Review - An Evaluation Review of Steganography Using a Hybrid Method Technique of Quad Chain Code and Discrete Shearlet Transform

Abstract

Because of the great development taking place in the field of information transfer, media, and the Internet, which has become an essential thing in daily life, it has become necessary to provide ways to protect this information and data while transferring it from one place to another. One of the most important ways to provide this protection is to hide confidential information from unwanted people using steganography, which is a science / art to hide confidential information in a way that makes the attacker believe that the message does not exist at all, by hiding it inside a digital medium (image, audio, video) so that it is difficult to detect. In this review, a new method was proposed to hide confidential data using quad chain code (QCC) that detects the edges of the object in the image so that the secret data is hidden in these edges by using one of the well-known hiding techniques such as the LSB and then using the shearlet transformation to convert the medium that contains the secret message from one domain to another domain in order to complicate the process of retrieval and disclosure of the secret message to the attacker.

Country : Iraq

1 Maha Monther Mohamed Fathel2 Ahmed Sami Nori

  1. Computer Science Department, College of Computer and Mathematics & Mosul University, Iraq
  2. Cyber Security Department, College of Computer and Mathematics &, Mosul University, Iraq

IRJIET, Volume 7, Issue 4, April 2023 pp. 1-6

doi.org/10.47001/IRJIET/2023.704001

References

  1. Patidar, S., S. Khan, and S. Singh. Security for Digital Image and Text Message with Steganography and Watermarking Technique. In 2019 International Conference on Smart Systems and Inventive Technology (ICSSIT). 2019. IEEE.
  2. Indra, D., Recognition of Bisindo alphabets based on chain code contour and similarity of Euclidean distance. International Journal on Advanced Science Engineering and Information Technology, 2017. 7(5).
  3. Kutyniok, G. and D. Labate, Introduction to shearlets. Shearlets: Multiscale analysis for multivariate data, 2012: p. 1-38.
  4. Lydia, E.L., et al., Application of discrete transforms with selective coefficients for blind image watermarking. Transactions on Emerging Telecommunications Technologies, 2021. 32(2): p. e3771.
  5. Hamza, Y.A., N.E. Tewfiq, and M.Q. Ahmed, An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing. Baghdad Science Journal, 2022. 19(1): p. 0197-0197.
  6. Ansari, A.S., M.S. Mohammadi, and M.T. Parvez, A comparative study of recent steganography techniques for multiple image formats. International Journal of Computer Network and Information Security, 2019. 11(1): p. 11-25.
  7. Sahu, A.K. and M. Sahu, Digital image steganography and steganalysis: A journey of the past three decades. Open Computer Science, 2020. 10(1): p. 296-342.
  8. Limkar, S., et al. Improved data hiding technique based on audio and video steganography. In Smart Computing and Informatics: Proceedings of the First International Conference on SCI 2016, Volume 2. 2018. Springer.
  9. Brinda, T. and D. Dharma, Enhancing the compression performance in medical images using a novel hex-directional chain code (Hex DCC) representation. Soft Computing, 2021. 25: p. 5807-5830.
  10. Jusoh, N.A. and J.M. Zain, Application of freeman chain codes: An alternative recognition technique for Malaysian car plates. arXiv preprint arXiv:1101.1602, 2011.
  11. Al-Assadi, T.A.A., Locational Image Compression based on Chain Code Representation. 2014.
  12. Sheth, R., et al. Handwritten character recognition system using chain code and correlation coefficient. In International Conference on Recent Trends in Information Technology and Computer Science (IRCTITCS) 2011 Proceedings published in International Journal of Computer Applications (IJCA). 2011. Citeseer.
  13. Žalik, B., et al., Lossless chain code compression with an improved Binary Adaptive Sequential Coding of zero-runs. Journal of Visual Communication and Image Representation, 2021. 75: p. 103050.
  14. KADHEM, A.K.A.K.A., Determine Blocks of Image for Hiding Operation Based on Quad Chain Code and DCT.
  15. Ahmaderaghi, B., et al., Blind image watermark detection algorithm based on discrete shearlet transform using statistical decision theory. IEEE Transactions on Computational Imaging, 2018. 4(1): p. 46-59.
  16. Al-Assadi, T.A.A., A New Steganography Method for Hiding Message in Image Based on Quad Chain Code and DCT. 2016.
  17. Jian, Z., et al., Image watermark based on extended shearlet and insertion using the largest information entropy on horizontal cone. Mathematical Problems in Engineering, 2015. 2015.
  18. Al-Husainy, M.A.F. and D.M. Uliyan, A secret-key image steganography technique using random chain codes. International Journal of Technology, 2019. 10(4): p. 731-740.
  19. Kushwahah, D., et al. Text Message and Digital Image Secure for Discrete Shearlet Transform. In 2020 International Conference on Emerging Trends in Communication, Control and Computing (ICONC3). 2020. IEEE.