Secured Gray-Code-Based Steganographic Technique in Geometrical-Based Domain

The past decades witness a tremendous exchange in data and information in almost all domains. This leads to the need for applying data security to ensure information safety during communication. One of the main used technique is the steganography. Steganography is a technique that involves hiding in...

Full description

Bibliographic Details
Main Authors: Aya Y. Alkhamese, Hewayda A. Elgawalby, Ibrahim M. Hanafy, Wael A. Awad, Ahmed Ismail Ebada, S. S. Askar, Mohamed Abouhawwash
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10328778/
_version_ 1797370534308085760
author Aya Y. Alkhamese
Hewayda A. Elgawalby
Ibrahim M. Hanafy
Wael A. Awad
Ahmed Ismail Ebada
S. S. Askar
Mohamed Abouhawwash
author_facet Aya Y. Alkhamese
Hewayda A. Elgawalby
Ibrahim M. Hanafy
Wael A. Awad
Ahmed Ismail Ebada
S. S. Askar
Mohamed Abouhawwash
author_sort Aya Y. Alkhamese
collection DOAJ
description The past decades witness a tremendous exchange in data and information in almost all domains. This leads to the need for applying data security to ensure information safety during communication. One of the main used technique is the steganography. Steganography is a technique that involves hiding information within objects, such as images, audio, video, or 3D objects, without leaving any noticeable alterations. We propose a 3D steganographic technique that increases security using Gray-code sequence and a Least Significant Bit technique. We construct the 64-binary representation for the 3D cover-object. A Gray-code sequence defined the 3D object vertices that will be utilized for concealing the information. The binary representation of the information is to be concealed in the least significant bits of either the x- or the y-components of the defined vertices. The least significant bits, are the last two bits in the binary representation of the vertex components. Exploitation the binary representation, gives us the capability of increasing the data security, and the data capacity. The proposed steganographic technique has been evaluated through multiple evaluation metrics to assess its performance; including Mean Square Error Ratio, Peak Signal-to-Noise Ratio, Histogram, and Normalized Correlation Experimental results, indicate that the security level of the proposed technique is superior comparing to several existed techniques. Moreover, when testing against some common attacks such as the noise, the median, the Gaussian and the Laplacian filters; the results show the efficiency and the robustness of the proposed technique.
first_indexed 2024-03-08T18:03:51Z
format Article
id doaj.art-ee7b3abae4e444acaa458c33748814a3
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-03-08T18:03:51Z
publishDate 2023-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-ee7b3abae4e444acaa458c33748814a32024-01-02T00:01:54ZengIEEEIEEE Access2169-35362023-01-011114616114617210.1109/ACCESS.2023.333668210328778Secured Gray-Code-Based Steganographic Technique in Geometrical-Based DomainAya Y. Alkhamese0Hewayda A. Elgawalby1https://orcid.org/0000-0001-5478-6967Ibrahim M. Hanafy2Wael A. Awad3Ahmed Ismail Ebada4https://orcid.org/0000-0002-4478-5853S. S. Askar5Mohamed Abouhawwash6https://orcid.org/0000-0003-2846-4707Department of Physics and Engineering Mathematics, Faculty of Engineering, Port Said University, Port Said, EgyptDepartment of Physics and Engineering Mathematics, Faculty of Engineering, Port Said University, Port Said, EgyptDepartment of Mathematics and Computer Science, Faculty of Science, Port Said University, Port Said, EgyptDepartment of Computer Science, Faculty of Computers and Artificial Intelligence, Damietta University, Damietta, EgyptDepartment of Information Systems, Faculty of Computers and Artificial Intelligence, Damietta University, Damietta, EgyptDepartment of Statistics and Operations Research, College of Science, King Saud University, Riyadh, Saudi ArabiaDepartment of Mathematics, Faculty of Science, Mansoura University, Mansoura, EgyptThe past decades witness a tremendous exchange in data and information in almost all domains. This leads to the need for applying data security to ensure information safety during communication. One of the main used technique is the steganography. Steganography is a technique that involves hiding information within objects, such as images, audio, video, or 3D objects, without leaving any noticeable alterations. We propose a 3D steganographic technique that increases security using Gray-code sequence and a Least Significant Bit technique. We construct the 64-binary representation for the 3D cover-object. A Gray-code sequence defined the 3D object vertices that will be utilized for concealing the information. The binary representation of the information is to be concealed in the least significant bits of either the x- or the y-components of the defined vertices. The least significant bits, are the last two bits in the binary representation of the vertex components. Exploitation the binary representation, gives us the capability of increasing the data security, and the data capacity. The proposed steganographic technique has been evaluated through multiple evaluation metrics to assess its performance; including Mean Square Error Ratio, Peak Signal-to-Noise Ratio, Histogram, and Normalized Correlation Experimental results, indicate that the security level of the proposed technique is superior comparing to several existed techniques. Moreover, when testing against some common attacks such as the noise, the median, the Gaussian and the Laplacian filters; the results show the efficiency and the robustness of the proposed technique.https://ieeexplore.ieee.org/document/10328778/3D steganographic techniquegray-codeinformation hidingpeak signal-to-noise ratio
spellingShingle Aya Y. Alkhamese
Hewayda A. Elgawalby
Ibrahim M. Hanafy
Wael A. Awad
Ahmed Ismail Ebada
S. S. Askar
Mohamed Abouhawwash
Secured Gray-Code-Based Steganographic Technique in Geometrical-Based Domain
IEEE Access
3D steganographic technique
gray-code
information hiding
peak signal-to-noise ratio
title Secured Gray-Code-Based Steganographic Technique in Geometrical-Based Domain
title_full Secured Gray-Code-Based Steganographic Technique in Geometrical-Based Domain
title_fullStr Secured Gray-Code-Based Steganographic Technique in Geometrical-Based Domain
title_full_unstemmed Secured Gray-Code-Based Steganographic Technique in Geometrical-Based Domain
title_short Secured Gray-Code-Based Steganographic Technique in Geometrical-Based Domain
title_sort secured gray code based steganographic technique in geometrical based domain
topic 3D steganographic technique
gray-code
information hiding
peak signal-to-noise ratio
url https://ieeexplore.ieee.org/document/10328778/
work_keys_str_mv AT ayayalkhamese securedgraycodebasedsteganographictechniqueingeometricalbaseddomain
AT hewaydaaelgawalby securedgraycodebasedsteganographictechniqueingeometricalbaseddomain
AT ibrahimmhanafy securedgraycodebasedsteganographictechniqueingeometricalbaseddomain
AT waelaawad securedgraycodebasedsteganographictechniqueingeometricalbaseddomain
AT ahmedismailebada securedgraycodebasedsteganographictechniqueingeometricalbaseddomain
AT ssaskar securedgraycodebasedsteganographictechniqueingeometricalbaseddomain
AT mohamedabouhawwash securedgraycodebasedsteganographictechniqueingeometricalbaseddomain