Loading…

Data hiding steganography model based on hyper chaos 2D compressive sensing inhabited with manchester encoder/decoder using circular queue exploiting modification direction

Reversible data hiding (RDH) based on Steganography is considered as one of the future related aspects in the field of security for the information hiding paradigm. Existing research work has been carried out based on secure data transmission as well as reducing the dataloss from one user to other u...

Full description

Saved in:
Bibliographic Details
Published in:Journal of intelligent & fuzzy systems 2023-06, Vol.44 (6), p.10357-10367
Main Authors: Upendra Raju, K., Amutha Prabha, N.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Reversible data hiding (RDH) based on Steganography is considered as one of the future related aspects in the field of security for the information hiding paradigm. Existing research work has been carried out based on secure data transmission as well as reducing the dataloss from one user to other users. But due to encryption data expansion over non-linear transformation, complexity in attacking caused due to keyspace, ineffective image compression, poor embedding ratio, poor quality, overflow/underflow problems, data loss etc., leads to inefficient data transmission causing a security risk. This paper proposes a novel method named Triple Secured Data Hiding Steganography Model which provides solutions to the above challenges. This work is initiated with Hyper Chaos 2D Compressive Sensing that performs image compression and encryption simultaneously. It provides control over low dimension chaos system bearing secure risks with suffering from data encrypted expansion while adopt non-linear transformation. In addition to reduce the error rate and providing signal synchronization as well as system reliability over the transmission channel, Manchester Encoder/Decoder is initiated. To cope up with data embedding and extraction our work has proposed Circular Queue Exploiting Modification Direction(CQEMD). Thus, overall proposed model enhances effective secure data transmission under RDH by inhabiting a triple secured system.
ISSN:1064-1246
1875-8967
DOI:10.3233/JIFS-223131