Abstract
Embedding data into a given medium is called Steganography, in such a way that it cannot be detected in a given image. Also, cloud computing has altered the way information is accessed, stored, and transmitted; the emphasis is in making the data more robust and keeping it hidden within a given image. The current techniques of spatial embedding do not deliver the robustness that is needed for basic compression algorithms. To produce a better method, it takes the help of the least-significant bit paradigm (Wayner, Disappearing cryptography: information hiding: steganography and watermarking. 3rd ed. Morgan Kaufmann Publishers, Burlington, 2009; Gruhl and Bender, Echo hiding. In: Proceeding of information hiding workshop, p. 295–315, 1996). With this paradigm, we are led towards the idea of transforming the embedding system from the very beginning, which is to hide the data in the domains of frequency. The following paper proposes a method of transform embedding which uses current digital encryption methods and improves the steganography results by using the empirical data, and the encrypted image is deployed in the cloud to be used from anywhere. This method is more robust than the existing spatial embedding methods. The claims are backed by the experimental results which are shown in the paper.
Similar content being viewed by others
References
Wayner P. Disappearing cryptography: information hiding: steganography and watermarking. 3rd ed. Burlington: Morgan Kaufmann Publishers; 2009.
Petitcolas FAP, Anderson RJ, Kuhn MG. Information hiding—a survey. In: Proceedings of the IEEE, special issue on protection of multimedia content, vol. 87, no. 7, p. 1062–1078; 1999.
Bender W, Gruhl D, Morimoto N, Lu A. Techniques for data hiding. IBM Syst J. 1996;35(3–4):313–36.
Dong X, Bocko M, Ignjatovic Z. Data hiding via phase manipulation of audio signals. In: IEEE international conference on acoustics, speech, and signal processing (ICASSP), vol. 5, p. 377–380; 2004.
Kandel ER, Schwartz JH, Jessell TM. Principles of neural science. 4th ed. New York: McGraw-Hill; 2000.
Cvejic N, Seppben T. Increasing the capacity of LSB-based audio steganography. FIN-90014, Finland; 2002.
Johnson NF, Jajodia S. Exploring steganography: seeing the unseen. Comput J. 1998;31(2):26–34.
Djebbar F, Ayad B, Abed-Meraim K, Hamam H. A view on latest audio steganography. In: 7th IEEE international conference on innovations in information technology; 2011.
Gopalan K. Audio steganography using bit modification. ProcIntConfMultimed. 2003;1:629–32.
Gruhl D, Bender W. Echo hiding. In: Proceeding of information hiding workshop, p. 295–315; 1996.
Shirali-Shahreza S, Shirali-Shahreza M. Steganography in silence intervals of speech. In: Proceedings of the fourth IEEE international conference on intelligent information hiding and multimedia signal, p. 605–607; 2008.
Funding
No funding is involved.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This paper does not contain any studies with human participants or animals performed by any of the authors.
Informed consent
None.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the topical collection “Computational Statistics” guest edited by Anish Gupta, Mike Hinchey, Vincenzo Puri, Zeev Zalevsky and Wan Abdul Rahim.
Rights and permissions
About this article
Cite this article
Ahluwalia, R., Gupta, A. & Chaudhary, P. Encrypted Image Deployed, Both in Cloud and Self-managed System. SN COMPUT. SCI. 1, 358 (2020). https://doi.org/10.1007/s42979-020-00367-w
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-020-00367-w