TY - JOUR
T1 - Image steganography for authenticity of visual contents in social networks
AU - Muhammad, Khan
AU - Ahmad, Jamil
AU - Rho, Seungmin
AU - Baik, Sung Wook
N1 - Publisher Copyright:
© 2017, Springer Science+Business Media New York.
PY - 2017/9/1
Y1 - 2017/9/1
N2 - Social networks are major sources of image sharing and secret messaging among the people. To date, such networks are not strictly bounded by copyright laws due to which image sharing, secret messaging, and its authentication is vulnerable to many risks. In addition to this, maintaining the confidentiality, integrity, and authenticity of secret messages is an open challenge of today’s communication systems. Steganography is one of the solutions to tackle these problems. This paper proposes a secure crystographic framework for authenticity of visual contents using image steganography, utilizing color model transformation, three-level encryption algorithm (TLEA), and Morton scanning (MS)-directed least significant bit (LSB) substitution. The method uses I-plane of the input image in HSI for secret data embedding using MS-directed LSB substitution method. Furthermore, the secret data is encrypted using TLEA prior to embedding, adding an additional level of security for secure authentication. The qualitative and quantitative results verify the better performance of the proposed scheme and provide one of the best mechanisms for authenticity of visual contents in social networks.
AB - Social networks are major sources of image sharing and secret messaging among the people. To date, such networks are not strictly bounded by copyright laws due to which image sharing, secret messaging, and its authentication is vulnerable to many risks. In addition to this, maintaining the confidentiality, integrity, and authenticity of secret messages is an open challenge of today’s communication systems. Steganography is one of the solutions to tackle these problems. This paper proposes a secure crystographic framework for authenticity of visual contents using image steganography, utilizing color model transformation, three-level encryption algorithm (TLEA), and Morton scanning (MS)-directed least significant bit (LSB) substitution. The method uses I-plane of the input image in HSI for secret data embedding using MS-directed LSB substitution method. Furthermore, the secret data is encrypted using TLEA prior to embedding, adding an additional level of security for secure authentication. The qualitative and quantitative results verify the better performance of the proposed scheme and provide one of the best mechanisms for authenticity of visual contents in social networks.
KW - Authenticity of visual contents
KW - Crystography
KW - Information security
KW - Multimedia security
KW - Steganography
UR - https://www.scopus.com/pages/publications/85013395156
U2 - 10.1007/s11042-017-4420-8
DO - 10.1007/s11042-017-4420-8
M3 - Article
AN - SCOPUS:85013395156
SN - 1380-7501
VL - 76
SP - 18985
EP - 19004
JO - Multimedia Tools and Applications
JF - Multimedia Tools and Applications
IS - 18
ER -