Open Access Open Access  Restricted Access Subscription or Fee Access

Data Hiding in Color Images Using Huffman Coding and Histogram Modification

Moad Y. Mowafi(1*), Faruq A. Al-Omari(2), Dima S. Kasasbeh(3)

(1) Jordan University of Science and Technology, Jordan
(2) Yarmouk University, Jordan
(3) Jordan University of Science and Technology, Jordan
(*) Corresponding author


DOI: https://doi.org/10.15866/irecap.v9i1.15668

Abstract


Data hiding in digital images provides a secure communication medium by embedding the payload in a cover image without compromising the image quality. In this work, a secure and high-capacity data hiding scheme is proposed using efficient compression, encryption, and steganography techniques. Dictionary-based coding along with Huffman coding is used to compress the secret data and hence increase the embedding capacity. Two encrypted keys are generated to control the data decompression and hence improve the level of security. In addition, a block-based histogram modification technique is applied to embed the compressed data into the chrominance components of the cover image to minimize the image distortion. The results indicate that the proposed scheme achieves high embedding capacity without degrading the quality of the cover image.
Copyright © 2019 Praise Worthy Prize - All rights reserved.

Keywords


Data Hiding; Histogram Modification; Huffman Coding; Steganography; Cryptography

Full Text:

PDF


References


Vitekar, A., Kota, P., A Survey on Evolution in Information Security, (2017) International Journal on Communications Antenna and Propagation (IRECAP), 7 (6), pp. 502-508.
https://doi.org/10.15866/irecap.v7i6.13347

Sahu, A., Swain, G., Information Hiding Using Group of Bits Substitution, (2017) International Journal on Communications Antenna and Propagation (IRECAP), 7 (2), pp. 162-167.
https://doi.org/10.15866/irecap.v7i2.11675

M. Hussain, A. W. A. Wahab, Y. I. B. Idris, A. T. Ho, K. H. Jung, Image steganography in spatial domain: a survey, Signal Process. Image Commun., Volume 65, 2018, Pages 46-66.
https://doi.org/10.1016/j.image.2018.03.012

M. E. Saleh, A. A. Aly, F. A. Omara, Data security using cryptography and steganography techniques, Int. J. Adv. Comput. Sci. Appl., Volume 7, (Issue 6), 2016, Pages 390-397.
http://dx.doi.org/10.14569/IJACSA.2016.070651

P. Li, K. Lo, A content-adaptive joint image compression and encryption scheme, IEEE Trans. Multimed., Volume 20, (Issue 8), August 2018, Pages 1960-1972.
https://doi.org/10.1109/tmm.2017.2786860

Saraireh, S., Saraireh, M., Filter Bank Block Cipher and LSB Based Steganography for Secure Data Exchange, (2017) International Journal on Communications Antenna and Propagation (IRECAP), 7 (1), pp. 1-7.
https://doi.org/10.15866/irecap.v7i1.11118

D. K. Sarmah, N. Bajpai, A new horizon in data security by cryptography & steganography, Int. J. Comput. Sci. Inf. Technol., Volume 1, (Issue 4), 2010, Pages 212-220.

P. V. Suryakant, R. S. Bhosale, A. R. Panhalkar, A novel security scheme for secret data using cryptography and steganography, Int. J. Comput. Netw. Inf. Secur., Volume 4, (Issue 2), March 2012, Pages 36-42.
https://doi.org/10.5815/ijcnis.2012.02.06

B. R. Rao, P. A. Kumar, K. R. M. Rao, M. Nagu, A novel information security scheme using cryptic steganography, Indian J. Comput. Sci. Eng., Volume 1, (Issue 4), March 2010, Pages 327-332.

S. Narayana, G. Prasad, Two new approaches for secured image steganography using cryptographic techniques and type conversions, Signal Imaging Process. Int. J., Volume 1, (Issue 2), December 2010, Pages 60-73.
https://doi.org/10.5121/sipij.2010.1206

V. Verma, O. Trapti, Enhancing the security and quality of image steganography using a novel hybrid technique, International Conference on Smart Trends for Information Technology and Computer Communications, pp. 668-673, Singapore, August 2016.
https://doi.org/10.1007/978-981-10-3433-6_80

N. Tayal, R. Bansal, S. Dhal, S. Gupta, A novel hybrid security mechanism for data communication networks, Multimed. Tools Appl., Volume 76, (Issue 22), November 2017, Pages 24063-24090.
https://doi.org/10.1007/s11042-016-4111-x

Y. Shi, X. Li, X. Zhang, H. Wu, B. Ma, Reversible data hiding: advances in the past two decades, IEEE Access, Volume 4, 2016, Pages 3210-3237.
https://doi.org/10.1109/access.2016.2573308

Z. Ni, Y. Q. Shi, N. Ansari, W. Su, Reversible data hiding, IEEE Trans. Circuits Syst. Video Technol., Volume 6, (Issue 3), March 2006, Pages 354-362.
https://doi.org/10.1109/tcsvt.2006.869964

M. Fallahpour, M. H. Sedaaghi, High capacity lossless data hiding based on histogram modification, IEICE Electron. Express, Volume 4, (Issue 7), April 2007, Pages 205-210.
https://doi.org/10.1587/elex.4.205

F. A. Al-Omari, O. D. Al-Khaleel, G. A. Rayyashi, S. H. Ghwanmeh, An innovative information hiding technique utilizing cumulative peak histogram regions, J. Syst. Inf. Technol., Volume 14, (Issue 3), August 2012, Pages 246-263.
https://doi.org/10.1108/13287261211255356

H. W. Tseng, W. B. Ding, Reversible data hiding scheme for colour images based on pixel clustering and histogram shifting, Imaging Sci. J., Volume 60, (Issue 1), February 2012, Pages 47-53.
https://doi.org/10.1179/1743131x11y.0000000009

S. Gupta, A. Handa, P. Sandhu, Implementing adaptive steganography by exploring the YCbCr color model characteristics, World Acad. Sci. Eng. Technol., Volume 4, (Issue 10), 2010, Pages 1530-1533.

Y. C. Chou, C. C. Chang, K. M. Li, A large payload data embedding technique for color images, Fundam. Inform., Volume 88, (Issue 1-2), January 2008, Pages 47-61.

M. Mowafi, D. Kasasbeh, F. Al-Omari, A data compression scheme using adaptive word-based pattern matching, 8th International Conference on Information, Intelligence, Systems, and Applications, Larnaca, Cyprus, August 2017.
https://doi.org/10.1109/iisa.2017.8316446

I. Goel, S. Agarwal, R. Prasad, A linear representation of Huffman tree, International MultiConference of Engineers and Computer Scientists, pp. 317-319, Hong Kong, March 2012.

Kim, Y., Lee, S., Park, T., High-Speed Video Data Encryption on LTE-Based Swarm UAS, (2018) International Review of Aerospace Engineering (IREASE), 11 (5), pp. 186-193.
https://doi.org/10.15866/irease.v11i5.15180


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2021 Praise Worthy Prize