Hiding image into another meaningful images using Richardson-Lucy algorithm with data authentication

  • Ali Sheidaee Department of Computer and Electronics Engineering, Tabriz, Iran
  • Leyli Mohammad Khanli
Ariticle ID: 592
239 Views, 14 PDF Downloads, 0 Hiding Image into Another Meaningful Images Using Richardson-Lucy Algorithm with Data Authentication Downloads
Keywords: Steganography, Richardson-Lucy, Motion blur, Authentication, Human Visual System (HVS).

Abstract

Image steganography is a technique of embedding sensitive information in images. In literature, research articles proposed different image steganography schemes on cover images based on different algorithms. Withal, stego images have less quality in HVS and lower performance. Another topic in image steganography is the quality of extracted data in receiver side that can be affected by transmission channel options or even by the attacks on stego images in transmission channel. In this paper discrete cosine transform (DCT) function and Motion Blur (based on Richardson-Lucy algorithm) is used for secret image transformation and secured hash file of the transformed image generated with RSA cryptosystem therewith. The randomness property of the resultant image reduces the possibility of its detection by HVS and steganalysis techniques. Image data embedding applied with LSBMR substitution algorithm into another significant image. Image deconvolution addressed in recent articles that used different methods such as edge extractions, Richardson-Lucy algorithm, Regularized filters and etc. We apply the Richardson-Lucy deconvolution basics in final secret image extraction to remove the noise. Several experiments and comparative studies are further presented to verify the effectiveness of the proposed algorithm in terms of performance, stego image quality and secret images quality maintenance.

Author Biographies

Ali Sheidaee, Department of Computer and Electronics Engineering, Tabriz, Iran
Master Student - department of computer and electronics enginnering
Leyli Mohammad Khanli
Associated Professor - department of computer and electronics enginnering
Published
2018-09-26
Section
Articles