首页> 外文期刊>Multimedia Tools and Applications >FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks
【24h】

FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks

机译:FEC与基于加密图像隐写术的双重安全性方法合并,可在存在噪声和不同攻击的情况下实现不同目的

获取原文
获取原文并翻译 | 示例
       

摘要

In this research paper, robust and reliable encrypted steganography technique with the error control schemes is presented. It also, investigates the performance of this technique with existing different noises and attacks. The paper presents a powerful security algorithm through merging between the data hiding and encryption techniques. This security merging technique aims to improve and strengthen the image security through its transmission over a wireless channel. Error performance of the presented security algorithm is considered also, and the different error control schemes are utilized to encode the transmitted packets. The steganography conceals the data existence within a cover medium, while the encryption hides the data meaning by using specific algorithms. The chaos based encryption algorithms are considered efficient and secured image encryption algorithms. In this research work a confidential image is embedded into a cover image using the data hiding Least Significant Bit (LSB) Steganography technique and then the stego image is encrypted using two dimensional chaotic map encryption tool. The Logistic map and Chaotic Baker map encryption techniques are utilized for this purpose to produce a multi-level high secure algorithm for sensitive secret image transmission. The computer simulation experiments reveal that the chaotic Baker scenario resist the noise and attacks more than another scenario. The Median filter is utilized to enhance the extracted message quality in existence the Pepper-Salt noise. The encrypted stego signal performance is evaluated over the AWGN channel and different attacks. To improve the extraction of Logistic steganography, the FEC is employed for this purpose and to decrease the required SNR which permits the successfully embedded image extraction. These different error control techniques are utilized to improve the presented algorithm reliability over the wireless channels. There are several metrics are used to measure the extracted images quality such as the correlation coefficient, mean square error, and peak signal to noise ratio. Also, the number of lost packet is used as data loss attack and to evaluate the wireless link efficiency. Different image analyses and comparisons are verified to examine the suitability of proposed algorithms for securing a high sensitive image data through its transmission over wireless channel at different noise levels.
机译:本文提出了具有错误控制方案的鲁棒可靠的加密隐写技术。它还研究了存在不同噪声和攻击时该技术的性能。通过融合数据隐藏和加密技术,提出了一种强大的安全算法。该安全合并技术旨在通过其在无线信道上的传输来改善和增强图像安全性。还考虑了所提出的安全算法的差错性能,并且利用不同的差错控制方案对传输的分组进行编码。隐写术将数据隐藏在封面媒体中,而加密则通过使用特定算法隐藏数据含义。基于混沌的加密算法被认为是有效且安全的图像加密算法。在这项研究工作中,使用数据隐藏最低有效位(LSB)隐写技术将机密图像嵌入到封面图像中,然后使用二维混沌地图加密工具对隐密图像进行加密。 Logistic映射和Chaotic Baker映射加密技术用于此目的,以生成用于敏感秘密图像传输的多级高安全性算法。计算机仿真实验表明,混乱的Baker场景比其他场景更能抵抗噪声和攻击。在存在Pepper-Salt噪声的情况下,使用中值滤波器来提高提取的消息质量。通过AWGN信道和不同的攻击来评估加密的隐身信号的性能。为了改进Logistic隐写术的提取,为此使用了FEC,并降低了所需的SNR,从而可以成功地嵌入图像。利用这些不同的差错控制技术来改善所提出的算法在无线信道上的可靠性。有几种度量标准用于测量提取的图像质量,例如相关系数,均方误差和峰值信噪比。此外,丢失的数据包数量还用作数据丢失攻击并评估无线链路效率。验证了不同的图像分析和比较,以检查提出的算法的适用性,该算法可通过高噪声图像数据通过无线通道在不同噪声水平下的传输来确保其安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号