Security for Color Image with Message using Steganography and Watermarking Technique
Keywords:
DST, SVD, PSNR, MSEAbstract
In the normal feeling of the world, the word 'security' signifies the condition of being safe and the measures taken to guarantee security. In any case, wellbeing isn't an objective or an outright thing in light of the fact that regardless of utilizing a considerable lot of the security systems accessible there is no 100 percent security. Individuals have been making and utilizing numerous wellbeing strategies since antiquated occasions to secure their lives. Before, just things with physical nearness required insurance and security (physical security); for instance: a house was utilized to get security against the brutality of nature, watches were utilized to secure spots, and weapons were utilized to ensure people, watchtowers, doors, channels, locks, and different types of insurances. This paper present digital watermarking (DW) and steganography based secured technique to secure the text and image. The proposed technique is implemented MATLAB software and calculates MSE and PSNR.
References
Wenguang He, Zhanchuan Cai and Yaomin Wang, “High-fidelity Reversible Image Watermarking Based on Effective Prediction Error-Pairs Modification”, IEEE Transactions on Multimedia, IEEE 2020.
Awdhesh K. Shukla, Akanksha Singh, Balvinder Singh and Amod Kumar, “A Secure and High-Capacity Data-Hiding Method using Compression, Encryption and Optimized Pixel Value Differencing”, IEEE Access, October 8, pp. 51130–51139, 2018.
A. Bose and S. P. Maity, “Spread Spectrum Image Watermark Detection on Degraded Compressed Sensing Measurements with Distortion Minimization,” Multimedia Tools Appl., vol. 77, no. 16, pp. 20783–20808, Aug. 2018.
Nazir A. Loan, Nasir N. Hurrah, Shabir A. Parah, Jong Weon Lee, Javaid A. Sheikh, and G. Mohiuddin Bhat; “Secure and Robust Digital Image Watermarking Using Coefficient Difference and Chaotic Encryption; Information Security Solutions for Telemedicine Applications, Vol. 6 No. 3, pp. 19876–19 897, IEEE, 2018.
Baharak Ahmadearaghi, Fatih Kurugollu, Jesus Martinez Del Rincon, Ahmed Bouridane; “Blind Image Watermark Detection Algorithm Based on Discrete Shearlet Transform Using Statistical Decision Theory,” IEEE Transactions on Computational Imaging, Vol. 4, No. 1, pp. 46–59, IEEE, 2018.
W.-H. Ko, B. Satchidanandan P. R. Kumar, “Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems;” Proc. IEEE Conf. Commun. Netw. Security (CNS) pp. 416–420, IEEE 2016.
M. Hosseini T. Tanaka V. Gupt, “Designing optimal watermark signal for a stealthy attacker,” Proc. Eur. Control Conf. (ECC) pp. 2258–2262 Apr. 2016.
Ahmed, F. and Moskowitz, I.S.; “Composite Signature Based Watermarking for Fingerprint Authentication;” ACM Multimedia and Security Workshop, pp. 137–142. 2005.
Y.-H. Fung and Y.-H. Chan; “Tone-dependent noise model for high-quality halftone;” Journal Electron. Image, Vol. 22, No. 2, EEE 2013.
Bidyut Jyoti Saha, Kunal Kumar Kabi and Arun; “Non Blind Watermarking Technique using Enhanced One Time Pad in DWT Domain,” International Conference of Digital Signal Processing, EEE, 2014.
M. Kim, D. Li, S. Hong; “A Robust Digital Watermarking Technique for Image Contents based on DWT-DFRT Multiple Transform Method;” International Journal Multimed. Ubiquitous Eng., Vol. 9 No. 1, pp. 369–378, 2014.
Baharak Ahmadearaghi, Jesus Martinez Del Rincon, Fatih Kurugollu, Ahmed Bourdiane; “Perceptual Watermarking for Discrete Shearlet Transform;” 5th European Workshop on Visual Information Processing (EUVIP), IEEE, 2014.
Jian-Shiung Hsieh and Fei-Hsiang Huang; “A New Image Watermarking Scheme using Non-dominated Sorting Genetic Algorithm II;” International Symposium on Biometrics and Security Technologies, IEEE, 2013.
Downloads
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.




