SECURE INFORMATION TRANSMISSION BY EMBEDDING COMPRESSED TEXT DATA IN AN IMAGE

Authors

  • Harshith K Raj Dept. of CSE, JSS Academy of Technical Education, Bengaluru, India. Author

Keywords:

DWT, LSB, Embedding, Extracting, Steganography

Abstract

The transmission of patient medical information over the internet poses significant challenges due to the risk of unauthorized access by hackers who may illicitly get the data. This work proposes embedding compressed text data using DWT for safe information transport. The brain image of a patient is analyzed, and the patient details are integrated into the brain image utilizing the Least Significant Bit (LSB) approach. The patient's textual information is immediately incorporated into the brain imaging utilizing the Least Significant Bit (LSB) approach. The Discrete Wavelet Transform (DWT) is utilized to compress the patient's textual information, subsequently embedding it into the patient's brain image to produce a stego image of the brain. The performance characteristics of the embedding procedure utilizing DWT and those that do not utilize DWT are compared. The results obtained with DWT are much superior.

References

I. Shukla, A. Joshi and S. Girme, "LSB Steganography Mechanism to Hide Texts Within Images Backed with Layers of Encryption," IEEE 16th International Conference on Security of Information and Networks (SIN), Jaipur, India, 2023, pp. 1-6, doi: 10.1109/SIN60469.2023.10474976.

F. M. A. Albkosh, A. S. S. Mohamed, A. A. Albakoush and A. A. Albkush, "An Enhanced Method to Secure the High Embedding Capacity Steganography Based on LSB Indicator," IEEE 4th International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering (MI-STA), Tripoli, Libya, pp. 494-499, 2024, doi: 10.1109/MI-STA61267.2024.10599765.

F. A. Rafrastara, R. Prahasiwi, D. R. Ignatius Moses Setiadi, E. H. Rachmawanto and C. A. Sari, "Image Steganography using Inverted LSB based on 2nd, 3rd and 4th LSB pattern," IEEE International Conference on Information and Communications Technology (ICOIACT), Yogyakarta, Indonesia, pp. 179-184, 2019, doi: 10.1109/ICOIACT46704.2019.8938503.

B. Ramapriya and Y. Kalpana, "A Framework for Medical Image Steganography with Modified LSB and Hamming Code," IEEE Fourth International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), Bhilai, India, pp. 1-7, 2024, doi: 10.1109/ICAECT60202.2024.10468898.

S. Banerjee, S. Datta, D. Ghosh and S. Jana, "A Secure Text Steganography using Randomized Mathematical Functions and LSB," IEEE 7th International Conference on Electronics, Materials Engineering & Nano-Technology (IEMENTech), Kolkata, India, pp. 1-5, 2023, doi: 10.1109/IEMENTech60402.2023.10423560.

J. Hu, "Image Steganography based on improved LSB algorithm," IEEE 39th Youth Academic Annual Conference of Chinese Association of Automation (YAC), Dalian, China, pp. 1673-1677, 2024, doi: 10.1109/YAC63405.2024.10598763

K. Ghazanfari, S. Ghaemmaghami and S. R. Khosravi, "LSB++: An improvement to LSB+ steganography," IEEE-TENCON Conference, Bali, Indonesia, pp. 364-368, 2011, doi: 10.1109/TENCON.2011.6129126.

K. Thangadurai and G. Sudha Devi, "An analysis of LSB-based image steganography techniques," IEEE International Conference on Computer Communication and Informatics, Coimbatore, India, pp. 1-4, 2014, doi: 10.1109/ICCCI.2014.6921751.

Priyadharshini A, Umamaheswari R, Jayapandian N, and Priyananci S, "Securing Medical Images using Encryption and LSB Steganography," IEEE International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), Bhilai, India, 2021, pp. 1-5, doi: 10.1109/ICAECT49130.2021.9392396.

Pooranakala K, and Vanita Jaitly, "Securing Medical Images using Compression Techniques with Encryption and Image Steganography," IEEE 3rd International Conference on Intelligent Technologies (CONIT), Hubli, India, 2023, pp. 1-7, doi: 10.1109/CONIT59222.2023.10205855.

B. Wallace, D. M. Feinauer, J. M. Alghazo, and S. E. Abdelhamid, "Steganography Applications - Encoding Medical Records Within Medical Images," IEEE Southeast Con Atlanta, GA, USA, pp. 972-976, 2024, doi: 10.1109/SoutheastCon52093.2024.10500050.

Akansu, Ali N, Smith, Mark J. T. (31 October 1995). Subband and Wavelet Transforms: Design and Applications. Kluwer Academic Publishers. ISBN 0792396456.

A.N. Akansu, P. Duhamel, X. Lin, and M. de Courville, “Orthogonal Transmultiplexers in Communication: A Review,” IEEE Transactions on Signal Processing, Special Issue on Theory and Applications of Filter Banks and Wavelets. Vol. 46, No.4, pp. 979–995, April, 1998.

https://www.britannica.com/science/mean-squared-error

H S Majunatha Reddy and K B Raja, “High Capacity and Security Steganography using Discrete Wavelet Transform,” International Journal of Computer Science and Security (IJCSS), Vol. 3, Issue. 6, pp. 462-472, 2009.

https://www.nature.com/articles/s41598-022-05572-6.

Downloads

Published

2024-11-27

How to Cite

Harshith K Raj. (2024). SECURE INFORMATION TRANSMISSION BY EMBEDDING COMPRESSED TEXT DATA IN AN IMAGE. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND TECHNOLOGY (IJCET), 15(6), 732-750. https://mylib.in/index.php/IJCET/article/view/IJCET_15_06_061