A novel and dependable image steganography model for strengthening the security of cloud storage

Mostafa Ahmad, Ahmed Ghoneim, Saleh Alshomrani, Ahmed Samak, Nader Omar, Fahad Algarni

Research output: Contribution to journalJournal articlepeer-review

Abstract

Image steganography provides efficient techniques and methods for embedding secure data into an image. Researchers face many challenges in this field such as: ensuring the quality of the stego image is adequate, ensuring the hidden message is secure, increasing the hiding capacity, recovering the hidden message and the cover image losslessy, and overcoming the effects of lossy image compression on the hidden message. In this paper, we address the above challenges by proposing a new image steganography model to ensure the security of data in cloud storage. The fundamental processes within the base level of the proposed model are to preprocess both the cover image and the secret message. The cover image is transformed to the wavelet domain using integer-to-integer transform while the secret message is compressed using lossless entropy coding and then it is encrypted for additional security before embedding. The control level of the model drives the steganography process as follows. Firstly, it selects significant coefficients from the transformed cover image according to some threshold values. Then, it creates groups of 7-bits and 3-bits from non-lossy bits of selected significant coefficients and the encrypted bit stream of the secret message, respectively. Finally, the non-lossy bits in the selected significant coefficients are updated by injecting the secret bits. Through the process of steganography, the consistency between the payload of the secret message and the number of selected significant coefficients is checked. The model is validated and verified using extensive real experiments. Moreover, the performance of the proposed model is measured by comparison with other recent models.

Original languageEnglish
Pages (from-to)2789-2799
Number of pages11
JournalJournal of Intelligent and Fuzzy Systems
Volume38
Issue number3
DOIs
StatePublished - 2020

Keywords

  • data hiding image steganography
  • embedded zero-tree wavelet (EZW)
  • Integer wavelet transform (IWT)
  • stego-image quality

Fingerprint

Dive into the research topics of 'A novel and dependable image steganography model for strengthening the security of cloud storage'. Together they form a unique fingerprint.

Cite this