Secured Gray-Code-Based Steganographic Technique in Geometrical-Based Domain
The past decades witness a tremendous exchange in data and information in almost all domains. This leads to the need for applying data security to ensure information safety during communication. One of the main used technique is the steganography. Steganography is a technique that involves hiding in...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2023-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10328778/ |
_version_ | 1797370534308085760 |
---|---|
author | Aya Y. Alkhamese Hewayda A. Elgawalby Ibrahim M. Hanafy Wael A. Awad Ahmed Ismail Ebada S. S. Askar Mohamed Abouhawwash |
author_facet | Aya Y. Alkhamese Hewayda A. Elgawalby Ibrahim M. Hanafy Wael A. Awad Ahmed Ismail Ebada S. S. Askar Mohamed Abouhawwash |
author_sort | Aya Y. Alkhamese |
collection | DOAJ |
description | The past decades witness a tremendous exchange in data and information in almost all domains. This leads to the need for applying data security to ensure information safety during communication. One of the main used technique is the steganography. Steganography is a technique that involves hiding information within objects, such as images, audio, video, or 3D objects, without leaving any noticeable alterations. We propose a 3D steganographic technique that increases security using Gray-code sequence and a Least Significant Bit technique. We construct the 64-binary representation for the 3D cover-object. A Gray-code sequence defined the 3D object vertices that will be utilized for concealing the information. The binary representation of the information is to be concealed in the least significant bits of either the x- or the y-components of the defined vertices. The least significant bits, are the last two bits in the binary representation of the vertex components. Exploitation the binary representation, gives us the capability of increasing the data security, and the data capacity. The proposed steganographic technique has been evaluated through multiple evaluation metrics to assess its performance; including Mean Square Error Ratio, Peak Signal-to-Noise Ratio, Histogram, and Normalized Correlation Experimental results, indicate that the security level of the proposed technique is superior comparing to several existed techniques. Moreover, when testing against some common attacks such as the noise, the median, the Gaussian and the Laplacian filters; the results show the efficiency and the robustness of the proposed technique. |
first_indexed | 2024-03-08T18:03:51Z |
format | Article |
id | doaj.art-ee7b3abae4e444acaa458c33748814a3 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-03-08T18:03:51Z |
publishDate | 2023-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-ee7b3abae4e444acaa458c33748814a32024-01-02T00:01:54ZengIEEEIEEE Access2169-35362023-01-011114616114617210.1109/ACCESS.2023.333668210328778Secured Gray-Code-Based Steganographic Technique in Geometrical-Based DomainAya Y. Alkhamese0Hewayda A. Elgawalby1https://orcid.org/0000-0001-5478-6967Ibrahim M. Hanafy2Wael A. Awad3Ahmed Ismail Ebada4https://orcid.org/0000-0002-4478-5853S. S. Askar5Mohamed Abouhawwash6https://orcid.org/0000-0003-2846-4707Department of Physics and Engineering Mathematics, Faculty of Engineering, Port Said University, Port Said, EgyptDepartment of Physics and Engineering Mathematics, Faculty of Engineering, Port Said University, Port Said, EgyptDepartment of Mathematics and Computer Science, Faculty of Science, Port Said University, Port Said, EgyptDepartment of Computer Science, Faculty of Computers and Artificial Intelligence, Damietta University, Damietta, EgyptDepartment of Information Systems, Faculty of Computers and Artificial Intelligence, Damietta University, Damietta, EgyptDepartment of Statistics and Operations Research, College of Science, King Saud University, Riyadh, Saudi ArabiaDepartment of Mathematics, Faculty of Science, Mansoura University, Mansoura, EgyptThe past decades witness a tremendous exchange in data and information in almost all domains. This leads to the need for applying data security to ensure information safety during communication. One of the main used technique is the steganography. Steganography is a technique that involves hiding information within objects, such as images, audio, video, or 3D objects, without leaving any noticeable alterations. We propose a 3D steganographic technique that increases security using Gray-code sequence and a Least Significant Bit technique. We construct the 64-binary representation for the 3D cover-object. A Gray-code sequence defined the 3D object vertices that will be utilized for concealing the information. The binary representation of the information is to be concealed in the least significant bits of either the x- or the y-components of the defined vertices. The least significant bits, are the last two bits in the binary representation of the vertex components. Exploitation the binary representation, gives us the capability of increasing the data security, and the data capacity. The proposed steganographic technique has been evaluated through multiple evaluation metrics to assess its performance; including Mean Square Error Ratio, Peak Signal-to-Noise Ratio, Histogram, and Normalized Correlation Experimental results, indicate that the security level of the proposed technique is superior comparing to several existed techniques. Moreover, when testing against some common attacks such as the noise, the median, the Gaussian and the Laplacian filters; the results show the efficiency and the robustness of the proposed technique.https://ieeexplore.ieee.org/document/10328778/3D steganographic techniquegray-codeinformation hidingpeak signal-to-noise ratio |
spellingShingle | Aya Y. Alkhamese Hewayda A. Elgawalby Ibrahim M. Hanafy Wael A. Awad Ahmed Ismail Ebada S. S. Askar Mohamed Abouhawwash Secured Gray-Code-Based Steganographic Technique in Geometrical-Based Domain IEEE Access 3D steganographic technique gray-code information hiding peak signal-to-noise ratio |
title | Secured Gray-Code-Based Steganographic Technique in Geometrical-Based Domain |
title_full | Secured Gray-Code-Based Steganographic Technique in Geometrical-Based Domain |
title_fullStr | Secured Gray-Code-Based Steganographic Technique in Geometrical-Based Domain |
title_full_unstemmed | Secured Gray-Code-Based Steganographic Technique in Geometrical-Based Domain |
title_short | Secured Gray-Code-Based Steganographic Technique in Geometrical-Based Domain |
title_sort | secured gray code based steganographic technique in geometrical based domain |
topic | 3D steganographic technique gray-code information hiding peak signal-to-noise ratio |
url | https://ieeexplore.ieee.org/document/10328778/ |
work_keys_str_mv | AT ayayalkhamese securedgraycodebasedsteganographictechniqueingeometricalbaseddomain AT hewaydaaelgawalby securedgraycodebasedsteganographictechniqueingeometricalbaseddomain AT ibrahimmhanafy securedgraycodebasedsteganographictechniqueingeometricalbaseddomain AT waelaawad securedgraycodebasedsteganographictechniqueingeometricalbaseddomain AT ahmedismailebada securedgraycodebasedsteganographictechniqueingeometricalbaseddomain AT ssaskar securedgraycodebasedsteganographictechniqueingeometricalbaseddomain AT mohamedabouhawwash securedgraycodebasedsteganographictechniqueingeometricalbaseddomain |