What is it about?

Steganography is the practice of covertly concealing sensitive information. In this paper, an innovative evidence method based on ASCII pattern matching and image data encryption is proposed. The American Standard Code of Encoding And decoding (ASCII) code elements are first read from the cover digital image as numerical, and the ASCII code locations are then saved in a database table. Similar to this, the encrypted image is converted to numerical and then checked to determine the placements of the characters. Before the hidden information was conveyed, constraint and encryption were also performed to the individual values. The main benefit is that neither the scale factor nor neither quantity of said pixels will alter; just the locations of the cryptic data will just be noted. Additionally, a number of field tests have been conducted to show the effectiveness and performance of the presented method and to assess it using the metrics that are most commonly used: Mean Square error Error (MSE), Peak Signal to Noise Ratio (PSNR), and Hiding Capacity (HC). Structured Similarity Index Measure (SSIM) and Histogram study have been carried out in terms of security. The presented approach is compared to more similar works. The efficiency of the presented strategy was confirmed by the experimental findings.

Featured Image

Why is it important?

The encrypted image is converted to numerical and then checked to determine the placements of the characters. Before the hidden information was conveyed, constraint and encryption were also performed to the individual values. The main benefit is that neither the scale factor nor neither quantity of said pixels will alter; just the locations of the cryptic data will just be noted.

Perspectives

Structured Similarity Index Measure (SSIM) and Histogram study have been carried out in terms of security. The presented approach is compared to more similar works. The efficiency of the presented strategy was confirmed by the experimental findings.

Vaseem Akram Shaik

Read the Original

This page is a summary of: Stegnograpghy Based Image Hiding Using Security Application, October 2022, Institute of Electrical & Electronics Engineers (IEEE),
DOI: 10.1109/mysurucon55714.2022.9972527.
You can read the full text:

Read

Contributors

The following have contributed to this page