84
Views
1
CrossRef citations to date
0
Altmetric
Communications

Covert and Secure Communication Using Multiple Invisible Stego Images by Split-Logical Algorithm

ORCID Icon & ORCID Icon
 

Abstract

The use of the web is developing for surreptitious and non-surreptitious communication with the expansion of brilliant innovations. In this circumstance, there is a need to improve the security level of the covert information. Our motive is to propose a unique algorithm by using steganography along with cryptography which provides a better solution for secret communication and improves security with more levels. In this paper, the two-level stationary wavelet transform technique is applied to cover image to acquire HH2 sub-band alongside the remaining sub-bands. The data are implanted into the HH2 sub-band of the cover image by utilizing the random pixel embedded strategy to accomplish the stego image. To improve the security of the stego image, the surreptitious text data are changed into cipher form with a novel cryptography algorithm that incorporates unique data conversion and gray-code techniques. The resultant stego image undergoes to split-logical algorithm to create numerous imperceptible stego images. The main purpose of imperceptible stego images is to provide better security to covert information and also it increases the payload capacity. The concept of generating imperceptible stego images is, each of them will be treated as a stego image for hackers. But original stego image is reconstructed by combining all generated imperceptible stego images. These imperceptible stego images are ready to oppose the diverse steganalysis assaults like visual, noise, rotational assaults, and so forth.

Additional information

Notes on contributors

Lingamallu Naga Srinivasu

Lingamallu Naga Srinivasu completed B.Tech from JNTUK in 2013, India. He obtained PG from JNTUK in 2015. He is currently pursuing PhD at VFSTR University, Guntur, India. His research domains of interest are image processing and signal processing. Corresponding author. Email: [email protected]

Vijayaraghavan Veeramani

V Vijayaraghavan received the BE degree in electronics and communication engineering from Odaiyappa College of Engineering and Technology, India, in 2003, and the ME in computer science engineering from Anna University, Tiruchirappalli, India, in 2010. He completed PhD from Anna University, Chennai, India, in 2019. His research areas include embedded systems, network security, deep learning, internet of things, and image processing. Email: [email protected]

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.