FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks
dc.Affiliation | October University for modern sciences and Arts (MSA) | |
dc.contributor.author | El-Bendary, Mohsen A. M | |
dc.date.accessioned | 2019-12-01T15:33:45Z | |
dc.date.available | 2019-12-01T15:33:45Z | |
dc.date.issued | 2017-12 | |
dc.description | Accession Number: WOS:000417633500043 | en_US |
dc.description.abstract | In this research paper, robust and reliable encrypted steganography technique with the error control schemes is presented. It also, investigates the performance of this technique with existing different noises and attacks. The paper presents a powerful security algorithm through merging between the data hiding and encryption techniques. This security merging technique aims to improve and strengthen the image security through its transmission over a wireless channel. Error performance of the presented security algorithm is considered also, and the different error control schemes are utilized to encode the transmitted packets. The steganography conceals the data existence within a cover medium, while the encryption hides the data meaning by using specific algorithms. The chaos based encryption algorithms are considered efficient and secured image encryption algorithms. In this research work a confidential image is embedded into a cover image using the data hiding Least Significant Bit (LSB) Steganography technique and then the stego image is encrypted using two dimensional chaotic map encryption tool. The Logistic map and Chaotic Baker map encryption techniques are utilized for this purpose to produce a multi-level high secure algorithm for sensitive secret image transmission. The computer simulation experiments reveal that the chaotic Baker scenario resist the noise and attacks more than another scenario. The Median filter is utilized to enhance the extracted message quality in existence the Pepper-Salt noise. The encrypted stego signal performance is evaluated over the AWGN channel and different attacks. To improve the extraction of Logistic steganography, the FEC is employed for this purpose and to decrease the required SNR which permits the successfully embedded image extraction. These different error control techniques are utilized to improve the presented algorithm reliability over the wireless channels. There are several metrics are used to measure the extracted images quality such as the correlation coefficient, mean square error, and peak signal to noise ratio. Also, the number of lost packet is used as data loss attack and to evaluate the wireless link efficiency. Different image analyses and comparisons are verified to examine the suitability of proposed algorithms for securing a high sensitive image data through its transmission over wireless channel at different noise levels. | en_US |
dc.identifier.doi | https://doi.org/10.1007/s11042-016-4177-5 | |
dc.identifier.issn | 1380-7501 | |
dc.identifier.other | https://doi.org/10.1007/s11042-016-4177-5 | |
dc.identifier.uri | https://link.springer.com/article/10.1007/s11042-016-4177-5 | |
dc.language.iso | en_US | en_US |
dc.publisher | Springer | en_US |
dc.relation.ispartofseries | MULTIMEDIA TOOLS AND APPLICATIONS;Volume: 76 Issue: 24 Pages: 26463-26501 | |
dc.relation.uri | https://cutt.ly/le20eNj | |
dc.subject | University for Metrics | en_US |
dc.subject | Image encryption | en_US |
dc.subject | Encrypted LSB steganography | en_US |
dc.subject | Median filter | en_US |
dc.subject | Channel coding | en_US |
dc.subject | Filtering attacks | en_US |
dc.title | FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks | en_US |
dc.type | Article | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- avatar_scholar_256.png
- Size:
- 6.31 KB
- Format:
- Portable Network Graphics
- Description: