A High Secured Steganalysis Using QVDHC Model

Main Article Content

Praveena Akki
Gitanjali J
Celestine Iwendi
Sumathy. S
Amtul Waheed

Abstract

Data compression plays a vital role in data security as it saves memory, transfer speed is high, easy to handle and secure. Mainly the compression techniques are categorized into two types. They are lossless, lossy data compression. The data format will be an audio, image, text or video. The main objective is to save memory of using these techniques is to save memory and to preserve data confidentiality, integrity. In this paper, a hybrid approach was proposed which combines Quotient Value Difference (QVD) with Huffman coding. These two methods are more efficient, simple to implement and provides better security to the data. The secret message is encoded using Huffman coding, while the cover image is compressed using QVD. Then the encoded data is embedded into cover image and transferred over the network to receiver. At the receiver end, the data is decompressed to obtain original message. The proposed method shows high level performance when compared to other existing methods with better quality and minimum error.

Article Details

How to Cite
Akki, P. ., J, G. ., Iwendi, C. ., S, S. ., & Waheed, A. . (2022). A High Secured Steganalysis Using QVDHC Model. International Journal on Recent and Innovation Trends in Computing and Communication, 10(9), 95–103. https://doi.org/10.17762/ijritcc.v10i9.5709
Section
Articles

References

Sengupta, A., Roy, D., Mohanty, S.P. and Corcoran, P., 2018. Low-cost obfuscated JPEG CODEC IP core for secure CE hardware. IEEE Transactions on Consumer Electronics, 64(3), pp.365-374.

Zhou, H., Zhang, W., Chen, K., Li, W. and Yu, N., 2021. Three-dimensional mesh steganography and steganalysis: A review. IEEE Transactions on Visualization and Computer Graphics.

Liao, X., Yin, J., Chen, M. and Qin, Z., 2020. Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Transactions on Dependable and Secure Computing.

Manohar, N. and Kumar, P.V., 2020, May. Data encryption decryption using steganography. In 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS) (pp. 697-702). IEEE.

Pramanik, S., Bandyopadhyay, S.K. and Ghosh, R., 2020, March. Signature image hiding in color image using steganography and cryptography based on digital signature concepts. In 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA) (pp.665-669). IEEE.

Li, W., Zhang, W., Li, L., Zhou, H. and Yu, N., 2020. Designing near-optimal steganographic codes in practice based on polar codes. IEEE Transactions on Communications, 68(7), pp.3948-3962.

Luo, Y., Qin, J., Xiang, X. and Tan, Y., 2020. Coverless image steganography based on multi-object recognition. IEEE Transactions on Circuits and Systems for Video Technology, 31(7), pp.2779-2791.

Gupta, D. J. . (2022). A Study on Various Cloud Computing Technologies, Implementation Process, Categories and Application Use in Organisation. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 8(1), 09–12. https://doi.org/10.17762/ijfrcsce.v8i1.2064

Taburet, T., Bas, P., Sawaya, W. and Fridrich, J., 2020. Natural steganography in JPEG domain with a linear development pipeline. IEEE Transactions on Information Forensics and Security, 16, pp.173-186.

Zhou, X., Peng, W., Yang, B., Wen, J., Xue, Y. and Zhong, P., 2021. Linguistic steganography based on adaptive probability distribution. IEEE Transactions on Dependable and Secure Computing.

Ansari, A.S., Mohammadi, M.S. and Parvez, M.T., 2020. A multiple-format steganography algorithm for color images. IEEE Access, 8, pp.83926-83939.

N. Sharma and U. Batra, Jul. 2018, “Performance analysis of compression algorithms for information security: A review,” ICST Trans. Scalable Inf. Syst., vol. 7, no. 27, Art. no. 163503.

A. Jeromel and B. ?Zalik, Jan. 2020, “An efficient lossy cartoon image compression method,” Multimedia Tools Appl., vol. 79, nos. 1–2, pp. 433–451.

M. Dehshiri, S. G. Sabouri, and A. Khorsandi, 2021, “Structural similarity assessment of an optical coherence tomographic image enhanced using the wavelet transform technique,” J. Opt. Soc. Amer. A, Opt. Image Sci., vol. 38, no. 1, pp. 1–9.

Das, R. and Tuithung, T., 2012, March. A novel steganography method for image based on Huffman Encoding. In 2012 3rd National Conference on Emerging Trends and Applications in Computer Science , pp. 14-18.

Grabski, S. and Szczypiorski, K., 2013, May. Steganography in OFDM symbols of fast IEEE 802.11 n networks. In 2013 IEEE security and privacy workshops pp. 158-164.

Samunnisa, K., Lakshmi, M.S., & Kumar, D.S. (2015). Design of an adaptive JPEG Steganalysis with UED., International Journal Of Computer Engineering In Research Trends,2(8),pp.497-504.

Gunjan, Er. Madan Lal (2016), Investigation of Various Image Steganography Techniques in Spatial Domain , International Journal Of Computer Engineering In Research Trends,3(6),pp.347-351.

Saraireh, J., & Joudeh, H. (2022). An Efficient Authentication Scheme for Internet of Things. International Journal of Communication Networks and Information Security (IJCNIS), 13(3).

Viswanathan, P., & Krishna, P. V. (2009, October). Text fusion watermarking in medical image with semi-reversible for secure transfer and authentication. In 2009 International Conference on Advances in Recent Technologies in Communication and Computing (pp. 585-589). IEEE.

Linda R. Musser. (2020). Older Engineering Books are Open Educational Resources. Journal of Online Engineering Education, 11(2), 08–10. Retrieved from http://onlineengineeringeducation.com/index.php/joee/article/view/41

Viswanathan, P., & VenkataKrishna, P. (2011). Fusion of cryptographic watermarking medical image system with reversible property. Computer Networks and Intelligent Computing, 533-540.

Yasar, A. (2021). Data Classification of Early-Stage Diabetes Risk Prediction Datasets and Analysis of Algorithm Performance Using Feature Extraction Methods and Machine Learning Techniques. International Journal of Intelligent Systems and Applications in Engineering, 9(4), 273–281. https://doi.org/10.18201/ijisae.2021473767

Ajin P Thomas , Sruthi P.S , Jerry Rachel Jacob , Vandana V Nair , Reeba R (2017), Secret Data Transmission Using Combination of Cryptography &Steganography. 4(5),pp.171-175.

Lakshmi, T. Naga, S. Jyothi, and M. Rudra Kumar. "Image Encryption Algorithms Using Machine Learning and Deep Learning Techniques—A Survey." Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough. Springer, Cham, 2021. 507-515.