20
Views
3
CrossRef citations to date
0
Altmetric
Articles

Secure data hiding scheme using firefly algorithm with hidden compression

&
 

Abstract

The goal of proposed procedure is to make a protected information concealing framework to shroud the incognito information by finding the intense area in the spread picture to such an extent that the created stego picture is unrivaled, furnish high security with a less significant memory use, less computational impulsiveness, high visual feature and can achieve great execution. In RDH the spread picture will be recovered in the wake of removing the secrecy information which was inserted in that picture. This paper shows another method in reversible information concealing strategy dependent on Firefly calculation (FA). The most ideal area to cover up the hidden information that will be established by firefly calculation. The firefly calculation results in the salt and pepper commotion. Picture de-noising consists of the control of the picture data to build an outwardly astounding picture. 2D respective channel is utilized to channel the picture after shrouded the mystery data. In this framework, a hearty computerized shading picture watermarking strategy utilizing Discrete Wavelet Transform(DWT) is projected. DWT is used for implanting the mystery information into spread picture and after that IDWT is connected to recuperate unique picture. Invert procedure is connected for extraction of discharge information. The experimental results demonstrates that proposed strategy accomplished enhanced MSE and higher PSNR. This make the proposed technique increasingly compelling and secure for concealing information.

Subject Classification:

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.