Srilekha Mukherjee
National Institute of Technology, Durgapur
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Srilekha Mukherjee.
International Journal of Computers and Applications | 2017
Srilekha Mukherjee; Goutam Sanyal
Abstract The booming technological trends of the global world bring along with it several disincentives, surmounting which has become a challenging task. The realm of modern communication, in order to shun the attention of any third-party demands certain measure that affirms immense security along with the confidentiality of information. Steganography ratifies the stated fact. With reference to this context, we propose a new image steganographic approach that competently masks the secret information bits without enticing the hackers and crackers. A two-level security mechanism in the form of two-way scrambling has been incorporated in this approach. Arnold transform is implemented on the cover in the very first step, which is succeeded by a new scrambling mechanism based on a unique technique of permutation. The aforesaid steps dexterously encrypt the cover image, thereby ensuing a two-level security in the steganographic method. The embedding mechanism of Position Power First Mapping (PPFM) is next effectuated. Incorporation of the inverse permutation-based scrambling method followed by the technique of inverse Arnold transform consummates the whole procedure and spawns an imperceptible stego. The resultant hefty embedding capacity is the prime advantage here, along with the clear resemblance of the cover and stego formed.
international conference on advances in computing and communication engineering | 2015
Subha Ash; Srilekha Mukherjee; Goutam Sanyal
Steganography takes up a distinctively extraordinary space in facilitating secret communication in this technology aided world. It differs from Cryptography in such a way that the outputs attained after various steganographic operations are apparently kept hidden. The output, in cryptography, appears to be visibly encrypted. In this context, a new concept in the steganographic horizon is proposed, where the confidential information is hidden in such a fashion, that it does not captivate any bit of suspicion of the hackers. And even if it does, it is almost impossible to crack the security. To begin with, we have applied 2D Haar Discrete Wavelet Transform on the chosen cover or carrier image. We are hence able to figure out all of its coefficient matrices. This step is followed by applying our proposed Prime First Mapping (PFM) approach for embedding purpose where unique concepts based on the prime and non-prime location values of the existing pixels have been used. The results obtained clearly prove the novelty of this approach, in terms of all the evaluated benchmark techniques. The embedding capacity is eminently high and the moderate PSNR value shows the imperceptibility of the stego-image. The similarity measure also substantiates its efficiency in preserving the image quality.
2015 IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN) | 2015
Srilekha Mukherjee; Goutam Sanyal
The expanding possibilities of the modern communication demand certain means of security that promote confidentiality as well as the integrity of information. To bypass the attention of the potential attackers, the domain of steganography as a whole minimizes the chances of tracing out or detecting any kind of hidden information during transmission. In this paper, we propose a new steganographic technique that imposes an efficient approach of data hiding in image medium. The cover image is encrypted with the aid of a special transformation (Arnolds Transformation), in the beginning so as to entail assured security. A unique embedding approach of Position Power First Mapping (PPFM) steadily inserts the secret data bits into the encrypted cover. Inverse Arnolds Transformation procreates the imperceptible stego-image. The embedding capacity is significantly high and is therefore very adept in this modern world. Also, the stego-image formed clearly resembles its respective cover image, thereby eliminating any sort of third party suspicion.
Multimedia Tools and Applications | 2018
Srilekha Mukherjee; Goutam Sanyal
This paper presents a steganographic technique using the theory of Brownian motion. In the beginning, the Brownian Based Scrambling procedure introduces traces of non linearity in the carrier medium so as to introduce one layer of security. A lighter pixel (in terms of its intensity) is presumed to experience a faster movement than the heavier ones. The above stated concept is based on the randomized scrambling strategy which is usually chaotic in nature. It actually reflects the strategy of chaos generation in the image medium. The ‘key’ is generated from the Brownian theories and is being utilized in the Power Modulus Scrambling strategy to increase the security level. In addition, the embedding technique, i.e. Pixel Insertion Methodology is also dependent on certain correlation factors of Brownian motion. The performance has been worked out to establish the efficacy of the algorithm. This whole procedure supports high embedding capacity. The experimental results show that the proposed technique performs better or at least at par with respect to many of the existing steganographic techniques. The results have been tested against various benchmarks, as illustrated in the section of experimental results. This approach can be used to provide an additional layer of protection to any system that communicates important data/information through any kind of globally accessed medium. Moreover, this approach serves its purpose of providing seamless security between sender and receiver without producing any distortion in the images. This explicit concept may be used in cyber-security for prevention of unauthorized access of information.
ieee region 10 conference | 2015
Srilekha Mukherjee; Subha Ash; Goutam Sanyal
Globally acknowledged medium, like internet, does not guarantee full security to the secrecy of confidential data. Cryptography, a practice to secure secret data using encryption techniques, provides protection, only to a certain extent, due to its clearly visible low perceptual transparency. To recast this glitch, steganography comes into action. In this paper, we have proposed a significantly novel steganographic approach, which sustains secured transmission. To begin with, the host or cover image is scuffled into a chaotic form, thereby encrypting itself. Embedding of the secret data into this scrambled image is accomplished in the next lap followed by reapplication of our proposed scuffling algorithm, thus obtaining the stego-image. No perceptible degradation in the quality of the image is detected. In the extraction phase, descrambling of the stego-image is carried out by the reverse algorithm and the secret image is extracted using the same method as that of embedding. The above proposed system has a huge embedding capacity.
international conference on digital signal processing | 2018
Subhajit Roy; Srilekha Mukherjee; Goutam Sanyal
Steganography is the art and science of message hiding i.e. passing confidential message through the unsecure channel in such a way that the existence of secret message is unknown. Image and video are the very popular choice for cover media. Embedding efficiency, payload and robustness against attackers are the main key point to successfully design a steganography algorithm. Current steganography algorithm are lacking behind by preprocessing stage, which includes alteration procedure for both cover media and secret message. We address this problem by proposing a novel method to encode the secret image inside the cover video. Here we use Karhunen-Loeve Transform (KL transform), since it provides the image compression and then after we use our proposed algorithm to embed the secret image on that compact zone. The experimental results show higher data embedding capacity and decode the secret image effectively.
Archive | 2018
Srilekha Mukherjee; Goutam Sanyal
The rapid sprout in the usage of secured information exchange through the Internet causes a major security concern today. In this paper, we have proposed a secured approach in the lexicon of modern image steganography frame. The adaptive form of the power modulus scrambling (PMS) technique has been used so as to scramble the pixels of the cover, thereby putting in a secured shield right from the beginning. Next, a comparative key-based permutation combination methodology adeptly carries out the embedding procedure. This ardently caters the concerning security issue while communication. The commendable results of the proposed approach evaluated with respect to substantial performance metrics maintain the foothold of imperceptibility.
international conference on computer communications | 2017
Vivek Kumar Jha; Srilekha Mukherjee; Subhajit Roy; Goutam Sanyal
The protection of confidential information from intruder has been a great matter of concern since ancient times. Nowadays use of internet has increased tremendously. As a result of it Digital media gathers maximum amount of confidential data. To maintain the secrecy over confidential data, different methods of hiding have been evolved. Steganography is one of the emergent area where maintaining the privacy of secret data is of utmost importance. It is an art of hiding the secret data or confidential information inside the digitally covered information. In this paper we proposed a new technique of video steganography by implementing cover frame pixel randomization, de-randomization and data embedding technique which maintain the quality of the secret data(video file) and prevents it from being accessed by intruders while communication through an open channel. Here we have proposed a new technique using factorization method to scramble pixels of cover frames of cover video file. Then the frames of secret video file is inserted in the scrambled cover frame of cover video file using Spiral (Extended) LSB technique. This method of hiding the secret video in the cover video gives a new security concept of securing the secret data from unauthorized accesses. Peak Signal-to-Noise Ratio (PSNR) is used to measure the quality of stegovideo. Thus this new approach of video steganography shows a very high imperceptibility to human vision and hence is quite efficient.
World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering | 2016
Srilekha Mukherjee; Subha Ash; Goutam Sanyal
international conference on computing for sustainable global development | 2015
Srilekha Mukherjee; Subha Ash; Goutam Sanyal