Skip to main content

High Security Object Integrity and Manipulation of Conceal Information by Hiding Partition Technique

  • Conference paper
  • First Online:
Smart and Sustainable Technologies: Rural and Tribal Development Using IoT and Cloud Computing

Part of the book series: Advances in Sustainability Science and Technology ((ASST))

  • 226 Accesses

Abstract

In the current period, because of the far reaching accessibility of the Internet, it is incredibly simple for individuals to convey and share interactive media substance with one another. Nonetheless, simultaneously, secure exchange of individual and protected material has turned into a basic issue. Thusly, secure method for information move are the most dire need of the time. Steganography is the science and specialty of shielding the restricted information from an unapproved access. The steganographic approaches hide restricted information into a cover record of type sound, video, text or potentially image. The genuine test in steganography is to accomplish high strength and limit without dealing on the subtlety of the cover document. In this article, a proficient steganography strategy is proposed for the exchange of privileged information in computerized images utilizing number hypothesis. For this reason, the proposed technique addresses the cover image utilizing the Fibonacci grouping. The portrayal of an image in the Fibonacci succession permits expanding the bit planes from 8-bit to 12-bit planes. The test aftereffects of the proposed strategy in examination with other existing steganographic strategies display that our technique accomplishes high installing of privileged information as well as gives top caliber of stego images as far as pinnacle signal-to-clamor proportion (PSNR). Besides, the power of the technique is likewise assessed within the sight of salt and pepper clamor assault on the cover images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. O. Mayer, M.C. Stamm, Forensic similarity for digital images. IEEE Trans. Inf. For. Secur. 15(1), 1331–1346, 3456 (2017)

    Google Scholar 

  2. J. Fridrich, M. Goljan, R. Du, Invertible authentication, in Proceedings of SPIE Secur Watermarking Multimedia Contents III, vol. 4314, 2001, pp. 197–208

    Google Scholar 

  3. J. Fridrich, M. Goljan, R. Du, Lossless data embedding New paradigm in digital watermarking. EURASIP J. Adv. Signal Process. 2002 (2002)

    Google Scholar 

  4. M.U. Celik, G. Sharma, A.M. Tekalp, E. Saber, Lossless generalized-LSB data embedding. IEEE Trans. Image Process 14(2), 253–266 (2005)

    Article  Google Scholar 

  5. J. Tian, Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003). Show in Context View Article Full Text PDF (544KB) Google Scholar

    Google Scholar 

  6. J. Tian, Wavelet-based reversible watermarking for authentication, in Proceedings of SPIE Secur Watermarking Multimedia Contents IV, vol. 4675, 2002, pp. 679–690

    Google Scholar 

  7. F. Matern, C. Riess, M. Stamminger, Gradient-based illumination description for image forgery detection. IEEE Trans. Inf. For. Secur. IEEE 2341, 1303–1317 (2020)

    Google Scholar 

  8. S. Ryu, et al., Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans. Inf. For. Secur. 762, 1355–1370 (2018)

    Google Scholar 

  9. S. Joshi, S. Member, N. Khanna, Single classifier-based passive system for source printer classification using local texture features. IEEE Trans. Inf. For. Secur. 4217, 1603–1614 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Girish Padhan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Padhan, G., Ranjita, R. (2022). High Security Object Integrity and Manipulation of Conceal Information by Hiding Partition Technique. In: Patnaik, S., Kountchev, R., Jain, V. (eds) Smart and Sustainable Technologies: Rural and Tribal Development Using IoT and Cloud Computing. Advances in Sustainability Science and Technology. Springer, Singapore. https://doi.org/10.1007/978-981-19-2277-0_5

Download citation

Publish with us

Policies and ethics