating subject to embark on. Selecting the correct steganography and image compression method is by far the most important part of this work. The suggested method, which integrates both image-steganography and compaction, achieves better efficacy in relation to peak signal-to-noise. | ||
کلیدواژهها | ||
Image Compression؛ steganography؛ Data Transmission | ||
مراجع | ||
[1] A.S. Abdulbaqi, A.J. Obaid and A.H. Mohammed, ECG signals recruitment to implement a new technique for medical image encryption, J. Discrete Math. Sci. Crypt. 24(6) (2021) 1663–1673. [2] R. Ahmad and N.S. Choubey, Review on image enhancement techniques using biologically inspired artificial bee colony algorithms and its variants, In Lecture Notes in Computational Vision and Biomechanics, Springer: Dordrecht, The Netherlands, 25 (2018) 249–271.[3] S. Aishwarya and S. Veni, Hardware implementation of EZW based image compression with Huffman coding, Int. J. Engin. Sci. Innov. Tech. 2(5) (2013). [4] M.M.S.A. Al-Momin, I.A. Abed and H.A. Leftah, A new approach for enhancing LSB steganography using bidirectional coding scheme, Int. J. Elect. Comput. Engin. 9(6) (2019) 5286–5294. [5] J.A. Alvarez-Cedillo, T. Alvarez-Sanchez, M. Aguilar-Fernandez and J. Sandoval-Gutierrez, Many-core algorithm of the embedded zerotree wavelet encoder, In Coding Theory, S. Radhakrishnan and M. Sarfraz (eds.) Rijeka: Intech Open, 2020. [6] A.A. Attaby, M.F.M. Ahmed and A.K. Alsammak, Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3, Ain Shams Engin. J. 9(4) (2018) 1965–1974. [7] R. Baran, P. Partila and R. Wilk, Automated text detection and character recognition in natural scenes based on local image features and contour processing techniques, international conference on intelligent human systems integration, Springer, Cham, (2018) 42–48. [8] R. Boujelbene, L. Boubchir and Y.B. Jemaa, Enhanced embedded zerotree wavelet algorithm for lossy image coding, IET Image Proc. 13(8) (2019) 1364–1374. [9] M.S. Chavan, N. Mastorakis, M.N. Chavan and M.S. Gaikwad, Implementation of SYMLET wavelets to removal of Gaussian additive noise from speech signal, World Sci. Engin. Acad. Soc. (WSEAS) (2011) 37–41. [10] A. Cherian and A. Sullivan, Sem-GAN: semantically-consistent image-to-image translation, Proc. IEEE Winter Conf. Appl. Comput. Vis. (WACV) (2019) 1797–1806. [11] E. Delp and O. Mitchell, Image compression using block truncation coding, Commun. IEEE Trans. 27 (1979) 1335–1342. [12] V. Elamaran, Comparison of wavelet filters in image coding and denoising using dembedded zerotree wavelet algorithm, Res. J. Appl. Sci., Engin. Tech. 4(24) (2012) 5449–5452. [13] A.E. El-Sharkawey and M.E. Ali, Comparison Between (RLE & Huffman and DWT) Algorithms for Data Compression, 2019. [14] R.G. Gallager, Claude E. Shannon: a retrospective on his life, work, and impact, Inf. Theory, IEEE Trans. 47(7) (2001) 2681–2695. [15] D. Gautam and A. Singh, Resourceful fast discrete hartley transform to replace discrete fourier transform with implementation of DHT algorithm for VLSI architecture, Turkish J. Comput. Math. Educ. 12(10) (2021) 5290– 5298. [16] L. Gong, C. Deng, S. Pan and N. Zhou, Image compression-encryption algorithms by combining hyper-chaotic system with discrete fractional random transform, Optics Laser Tech. 103 (2018) 48–58. [17] D. Grois and O. Hadar, Efficient region-of-interest scalable video coding with adaptive bit-rate control, Adv. Multimedia 2013 (2013) 281593. [18] K. Kalaiselvi, Image compression using SPIHT techniques, J. Math. Inf. 11 (2017) 147–153. [19] H. Kanagaraj and V. Muneeswaran, Image compression using HAAR discrete wavelet transform, 5th Int. Conf. Devices Circ. Syst. (2020) 271–274. [20] B. Kanchanadevi and P.R. Tamilselvi, Post processing using enhanced discrete cosine transform for image compression, Int. J. Adv. Sci. Tech. 29(06) (2020) 9372–9386. [21] M. Kaur and G.K. AP, A survey on implementation of discrete wavelet transform for image Ddnoising, Int. J. Communi. Net. Sys. 2(1) (2013). [22] K. Kaur and B. Kaur, A robust video compression algorithm for efficient data transfer of surveillance data, Int. J. Engin. Res. Tech. 9(7) (2020). [23] M.K.H. Kolekar, G.L. Raja and S. Sengupta, An introduction to wavelet-based image processing and its applications, In: M.K.H. Kolekar, G.L. Raja and S. Sengupta (eds), Computer Vision: Concepts, Methodologies, Tools, and Applications, Hershey, PA: IGI Global (2018) 110–128. [24] P. Kuldeep and S. Vivek, A survey of various image compression techniques, Indian J. Appl. Res. 5(1) (2015). [25] J. Liu, Y. Ke, Z. Zhang, Y. Lei, J. Li, M. Li and X. Yang, Recent advances of image steganography with generative adversarial networks, IEEE Access 8 (2020) 60575–60597. [26] M.-m. Liu, M.-q. Zhang, J. Liu, Y.-n. Zhang and Y. Ke, Coverless information hiding based on generative adversarial networks, CoRR (2017). [27] Y. Luo, X. Ouyang, J. Liu and L. Cao, An image encryption method based on elliptic curve elgamal encryption and chaotic systems, IEEE Access 7 (2019) 38507–38522. [28] S. Majumdar, Comparative analysis of Coiflet and Daubechies wavelets using global threshold for image de-noising, Int. J. Adv. Engin. Tech. 6 (2013) 2247–2252. [29] Y. Minzhu, Z. Zhipu and H. Changpei, Research on lossless compression based on single-frame interferogram [J], Modern Elect. Tech. 42(07) (2019) 57–60.[30] D. Napoleon, S. Sathya, M. Praneesh and M.S. Subramanian, Remote sensing image compression using 3D-SPIHT algorithm and 3d-owt, Int. J. Comput. Sci. Engin. 4(05) (2012) 899–908. [31] A.J. Oabid, S. AlBermany and N.O. Alkaam, Enhancement in S-Box of BRADG algorithm, In: V. Solanki, M. Hoang, Z. Lu and P. Pattnaik (eds), Intelligent Computing in Engineering, Advances in Intelligent Systems and Computing, Springer, Singapore, 1125 (2020). [32] B.K. Pandey, D. Mane, V.K.K. Nassa, D. Pandey, S. Dutta, R.J.M. Ventayen, G. Agarwal and R. Rastogi, Secure text extraction from complex degraded images by applying steganography and deep learning, In Multidisciplinary Approach to Modern Digital Steganography, IGI Global, (2021). [33] D. Pandey, V.K.K. Nassa, A. Jhamb, D. Mahto, B.K. Pandey, A.S.H. George, A.S. George and S. Bandyopadhyay, An integration of keyless encryption, steganography, and artificial intelligence for the secure transmission of stego images, Multidiscip. App. Modern Digital Steganog. (2021) 211–234. [34] D. Pandey, B.K. Pandey and S. Wairya, Hybrid deep neural network with adaptive galactic swarm optimization for text extraction from scene images, Soft Comput. 25 (2021) 1563–1580. [35] B.K. Pandey, D. Pandey, S. Wairya and G. Agarwal, An advanced morphological component analysis, steganography, and deep learning-based system to transmit secure textual data, Int. J. Distrib. Artif. Intell. 13(2) (2021) 40–62. [36] Z. Peng, G. Wang, H. Jiang and S. Meng, Research and improvement of ECG compression algorithm based on EZW, Computer Methods Prog. Biomed.145 (2017) 157–166. [37] D. Po lap, An adaptive genetic algorithm as a supporting mechanism for microscopy image analysis in a cascade of convolution neural networks, Appl. Soft Comput. J. 97 (2020) 106824. [38] Y. Pourasad and F. Cavallaro, A novel image processing approach to enhancement and compression of X-ray images, Int. J. Environ. Res. Public Health 18(13) (2021) 6724. [39] M. Rathee and A. Vij, Review of image compression techniques based on orthogonal transforms, Int. J. Engin. Sci. and Innov. Tech. 3(4) (2014). [40] A. Sahu and G. Swain, Dual stego-imaging based reversible data hiding using improved LSB matching, Int. J. Intell. Eng. Syst. 12(5) (2019) 63–73. [41] M.Y. Sashikala, A.S. Solomon and M.N. Nachappa, A survey of compression techniques, Int. J. Recent Tech. Engin. 2(1) (2013). [42] A. Savakis and R. Carbone, Discrete wavelet transform core for image processing applications, Proc. SPIE Int. Soc. Optical Engin. (2005). [43] Z. Songgang, G. feng, Y. Fulei and L. Xiaowei, Research on UAV video compression based on compression algorithm [J], Integrated Circuit Appl. 36(04) (2019) 39–40. [44] S. Suma and V. Sridhar, Computational modelling of image coding using ROI based medical image compression, Int. J. Comput. Appl. 108(5) (2014) 20–27. [45] D. VijendraBabu and N.R. Alamelu, Wavelet based medical image compression using ROI EZW, Int. J. Recent Trends Engin. Tech. 1(3) (2009). [46] Y. Xu and L. Xu, The performance analysis of wavelet in video coding system, Multimedia Technology (ICMT), 2011 Int. Conf. (2011) 878–883. [47] M. Yang, W. Zhao, W. Xu, Y. Feng, Z. Zhao, X. Chen and K. Lei, Multitask learning for cross-domain image captioning, IEEE Trans. Multimedia 21(4) (2019) 1047–1061. [48] Y. Yu, M. Wang and D. Lima, Alcoholism detection in magnetic resonance imaging by Haar wavelet transform and back propagation neural network, AIP Conf. Proc. (2018) 040012. [49] R. Zhang, S. Dong and J. Liu, Invisible steganography via generative adversarial networks, Multimedia Tools Appl. 78(7) (2019) 8559–8575. [50] X. Zhou, Research on DCT-based image compression quality, Proc. 2011 Cross Strait Quad-Regional Radio Science and Wireless Tech. Conf. (2011) 1490–1494. [51] J. Zhu, R. Kaplan, J. Johnson and L. Fei-Fei, HiDDeN: Hiding data with deep networks, CoRR, 2018. | ||
آمار تعداد مشاهده مقاله: 44,980 تعداد دریافت فایل اصل مقاله: 1,266 |