Abstract
Security is essential to all varieties of data that is transmitted through an open network or the internet. Steganography is such a technique which provides security for any kind of data by hiding it inside a cover object. The images with confidential information like medical reports, passport, academic certificates, Aadhar card and agreements between governments need to be secured while transferring through the internet. In this paper, dual cover steganography is used to provide a better security which prevents the confidential data from attackers. This approach uses two layers of covers, image, and DNA. Using improved DNA insertion method the document image is hidden inside a DNA sequence. The BPN, capacity, payload and embedding time are calculated for the DNA sequence. The improved insertion method is used in this paper since it gives the very low cracking probability. The fake DNA is hidden inside a cover image using matrix embedding with hamming code algorithm for both spatial and transform domain of an image. The Mean Square Error (MSE), Peak Signal Noise Ratio (PSNR), Maximum difference, average difference, structural content are calculated and compared. To ensure the security of document image the statistical attack called histogram analysis attack is performed and compared. This comparison shows that the matrix embedding with hamming code in the frequency domain provides better security for the second layer of hiding the data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Shih, F.Y.: Digital Watermarking and Steganography: Fundamentals and Techniques. CRC Press, Boca Raton (2017)
Subhedar, M.S., Mankar, V.H.: Current status and key issues in image steganography: a survey. Comput. sci.rev. 13, 95–113 (2014)
Marwan, S., Shawish, A., Nagaty, K.: An enhanced DNA-based steganography technique with a higher hiding capacity. In: Bioinformatics, pp. 150–157 (2015)
Verma, V., Rishma, C.: An enhanced Least Significant Bit steganography method using midpoint circle approach. In: International Conference on Communications and Signal Processing (ICCSP). IEEE (2014)
Mousa, H., Moustafa, K., Abdel-Wahed, W., Hadhoud, M.M., Mousa, H.: Data hiding based on contrast map** using DNA medium. Int. Arab J. Inf. Technol. 8(2), 147–154 (2011)
Baby, D., Thomas, J., Augustine, G., George, E., Michael, N.R.: A novel DWT based image securing method using steganography. Procedia Comput. Sci. 46, 612–618 (2015)
Malathi, P., Gireeshkumar, T.: Relating the embedding efficiency of LSB steganography techniques in spatial and transform domains. Procedia Comput. Sci. 93, 878–885 (2016)
Wang, Z., **aohang, Z., Hong, W., Guangzhao, C.: Information hiding based on DNA steganography. In: 2013 4th IEEE International Conference on Software Engineering and Service Science (ICSESS). IEEE (2013)
Menaka, K.: Message encryption using DNA sequences. In: 2014 World Congress on Computing and Communication Technologies (WCCCT). IEEE (2014)
Peterson, I.: Hiding in DNA. In: Proceedings of Muse, p. 22 (2001)
Das, P., Nirmalya K.: A DNA based image steganography using 2D chaotic map. In: International Conference on Electronics and Communication Systems (ICECS). IEEE (2014)
Shiu, H.J., Ng, K.L., Fang, J.F., Lee, R.C., Huang, C.H.: Data hiding methods based upon DNA sequences. Information Sciences 180(11), 2196–2208 (2010)
Fridrich, J., Soukal, D.: Matrix embedding for large payloads. IEEE Trans. Inf. Forensics Secur. 1(3), 390–395 (2006)
Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)
Cao, Z., Zhaoxia, Y., Honghe, H., **, G., Liangmin, W.: High capacity data hiding scheme based on (7, 4) Hamming code. SpringerPlus 5(1), 175 (2016)
Banoci, V., Gabriel, B., Dušan L.: A novel method of image steganography in DWT domain. In: 21st International Conference on Radioelektronika (RADIOELEKTRONIKA). IEEE (2011)
Meera, M., Malathi, P.: An improved embedding scheme in compressed domain image steganography. Int. J. Appl. Eng. Res. 10(55), 1933–1937 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Vinodhini, R.E., Malathi, P., Gireesh Kumar, T. (2018). An Improved Approach for Securing Document Images Using Dual Cover. In: Thampi, S., Krishnan, S., Corchado Rodriguez, J., Das, S., Wozniak, M., Al-Jumeily, D. (eds) Advances in Signal Processing and Intelligent Recognition Systems. SIRS 2017. Advances in Intelligent Systems and Computing, vol 678. Springer, Cham. https://doi.org/10.1007/978-3-319-67934-1_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-67934-1_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-67933-4
Online ISBN: 978-3-319-67934-1
eBook Packages: EngineeringEngineering (R0)