FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks

dc.AffiliationOctober University for modern sciences and Arts (MSA)
dc.contributor.authorEl-Bendary, Mohsen A. M
dc.date.accessioned2019-12-01T15:33:45Z
dc.date.available2019-12-01T15:33:45Z
dc.date.issued2017-12
dc.descriptionAccession Number: WOS:000417633500043en_US
dc.description.abstractIn this research paper, robust and reliable encrypted steganography technique with the error control schemes is presented. It also, investigates the performance of this technique with existing different noises and attacks. The paper presents a powerful security algorithm through merging between the data hiding and encryption techniques. This security merging technique aims to improve and strengthen the image security through its transmission over a wireless channel. Error performance of the presented security algorithm is considered also, and the different error control schemes are utilized to encode the transmitted packets. The steganography conceals the data existence within a cover medium, while the encryption hides the data meaning by using specific algorithms. The chaos based encryption algorithms are considered efficient and secured image encryption algorithms. In this research work a confidential image is embedded into a cover image using the data hiding Least Significant Bit (LSB) Steganography technique and then the stego image is encrypted using two dimensional chaotic map encryption tool. The Logistic map and Chaotic Baker map encryption techniques are utilized for this purpose to produce a multi-level high secure algorithm for sensitive secret image transmission. The computer simulation experiments reveal that the chaotic Baker scenario resist the noise and attacks more than another scenario. The Median filter is utilized to enhance the extracted message quality in existence the Pepper-Salt noise. The encrypted stego signal performance is evaluated over the AWGN channel and different attacks. To improve the extraction of Logistic steganography, the FEC is employed for this purpose and to decrease the required SNR which permits the successfully embedded image extraction. These different error control techniques are utilized to improve the presented algorithm reliability over the wireless channels. There are several metrics are used to measure the extracted images quality such as the correlation coefficient, mean square error, and peak signal to noise ratio. Also, the number of lost packet is used as data loss attack and to evaluate the wireless link efficiency. Different image analyses and comparisons are verified to examine the suitability of proposed algorithms for securing a high sensitive image data through its transmission over wireless channel at different noise levels.en_US
dc.identifier.doihttps://doi.org/10.1007/s11042-016-4177-5
dc.identifier.issn1380-7501
dc.identifier.otherhttps://doi.org/10.1007/s11042-016-4177-5
dc.identifier.urihttps://link.springer.com/article/10.1007/s11042-016-4177-5
dc.language.isoen_USen_US
dc.publisherSpringeren_US
dc.relation.ispartofseriesMULTIMEDIA TOOLS AND APPLICATIONS;Volume: 76 Issue: 24 Pages: 26463-26501
dc.relation.urihttps://cutt.ly/le20eNj
dc.subjectUniversity for Metricsen_US
dc.subjectImage encryptionen_US
dc.subjectEncrypted LSB steganographyen_US
dc.subjectMedian filteren_US
dc.subjectChannel codingen_US
dc.subjectFiltering attacksen_US
dc.titleFEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacksen_US
dc.typeArticleen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
avatar_scholar_256.png
Size:
6.31 KB
Format:
Portable Network Graphics
Description: