Enhancing data transfer architecture using LSB steganography combined with reed solomon code
Keywords:Cryptography, Steganography, Reed Salomon code.
In this paper, new steganographic systems employing least significant bit technique and wavelet transform for embedding are proposed. These systems incorporate threshold level technique to enhance the performance of embedding scheme. Further, Forward error correcting code is used to improve the system performance. In the proposed system, the cover image is a gray image and the wavelet transform is applied directly. The secret image is coded using Reed Solomon code for preparing to embedding process. The locations of embedding are randomly selected according to pseudorandom number sequence. The combination between the ciphering process and steganography gives the system high level of security. This idea makes unauthorized retrieval is difficult. The simulation results show that the stego image is visually similar to the original one and does not have any suspension about embedded image. The extracted secret image is similar to the original secret image. The results indicate that using one-level Haar wavelet transform increases the capacity of the secret image that can be embedded. Hence, the steganographic goals are achieved in these systems. The proposed systems are simulated using MATLAB® software package.
 R. Gupta and T. P. Singh. New proposed practice for secure image combing cryptography stegnography and watermarking based on various parameters. Proceeding of the International Conference Contemporary Computing and Informatics, (2014), Nov. 27-29; United States
 B. Mehboob and R. A. Faruqui. A stegnography implementation. International Symposium on Biometrics and Security Technologies, (2008) April 23-24; Islamabad, Pakistan
 V. Ashok, T. Balakumaran, C. Gowrishankar, I. Vennila and A. N. kumar. The Fast Haar Wavelet Transform for Signal & Image Processing. International Journal of Computer Science and Information Security. 7, 1 (2010)
 I. MÃ¡rquez-corbella and J. Tillich. Using Reed-Solomon codes in the ( U | U + V ) construction and an application to cryptography. IEEE International Symposium on Information Theory, (2016) July 10-15; Barcelona, Spain
 C. Lai and C. Tsai, Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition. IEEE Transactions on Instrumentation and Measurement. 59, 11 (2010)
 MIT-DB, The MIT-BIH Arrhythmia database - third edition. Massachusetts institute of technology, United States (1997)
 A. Nag, S. Biswas, D. Sarkar and P. P. Sarkar, A novel technique for image steganography based on Block-DCT and Huffman Encoding. International Journal of Computer Science and Information Technology. 2, 3 (2010)
 S. K. Bandyopadhyay and I. K. Maitra, An Alternative Approach of Steganography using Reference Image. International Journal of Advancements in Technology. 1, 1 (2010)
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).