Abstract
In the current period, because of the far reaching accessibility of the Internet, it is incredibly simple for individuals to convey and share interactive media substance with one another. Nonetheless, simultaneously, secure exchange of individual and protected material has turned into a basic issue. Thusly, secure method for information move are the most dire need of the time. Steganography is the science and specialty of shielding the restricted information from an unapproved access. The steganographic approaches hide restricted information into a cover record of type sound, video, text or potentially image. The genuine test in steganography is to accomplish high strength and limit without dealing on the subtlety of the cover document. In this article, a proficient steganography strategy is proposed for the exchange of privileged information in computerized images utilizing number hypothesis. For this reason, the proposed technique addresses the cover image utilizing the Fibonacci grouping. The portrayal of an image in the Fibonacci succession permits expanding the bit planes from 8-bit to 12-bit planes. The test aftereffects of the proposed strategy in examination with other existing steganographic strategies display that our technique accomplishes high installing of privileged information as well as gives top caliber of stego images as far as pinnacle signal-to-clamor proportion (PSNR). Besides, the power of the technique is likewise assessed within the sight of salt and pepper clamor assault on the cover images.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
O. Mayer, M.C. Stamm, Forensic similarity for digital images. IEEE Trans. Inf. For. Secur. 15(1), 1331–1346, 3456 (2017)
J. Fridrich, M. Goljan, R. Du, Invertible authentication, in Proceedings of SPIE Secur Watermarking Multimedia Contents III, vol. 4314, 2001, pp. 197–208
J. Fridrich, M. Goljan, R. Du, Lossless data embedding New paradigm in digital watermarking. EURASIP J. Adv. Signal Process. 2002 (2002)
M.U. Celik, G. Sharma, A.M. Tekalp, E. Saber, Lossless generalized-LSB data embedding. IEEE Trans. Image Process 14(2), 253–266 (2005)
J. Tian, Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003). Show in Context View Article Full Text PDF (544KB) Google Scholar
J. Tian, Wavelet-based reversible watermarking for authentication, in Proceedings of SPIE Secur Watermarking Multimedia Contents IV, vol. 4675, 2002, pp. 679–690
F. Matern, C. Riess, M. Stamminger, Gradient-based illumination description for image forgery detection. IEEE Trans. Inf. For. Secur. IEEE 2341, 1303–1317 (2020)
S. Ryu, et al., Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans. Inf. For. Secur. 762, 1355–1370 (2018)
S. Joshi, S. Member, N. Khanna, Single classifier-based passive system for source printer classification using local texture features. IEEE Trans. Inf. For. Secur. 4217, 1603–1614 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Padhan, G., Ranjita, R. (2022). High Security Object Integrity and Manipulation of Conceal Information by Hiding Partition Technique. In: Patnaik, S., Kountchev, R., Jain, V. (eds) Smart and Sustainable Technologies: Rural and Tribal Development Using IoT and Cloud Computing. Advances in Sustainability Science and Technology. Springer, Singapore. https://doi.org/10.1007/978-981-19-2277-0_5
Download citation
DOI: https://doi.org/10.1007/978-981-19-2277-0_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-2276-3
Online ISBN: 978-981-19-2277-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)