• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Steganography-Based Transmission of Medical Images Over Unsecure Network for Telemedicine Applications

    2021-12-14 06:06:58RomanyMansourandMohebGirgis
    Computers Materials&Continua 2021年9期

    Romany F.Mansourand Moheb R.Girgis

    1Department of Mathematics,Faculty of Science,New Valley University,El-Kharga,72511,Egypt

    2Department of Computer Science,Faculty of Science,Minia University,El-Minia,Egypt

    Abstract:Steganography is one of the best techniques to hide secret data.Several steganography methods are available that use an image as a cover object,which is called image steganography.In image steganography,the major features are the cover object quality and hiding data capacity.Due to poor image quality,attackers could easily hack the secret data.Therefore,the hidden data quantity should be improved,while keeping stego-image quality high.The main aim of this study is combining several steganography techniques,for secure transmission of data without leakage and unauthorized access.In this paper,a technique,which combines various steganographybased techniques,is proposed for secure transmission of secret data.In the pre-processing step,resizing of cover image is performed with Pixel Repetition Method(PRM).Then DES(Data Encryption Standard)algorithm is used to encrypt secret data before embedding it into cover image.The encrypted data is then converted to hexadecimal representation.This is followed by embedding using Least Signification Bit (LSB) in order to hide secret data inside the cover image.Further,image de-noising using Convolutional Neural Network(CNN)is used to enhance the cover image with hidden encrypted data.Embedded Zerotrees of Wavelet Transform is used to compress the image in order to reduce its size.Experiments are conducted to evaluate the performance of proposed combined steganography technique and results indicate that the proposed technique outperforms all existing techniques.It achieves better PSNR,and encryption/decryption times,than existing methods for medical and other types of images.

    Keywords:Steganography;secure data transmission;CNN;encryption;telemedicine

    1 Introduction

    Recent development in communication and information technology provides easy and simple access to data,but the most significant requirement is the establishment of secure communication.Several techniques were developed for safety communication.One of the major techniques is steganography [1].It is a scientific technique used to transfer data privately over multimedia carriers like text,video,audio,image,etc.[2].The term steganography is a Greek word refers to “hidden data”,which is composed of “Steganos” and “gaphie”.This technique had been utilized from ancient times.Data hiding is mainly utilized to deliver reliable data from sender to receiver without interruption of third-party and without any modification to data.Currently,several changes have been made with developing technologies of steganography [3].Steganography is comprised of 4 components:

    · Cover Object:the medium where data will be hidden.

    · Secret data:the data to be hidden within the cover object.

    · Stego object:the state of the cover object after hiding the data inside it.

    · Stego key:the hide function that will be utilized to hide the secret data inside the cover object.

    Based on the medium used as cover object,steganography is classified into various kinds.For example,if an image is used as the cover object,it is referred to as image steganography.Similarly,there are text steganography,video steganography,and sound steganography.Fig.1 illustrates the steps of image steganography.In this research,medical images are used for the cover object,but the proposed technique can be applied to other types of images.

    Figure 1:Image steganography steps

    Image steganography techniques are divided into two major groups:frequency (transform)domain techniques and spatial domain techniques [4],as shown in Fig.2.In spatial domain techniques,data is directly hidden in pixels,while in frequency domain techniques,data hiding is performed on the image after it is passed through a frequency field [5-7].Several steganography techniques considering both domains have been proposed in the literature.For example,in [5]an algorithm has been proposed that utilizes image segmentation and artificial immune system.In this algorithm,after segmenting the cover image,a block was chosen,then the artificial immune system was used to hide the message bits in the most appropriate place.

    In 1972,the DES (Data Encryption Standard) has been developed by IBM and in 1974 US adopted it as standard.It uses 64 bit block and has a key of length 56 bits,and finishes the encryption process in 16 rounds.However,DES can be cracked by brute force attack [8].The secure communication is achieved for the embedded secret data in the cover medium by using the LSB technique.Hiding capacity is expected to be enhanced.Similarly,computational time should be decreased [9].Several data hiding algorithms are available which ensure more information capacity,but the hardware implementations are highly complicated.Hence,more efficient and robust data hiding algorithm is required.

    Figure 2:Classification of steganography techniques [1]

    The major contribution of this study is combining several steganography techniques,for secure transmission of data without leakage and unauthorized access.This is achieved as follows:

    · Firstly,the cover image is pre-processed by using Pixel Repetition method (PRM).

    · Secondly,to communicate without information loss over insecure channels,the data to be hidden is encrypted using DES algorithm,then converted into hexadecimal representation.

    · Thirdly,LSB embedding is performed to hide secret data inside the image used as a cover object.

    · Fourthly,the stego image is enhanced by using image de-noising with Convolutional Neural Network (CNN).

    · Fifthly,the enhanced stego image is compressed using Embedded Zerotrees of Wavelet Transform and transmitted to the receiver.

    · Finally,the receiver performs the reverse of the proposed process to extract the secret data.

    The paper is organized as follows:Section 2 presents a review of the related work.Section 3 describes the proposed combined steganography technique.Section 4 presents comparative and performance analysis to evaluate the efficiency of the proposed technique.Finally,Section 5 presents the conclusion of this research work.

    2 Related Works

    This section gives a review of the existing studies related to image steganography techniques with PRM,DES,LSB,CNN,and wavelet transform.For medical images,Loan et al.[10]have proposed a semi-reversible and high capacity data hiding scheme based on hybrid edge detection and PRM.PRM was utilized to scale up small sized image (seed image) and hybrid edge detection ensures that no important edge information is missed.The Least Significant and ISBS (Intermediate Significant Bit Substitution) methods have been used to embed the Electronic Patient Record (EPR).In addition,the RC4 encryption has been used to add an extra security layer for embedded EPR.Experiments have been conducted to test the proposed method and results showed that it is computationally efficient and is capable of handling high payload.

    Laimeche et al.[11]have proposed two position selection scenarios of LSB-based steganography for optimum adjustment of pixel position,visual distortion of stego-image,and embedding modifications per pixel.They aimed to enhance efficiency of embedding by selecting the suitable cover image pixels’values that optimize the expected number of changes per pixel and the visual distortion.The embedding process needs to be enhanced further.Sakthidasan et al.[12]have proposed a noise reduction image restoration method.Experiments conducted to evaluate the performance of the proposed method showed that it achieves a greater restoration ratio and a high quality de-noising for noisy images compared with existing methods.

    For embedding images as payload,Rahim et al.[13]have proposed encoder-decoder architecture based on CNNs.They proposed generic encoder and decoder architecture based on deep learning for image steganography,and to ensure joint end-to-end training of encoder-decoder networks,they introduced a new loss function.Finally,the proposed architecture has been evaluated on several datasets,and state-of-the-art payload capacity has been reported at high SSIM and PSNR values.Kim et al.[14]have proposed an approach,which is different from the common approach that uses CNN for image steganalysis.This approach embeds additional random data in input images,then uses both the original and data-embedded images as input.This is based on an idea that the additional embedded data causes pixel variations that would be adequate to recognize images with and without a secret message.To input two different images,two types of CNNs have been proposed,namely,a dual network CNN and a dual channel CNN.The evaluation of the proposed approach showed that the additional embedded data can provide useful information for CNN-based image steganalytic techniques to increase the identification rate for S-UNIWARD(an adaptive steganographic method).

    Miri et al.[15]have proposed an integer wavelet transform based approach for image steganography.In this approach,the cover image is mapped into a particular frequency domain.Then,the coefficients of edges are classified based on their MSBs.In frequency coefficients,the secret bits are embedded.Stego image is obtained by inverse transformation.The receiver can retrieve the information without any errors,as the proposed method inhibits any changes in MSB.In addition,this method reached good adaptation with human vision system and outperformed existing methods in terms of PSPNR factors.Kaur et al.[16]have worked on centered weighted LSB technique with hidden object encryption to embed small images in large or medium sized image.The proposed technique utilized spatial domain embedding technique.The performance of the proposed technique has been evaluated in terms of PSNR,elapsed time and payload capacity.Sreehari et al.[17]proposed a hybrid cryptosystem that uses symmetric crypto algorithm and hashing techniques.MD5 algorithm is used to compute hash value of message,and Double DES algorithm is used to encrypt same message using secret keys.The ciphertext generated from hash value and double DES is combined and transmitted.At the receiver end,ciphertext is detached from hash value and decrypted to obtain original message.Also,the decrypted message’s hash value is computed using MD5,and matched with sender’s hash value to check data integrity.

    Parah et al.[18]proposed a technique for hiding EHRs (Electronic Healthcare Records) in medical images in an IoT (Internet of Things) driven healthcare system.The proposed technique is based on PRM and modular arithmetic.PRM is used to scale up input medical image as cover object and modular arithmetic is used to insert the secret EHR into the scaled up images.Experimental results showed that the proposed technique is secure,computationally efficient,and has high embedding capacity.Therefore,it is suitable for exchanging EHRs in IoT-based healthcare systems.To ensure information security,many cryptographic algorithms have been developed.However,since the devices used in IoT applications have various resource constraints,more efficient algorithms are required for both processing and memory requirements.Güler et al.[19]have implemented the DES algorithm on CUDA to study the improvements that could be made on performance.The experimental results showed that the obtained design is more efficient than the original DES algorithm.Ardiansyah et al.[20]proposed a combination of two Steganography domains,joined with Cryptography,to make confidential information more secure and inaccessible to unauthorized persons.Messages are encrypted by using the 3-DES method,and the cover image is decomposed into four subbands by using DWT.LH,HL,and HH subbands are selected to embed encrypted message using the LSB method.Finally,Inverse DWT is performed to reconstruct the stego image.Experiments with the proposed approach showed good results.

    3 The Proposed Technique

    This section describes the proposed technique,which is a combination of various steganography techniques,for secure transmission of secret data over unsecure network from sender to receiver without any data loss or modification or unauthorized access to data.Fig.3 illustrates the steps of the proposed technique.

    Figure 3:The steps of the proposed technique

    3.1 At Transmitter Side

    At the transmitter side,the PRM,DES,wavelet transform,LSB techniques,and image denoising using CNN,were utilized to encrypt secret data and embed it inside a medical image,or any other kind of images,as a cover object before transmitting to the receiver.These techniques are described below:

    3.1.1 Pixel Repetition Method

    PRM is a simple and efficient technique.Many other techniques have been reported for the development of cover images from small sized original images using the idea of interpolation [21],but they consume more computational time than PRM.The input image(X×Y)is scaled up,using the PRM technique,as follows:every pivot/seed pixel is replicated to form a 2×2 block;hence the dimension of the resultant cover image becomes twice the input image dimension,i.e.,(2X×2Y).Let J(m,n)denotes an arbitrary pixel of the input image and D(p,q)denotes an arbitrary pixel of the resultant cover image.The following equations are used to obtain the scaled up version of the input image,i.e.,the cover image D(2X×2Y):

    where p=0,1,2,...,2X;q=0,1,2,...,2Y;m=0,1,2,...,X and n=0,1,2,...,Y.The pixel J(m,n)is referred to as pivot/seed pixel.Fig.4a shows an arbitrary 2×2 block of the original image,and Fig.4b shows the corresponding scaled up block in the cover image.

    Figure 4:Pixel to block using PRM,(a) original block,(b) scaled up block

    3.1.2 DES

    DES is a block cipher algorithm that uses a symmetric key.It encrypts 64-bit plaintext into 64-bit cipher text with a 56-bit key in 16 rounds [22].The plaintext is split into two equal parts:Left(T)and Right(S),which are processed in the 16 rounds.In round j,the two parts Tiand Siare processed by the function f and sub key Ki,using the following equations:

    where ⊕ is XOR operator.The output of the last 16thround is the 64-bit cipher text.

    3.1.3 LSB

    LSB is one of the simple steganography techniques of spatial domain,where data is inserted directly into cover image’s pixels [23].This technique has better undetectable value,so normal people cannot predict image alteration [24].Insertion process is performed by altering LSB bit plane of every pixel related to data bits.

    ·Edge Detection

    An edge pixel has high intensity value and any modification in such pixels can affect the digital image.Linked edge pixels of an object can be identified by edge detection.The canny edge detection is a multi-stage algorithm used for predicting a wide range of edges in images.In 1986,it was established by John F.Canny with the aim of defining a good edge detection algorithm.A good edge detector should detect edges with low error rate,the detected edge point should be accurately localized on the edge center,each edge in the image should only be marked once,and where possible,false edges should not be created by image noise.The canny edge detection process is performed as follows [25]:

    · Using Gaussian filter with particular standard deviationσ,the image is smoothed to reduce noise.

    · At each point,the edge direction and local gradient are determined using edge detection operators.

    · Edges are thinned by applying non-maximum suppression.

    · Possible edges are determined by applying a threshold.The pixels weaker than this threshold are denoted as non-edges and those stronger than the threshold are denoted as edges.

    ·Embedding Process

    The input to the embedding process are the cover image (D),secret message (R),and key (k).The following steps are performed to get the stego-image from the input:

    Step 1:Cover imageDis loaded.

    Step 2:Edge detection is applied to cover image by utilizing canny edge detection and coordinates of edge region are saved into the variableDcordinator.

    Step 3:Secret message (R) is loaded and converted to binary form.If it is a grayscale image,its pixels are converted to 8-bit binary form.If it is a color image,it has 3 layers of color space(blue,green and red),then all layers are converted to 8-bit binary form(Rbinary).

    Step 4:Keykis converted to binary form and 16 sub keysKiare generated fromk.

    Step 5:SplitRbinaryinto 2 parts (RTiandRSi),then(RSi)is encrypted withKiusing DES with Eqs.(5) and (6).This process continues for 16 rounds and produces the cipher image,which is stored inCipherimage.

    Step 6:Cipherimageis embedded using LSB based onDcordinatoras the insertion positions.

    Step 7:From Step 6,stego-image is generated and saved.

    3.1.4 Image De-noising Using Convolutional Neural Network(CNN)

    The LSB steganography major limitation is that,if the hidden confidential information is longer,the obtained quality of image is worsen.Hence,image de-noising using CNN is adopted to enhance the distortion of the cover image resulted after applying LSB.The proposed denoising CNN model is adapted from [26].It consists of four blocks:sparse block (SPBL),Feature enhancement block (FEBL),Attention block (ATBL),and Reconstruction block (RBL).The efficiency and performance in image de-noising is enhanced by the 12-layer sparse block.The predicted residual image is denoted byPRand input noisy image is denoted byINoise.The function of the sparse block is represented by the following formula:

    In Eq.(7),fSPBLdenotes the SPBL function,CSPBLis SPBL function output and it serves the FEBL.The 4-layer FEBL makes full use of local and global features of the proposed network to enhance the expressive ability in image de-noising,where the local features areCSPBL,and the global features are the input noisy image,INoise.The function of the FEBL can be represented by the following formula:

    In Eq.(8),fFEBLandCFEBLdenote the FEBL function and its output,respectively.CFEBLIs passed to ATBL.It has been noted that the given image’s complex background might easily hide the features,which makes extracting key features more difficult in the training process [27].To overcome this problem,the 1-layer ATBL is added to the network to predict the noise.The ATBL can be formulated as follows:

    In Eq.(9),fATBLandPRdenote the ATBL function and its output,respectively.PRis used as input to the RBL.The RBL is used to reconstruct the clean image.This process is represented by the following equation:

    In Eq.(10),fDCNNis the function of the proposed de-noise network to predict the residual image,andILCIis the latent clean image.The proposed network is optimized by the loss function,which is described below.

    The proposed de-noise network is trained by using the degrading equationy=x+v,wherey,xandvare the noisy,clean,and residual images,respectively.The de-noise network is utilized to predict the residual image v,using the equationv=y-x.The given pairand MSE mean square error are used to train the de-noise network,whereis theithclean image andis theithnoisy image.This process implementation is formulated as follows:

    whereΘrepresents the parameters of de-noising model training.This overall process improves the embedding capacity and also enhances the undetectability of the stego-image.

    3.1.5 Embedded Zerotrees of Wavelet Transform

    The Embedded Zerotrees of Wavelet Transform (EZWT) [28]is an efficient image compression algorithm.The first step in the EZWT encoding process is to determine the initial threshold.The initial threshold is calculated by the following formula:

    whereMax(|f (x,y)|)is the largest coefficient in the image.The EZWT encoding process includes two passes:the dominant pass and the subordinate pass,and use two lists of wavelet coefficients:the dominant list and the subordinate list.At any point in the process,the dominant list contains the coefficients that have not yet been found to be significant.In a dominant pass,the coefficients in the dominant list are scanned and every coefficient is coded with one of four symbols:P(positive),N(negative),T(zerotree),orZ(isolated zero).If the coefficient has magnitude greater than the threshold,then it is coded withP/N,according to its sign.If the coefficient is the root of a zerotree,then it is coded with T,and if the coefficient is smaller than the threshold but it is not the root of a zerotree and has significant descendants,then it is coded withZ.Finally,the magnitudes of all the significant coefficients,i.e.,those coded withP/N,are placed on the subordinate list,and their positions in the wavelet transform array are set to zeroes to prevent them from being coded again.

    During the subordinate pass,the significant coefficients in the subordinate list are refined.Prior to each subordinate pass,the uncertainty interval for the magnitudes of all significant coefficients will be determined as the interval [Thi,2Thi),whereThiis the current threshold of the dominant pass.The subordinate pass will encode the magnitudes with 0/1,according to whether they are being in interval [Thi,1.5Thi) or in the interval [1.5Thi,2Thi),respectively.These two passes will be repeated,where the threshold is halved before each dominant pass,until the threshold reaches a minimum value.In the decoding process,each decoded symbol,both during a dominant and subordinate pass,is refined and the length of the uncertainty interval,in which the true value of the coefficient may occur,is reduced.The reconstruction value of each coefficient will be the center of the interval in which it may occur.

    3.2 At Receiver Side

    With the combination of all the above techniques,secret data can be transmitted securely from sender to a particular receiver over unsecure network without third-party access or loss in data.At the receiver side,decryption takes place with secret key to extract the embedded data through reverse steganography process.The input to the extraction process are stego-image (Stegoimage),Dcordinator,and key (k),and the output is the secret message (R).The steps of the extraction process are as follows:

    Step 1:Stegoimageis loaded.

    Step 2:Cipher image bits are extracted fromStegoimagebased onDcordinator,and stored intoCipherimage.

    Step 3:16 sub keys (Ki) are generated from k,and converted to binary form.

    Step 4:Cipherimageis decrypted withKjby applying the DES decryption process with the formula:

    This formula is repeated for 16 rounds to generate the original secret message and the output is stored inRbinary.

    Step 5:If original secret message is an image,reshapeRbinaryto image matrix,in which each layer has 8 bits for each pixel.Finally,the image is saved.

    3.3 Example

    Tab.1 illustrates the whole proposed steganography methodology.It shows the steps followed by the proposed system to embed a message in a medical image (Retina).The table shows:(a) the initial input image of size(512,512,3);(b) the resized image (256,256,3) resulted from pre-processing step;(c) the resulted image (512,512,3) after applying the PRM technique;(d)the resulted encrypted message by the DES encryption technique;(e) the image after embedding the encrypted message into it using LSB technique;(f) the enhanced image by using the CNNbased de-noising technique;and (g) the compressed stego image using the wavelet transform.The time taken for decryption process by the proposed system is 0.00015468180000001533 minutes.The decoded message extracted from the medical stego image is “Steganography includes the concealment of information within computer files”.

    Table 1:The proposed system results at every stage

    4 Performance and Comparative Analysis

    The overall performance of the proposed method has been evaluated in terms of PSNR (Peak Signal to Noise Ratio),Histogram Analysis,Mean-Square-Error (MSE),and Structural Similarity Index Metric (SSIM) value,and the encryption and decryption times.The proposed method has been implemented using Python version 3.9.1 on a 2.27 GHz Intel Core?i5 with 4 GB of RAM.Tab.2 shows a comparison between PSNR values of the proposed method,six embedding methods based on matrix coding [29],and 4 other embedding methods (Jiang et al.[30],Qu et al.[31],Heidari et al.[32],Qu et al.[33]).In this experiment,stego images are obtained by embedding the same secret information into 4 different cover images.It can be seen from Tab.2 that PSNR values of the proposed method are much higher than the image quality standard of 38 dB,which proves that the quality of stego images is high.In addition,PSNR values of the proposed algorithm,MPsE (1,7,3) coding,and MPsE (1,3,2) coding are higher than that of other existing algorithms.It should be noted that the results of the existing methods have been taken from [29].

    Table 2:A comparison between PSNR values obtained by the proposed method and 10 other existing embedding methods

    Tab.3 shows the results of a performance comparison,in terms of PSNR,between the proposed method and some existing techniques,which are the classical LSB method,Jassim [34]method,Muhammad et al.[35]method (V1),Bailey et al.[36]method,Muhammad et al.[35]method (V2),and Rehman et al.[37]method.These results indicate that,for 8 different images,the proposed method outperforms the existing techniques.For a fair comparison,we used a secret message of same size,which is 104,857 bits.It should be noted that the results of the existing methods for the first 4 images have been taken from [37],and the results for the remaining 4 images have been obtained by applying the existing methods on these images.Tab.4 shows the average PSNR and Loss function values obtained during the training of the proposed de-noising CNN for various epochs.From this table,it is clear that by varying the epochs from 45 to 50,the loss function value decreases and the average PSNR value increases.No further change occurred in PSNR and loss function values with more epochs.This indicates that the proposed de-noising technique has enhanced the stego image.The time taken for the whole de-noising process is 0.06274404613333336 min.

    Table 3:Performance comparison,in terms of PSNR,for hiding same size secret message in 8 digital images

    Table 4:Average PSNR and loss function values for various epochs of the proposed de-noise CNN

    Tab.5 shows a number of histograms of cover images and the corresponding stego images obtained by the proposed method for a medical image and other various images.As the table shows,the histograms of the stego images nearly resemble the corresponding histograms of the cover images.This indicates that the proposed method is robust to statistical attacks and has good imperceptibility (undetectability).Tab.6 shows that the MSE value,for the stego-image compared with cover image,is 0.0008099873860677084,which is very close to zero,and PSNR values before and after enhancing the stego-image are 79.04602105203877 db,and 361.20199909921956 db,respectively.The resemblance of cover image and stego-image is evaluated by SSIM values,before and after resolution enhancement,which are 0.99 and 1.0,respectively.This indicates that the cover and stego images are indistinguishable.

    Table 5:Histograms of various cover images and corresponding stego images obtained by the proposed method

    Fig.5 shows a comparison of the encryption time,decryption time,and total time,of the proposed method and existing methods:Selected Position Method [38],Matrix Reordering [39],Chaotic Algorithm [40],3D Chaotic Map [41],Rubik’s Cube [42],Poker Shuffle [43].It also shows the speed up of the proposed method with respect to these methods.It can be seen from Fig.5 that the proposed method outperforms all other existing method.It should be noted that the times of the existing methods have been taken from [38],and the speed up of the proposed method with respect to other methods was calculated as follows:

    Table 6:MSE,PSNR and SSIM values for Retina image

    Figure 5:Comparison with existing methods [38-43]

    The performance of the proposed method has been evaluated in terms of PSNR,histogram analysis,MSE,and SSIM value,and the encryption and decryption times.Based on these metrics,the performance of the proposed method has been compared with some existing methods.The experimental results proved that proposed method outperforms all existing methods in terms of various performance metrics.It achieved better PSNR value than existing methods for various images,with similar size of secret information of 104,857 bits.The time comparisons showed that the proposed method has better encryption time,decryption time,and speed up than the existing methods.

    The histogram analysis performed on a medical image and other various images,showed that the stego images histograms nearly resemble the corresponding cover images histograms,which indicates that the proposed method is robust to statistical attacks and has good imperceptibility.Also,the resemblance between the cover image and the stego-image has been evaluated by SSIM values,and the results indicated that they are indistinguishable.The efficiency of the proposed CNN-based de-noising technique has been evaluated by varying the epochs from 45 to 50 in the training process.It has been observed that the loss function value decreases and the average PSNR value increases.No further change occurred in PSNR and loss function values with more epochs.This indicates that this technique has enhanced the stego image.The time taken for the whole de-noising process is 0.06274404613333336 min.

    5 Conclusion

    This paper has presented a proposed steganography method,which is a combination of various steganography techniques,for secure transmission of secret data over unsecure network from sender to receiver without any data loss or modification or unauthorized access.The combined techniques are PRM,DES,LSB,CNN-based de-noising,and Embedded Zero-trees of wavelet transform.Firstly,in the pre-processing step,PRM is used to resize the cover image.Then,the secret data is encrypted with a generated secret key using the DES algorithm.Next,the LSB embedding is carried out to hide the secret data inside the cover image,and a CNN-based denoising model is used to enhance the stego image.Finally,the Embedded Zero-trees of wavelet transform is used to compress the enhanced stego image before sending it to the receiver.At the receiver end,the reverse steganography process is performed to extract the embedded data from the stego image.The experimental results indicate that the proposed steganography method offers better security,imperceptibility and robustness and requires less processing time as compared to existing methods.

    Acknowledgement:This project was supported financially by the Academy of Scientific Research&Technology (ASRT),Egypt.Grant No.6439 under the project ScienceUp.(ASRT) is the 2nd affiliation of this research.

    Funding Statement:This project was supported financially by the (ASRT),Egypt.Grant No.6439.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲中文日韩欧美视频| 久久精品成人免费网站| 午夜免费成人在线视频| 亚洲中文日韩欧美视频| 俄罗斯特黄特色一大片| 久久婷婷成人综合色麻豆| 亚洲午夜理论影院| 亚洲精品久久午夜乱码| 法律面前人人平等表现在哪些方面| 两性夫妻黄色片| 男女下面插进去视频免费观看| 欧美变态另类bdsm刘玥| 亚洲第一av免费看| 国产亚洲精品第一综合不卡| 国产高清videossex| 叶爱在线成人免费视频播放| 在线天堂中文资源库| 久久精品aⅴ一区二区三区四区| netflix在线观看网站| 午夜激情久久久久久久| 国产成人一区二区三区免费视频网站| 最黄视频免费看| 亚洲熟妇熟女久久| 精品一区二区三卡| 国产一区二区三区视频了| 亚洲色图综合在线观看| av一本久久久久| 一区二区av电影网| 亚洲人成电影观看| 国产不卡一卡二| 变态另类成人亚洲欧美熟女 | 午夜福利一区二区在线看| 欧美日韩精品网址| 亚洲国产欧美在线一区| 51午夜福利影视在线观看| 久久久国产欧美日韩av| 亚洲一区中文字幕在线| 成人18禁在线播放| 高清毛片免费观看视频网站 | 十八禁网站免费在线| 国产精品久久久久久精品电影小说| 成人国语在线视频| 色94色欧美一区二区| 又紧又爽又黄一区二区| 国产aⅴ精品一区二区三区波| 香蕉丝袜av| 国产又爽黄色视频| 久久久久网色| 制服人妻中文乱码| 国产欧美日韩一区二区精品| 捣出白浆h1v1| 国产一区二区三区视频了| 国产免费视频播放在线视频| 菩萨蛮人人尽说江南好唐韦庄| 国产精品成人在线| 日本a在线网址| 国产av一区二区精品久久| 精品久久蜜臀av无| 日韩 欧美 亚洲 中文字幕| 精品一区二区三区av网在线观看 | 欧美成狂野欧美在线观看| 一区福利在线观看| xxxhd国产人妻xxx| 国产精品偷伦视频观看了| av在线播放免费不卡| 免费久久久久久久精品成人欧美视频| 精品乱码久久久久久99久播| 亚洲中文日韩欧美视频| 两人在一起打扑克的视频| 国产av精品麻豆| www.自偷自拍.com| 国产成人免费无遮挡视频| 久久人妻福利社区极品人妻图片| 天天操日日干夜夜撸| 九色亚洲精品在线播放| 免费在线观看黄色视频的| 国产精品香港三级国产av潘金莲| 亚洲avbb在线观看| 五月开心婷婷网| 下体分泌物呈黄色| 午夜福利在线观看吧| 日本五十路高清| 正在播放国产对白刺激| 国产福利在线免费观看视频| 精品人妻1区二区| 在线观看66精品国产| 高潮久久久久久久久久久不卡| 亚洲精品中文字幕一二三四区 | 精品久久久久久久毛片微露脸| 九色亚洲精品在线播放| 制服人妻中文乱码| 国产精品 国内视频| 国产欧美日韩一区二区三区在线| 国产99久久九九免费精品| 欧美日韩成人在线一区二区| 日韩欧美一区视频在线观看| 两性午夜刺激爽爽歪歪视频在线观看 | 国产97色在线日韩免费| 一区二区日韩欧美中文字幕| 一本大道久久a久久精品| 亚洲黑人精品在线| 久久婷婷成人综合色麻豆| 久久这里只有精品19| 亚洲欧美色中文字幕在线| 夜夜骑夜夜射夜夜干| 久久久精品国产亚洲av高清涩受| 亚洲精品美女久久久久99蜜臀| 每晚都被弄得嗷嗷叫到高潮| 精品少妇久久久久久888优播| 久久久国产成人免费| 黄片小视频在线播放| 人人妻,人人澡人人爽秒播| 免费久久久久久久精品成人欧美视频| 亚洲欧美一区二区三区黑人| 久久久久久久大尺度免费视频| 成人三级做爰电影| 亚洲一卡2卡3卡4卡5卡精品中文| 18禁美女被吸乳视频| 91精品三级在线观看| 不卡av一区二区三区| 国产亚洲欧美精品永久| 啦啦啦 在线观看视频| 又紧又爽又黄一区二区| 热99re8久久精品国产| 老司机影院毛片| av视频免费观看在线观看| av电影中文网址| 久久热在线av| 十分钟在线观看高清视频www| 99国产综合亚洲精品| 每晚都被弄得嗷嗷叫到高潮| 一区二区三区国产精品乱码| 成人手机av| 日韩视频在线欧美| 亚洲五月色婷婷综合| 99国产精品99久久久久| av网站在线播放免费| 69精品国产乱码久久久| 亚洲黑人精品在线| 国产一卡二卡三卡精品| 国产日韩欧美视频二区| 天堂8中文在线网| 如日韩欧美国产精品一区二区三区| 精品一区二区三卡| 午夜免费成人在线视频| av国产精品久久久久影院| 香蕉丝袜av| 少妇被粗大的猛进出69影院| av一本久久久久| 黄色a级毛片大全视频| 免费在线观看影片大全网站| 午夜福利免费观看在线| 一本色道久久久久久精品综合| 亚洲精品一卡2卡三卡4卡5卡| 国产伦理片在线播放av一区| 99久久国产精品久久久| 一边摸一边做爽爽视频免费| 肉色欧美久久久久久久蜜桃| 久久热在线av| 亚洲第一av免费看| 欧美精品一区二区免费开放| 日韩免费高清中文字幕av| 天天躁狠狠躁夜夜躁狠狠躁| 亚洲精华国产精华精| 色视频在线一区二区三区| 十八禁高潮呻吟视频| 精品福利永久在线观看| 日日爽夜夜爽网站| 欧美黑人精品巨大| 精品久久久久久电影网| 老司机在亚洲福利影院| 1024香蕉在线观看| 十八禁人妻一区二区| 中文字幕av电影在线播放| 色在线成人网| 欧美精品一区二区免费开放| 中文字幕精品免费在线观看视频| 精品少妇黑人巨大在线播放| 婷婷丁香在线五月| 免费在线观看影片大全网站| 日韩人妻精品一区2区三区| 亚洲色图综合在线观看| 国产精品久久久人人做人人爽| 69精品国产乱码久久久| 成年版毛片免费区| 亚洲精品粉嫩美女一区| 免费av中文字幕在线| 久久久久久久国产电影| 免费观看人在逋| 国产高清国产精品国产三级| 新久久久久国产一级毛片| av超薄肉色丝袜交足视频| 久久99热这里只频精品6学生| 精品亚洲成a人片在线观看| 国产黄色免费在线视频| 欧美国产精品va在线观看不卡| 亚洲,欧美精品.| 久久久精品国产亚洲av高清涩受| 热re99久久精品国产66热6| 99国产综合亚洲精品| 中文字幕最新亚洲高清| 巨乳人妻的诱惑在线观看| 久久午夜亚洲精品久久| 午夜激情av网站| 亚洲精品美女久久av网站| 一本—道久久a久久精品蜜桃钙片| 在线观看66精品国产| 人人妻人人澡人人爽人人夜夜| av网站在线播放免费| 欧美 日韩 精品 国产| 天堂中文最新版在线下载| 精品第一国产精品| 巨乳人妻的诱惑在线观看| 麻豆国产av国片精品| 久久精品亚洲熟妇少妇任你| videosex国产| 50天的宝宝边吃奶边哭怎么回事| 国产av一区二区精品久久| 国产精品秋霞免费鲁丝片| 精品福利观看| 精品久久久久久久毛片微露脸| 正在播放国产对白刺激| 精品国产一区二区三区四区第35| 日本撒尿小便嘘嘘汇集6| 一级a爱视频在线免费观看| 成人亚洲精品一区在线观看| 日本av手机在线免费观看| 精品一区二区三卡| 成人国产av品久久久| 一本一本久久a久久精品综合妖精| 三级毛片av免费| 女同久久另类99精品国产91| 亚洲一码二码三码区别大吗| 色播在线永久视频| 日韩欧美一区二区三区在线观看 | 欧美黄色淫秽网站| 少妇粗大呻吟视频| 国产黄频视频在线观看| 亚洲欧美精品综合一区二区三区| 亚洲精品中文字幕一二三四区 | 男女之事视频高清在线观看| 亚洲午夜理论影院| 亚洲中文av在线| 国产成人啪精品午夜网站| 欧美+亚洲+日韩+国产| 中亚洲国语对白在线视频| 大片免费播放器 马上看| 国产精品久久久人人做人人爽| 亚洲成a人片在线一区二区| 亚洲五月色婷婷综合| 91av网站免费观看| 久久国产亚洲av麻豆专区| 欧美 日韩 精品 国产| 国产有黄有色有爽视频| 成年女人毛片免费观看观看9 | 亚洲中文字幕日韩| 亚洲黑人精品在线| 国产在视频线精品| 免费高清在线观看日韩| 黄色毛片三级朝国网站| 十八禁网站免费在线| 欧美中文综合在线视频| 精品亚洲乱码少妇综合久久| 中文字幕人妻熟女乱码| 国产精品久久久久久精品古装| 纵有疾风起免费观看全集完整版| av电影中文网址| 国产欧美亚洲国产| 久久国产精品人妻蜜桃| 一区福利在线观看| 一本—道久久a久久精品蜜桃钙片| 飞空精品影院首页| 久久九九热精品免费| 亚洲色图av天堂| 国产男女超爽视频在线观看| 美女福利国产在线| 欧美激情极品国产一区二区三区| 黄色怎么调成土黄色| 久久精品熟女亚洲av麻豆精品| 午夜精品久久久久久毛片777| 黄色视频在线播放观看不卡| 纵有疾风起免费观看全集完整版| 欧美 亚洲 国产 日韩一| av有码第一页| 久久青草综合色| 亚洲视频免费观看视频| 欧美日韩亚洲国产一区二区在线观看 | 精品福利观看| 久久久久久久精品吃奶| 色婷婷久久久亚洲欧美| 91av网站免费观看| 国产亚洲精品一区二区www | 色婷婷av一区二区三区视频| 亚洲专区中文字幕在线| 在线观看免费午夜福利视频| 久久久久久久大尺度免费视频| 黄片大片在线免费观看| 欧美日韩精品网址| av网站免费在线观看视频| 国产成+人综合+亚洲专区| 久久久水蜜桃国产精品网| 正在播放国产对白刺激| 久久毛片免费看一区二区三区| 久久久久视频综合| 国产在线观看jvid| 两性夫妻黄色片| 激情在线观看视频在线高清 | 一区在线观看完整版| 国产精品一区二区精品视频观看| 亚洲国产精品一区二区三区在线| 99国产精品一区二区三区| 日韩熟女老妇一区二区性免费视频| 青青草视频在线视频观看| 欧美变态另类bdsm刘玥| www.熟女人妻精品国产| 国产精品国产av在线观看| 精品欧美一区二区三区在线| 丁香六月天网| 老司机午夜十八禁免费视频| 日本五十路高清| 99久久国产精品久久久| 自线自在国产av| 久久香蕉激情| 老司机靠b影院| 亚洲人成电影观看| 久久久精品区二区三区| 国产精品偷伦视频观看了| 老司机在亚洲福利影院| 久久免费观看电影| 国产精品一区二区精品视频观看| 久久天躁狠狠躁夜夜2o2o| 在线 av 中文字幕| 国产福利在线免费观看视频| a级毛片黄视频| 亚洲七黄色美女视频| 欧美日韩国产mv在线观看视频| 欧美日韩中文字幕国产精品一区二区三区 | 又黄又粗又硬又大视频| 国产精品av久久久久免费| 亚洲av片天天在线观看| 亚洲人成77777在线视频| 黄片播放在线免费| 国产欧美日韩精品亚洲av| 人人澡人人妻人| 国产不卡av网站在线观看| 黑人猛操日本美女一级片| 在线观看免费视频网站a站| 可以免费在线观看a视频的电影网站| 午夜免费成人在线视频| 首页视频小说图片口味搜索| 欧美精品高潮呻吟av久久| 成人国语在线视频| 日韩 欧美 亚洲 中文字幕| 狂野欧美激情性xxxx| 国产日韩欧美亚洲二区| 成年女人毛片免费观看观看9 | 亚洲视频免费观看视频| 欧美久久黑人一区二区| 人人妻人人爽人人添夜夜欢视频| 看免费av毛片| 久久精品人人爽人人爽视色| 亚洲av成人一区二区三| 国内毛片毛片毛片毛片毛片| 亚洲欧美一区二区三区久久| 天堂中文最新版在线下载| 国产精品久久久久成人av| 肉色欧美久久久久久久蜜桃| 亚洲一区中文字幕在线| 午夜福利在线观看吧| 亚洲专区国产一区二区| 最新的欧美精品一区二区| 一级a爱视频在线免费观看| 色精品久久人妻99蜜桃| 亚洲中文字幕日韩| 美女主播在线视频| 亚洲全国av大片| 一区二区av电影网| 亚洲成人免费av在线播放| 操美女的视频在线观看| 免费黄频网站在线观看国产| 2018国产大陆天天弄谢| 一区福利在线观看| 91大片在线观看| 国产91精品成人一区二区三区 | 大陆偷拍与自拍| 搡老熟女国产l中国老女人| 午夜福利在线免费观看网站| 一本久久精品| 纵有疾风起免费观看全集完整版| 麻豆成人av在线观看| 最新的欧美精品一区二区| 亚洲熟女毛片儿| 国产色视频综合| 亚洲国产欧美日韩在线播放| 视频区图区小说| 亚洲伊人色综图| 在线av久久热| 精品一品国产午夜福利视频| 久久国产精品人妻蜜桃| 亚洲精品粉嫩美女一区| 99九九在线精品视频| 黄色视频,在线免费观看| 夜夜骑夜夜射夜夜干| 亚洲欧美一区二区三区黑人| 亚洲精品一卡2卡三卡4卡5卡| 丝袜人妻中文字幕| 国产精品久久久久久精品古装| 午夜精品久久久久久毛片777| 男人舔女人的私密视频| 一本色道久久久久久精品综合| 久久国产精品男人的天堂亚洲| 亚洲国产中文字幕在线视频| 亚洲,欧美精品.| 久久青草综合色| 国产免费现黄频在线看| 亚洲专区字幕在线| 久久中文字幕一级| 亚洲精品久久午夜乱码| 欧美变态另类bdsm刘玥| 精品久久久久久电影网| 午夜视频精品福利| 久久免费观看电影| 美女福利国产在线| 91精品三级在线观看| 法律面前人人平等表现在哪些方面| 丁香欧美五月| 国产高清国产精品国产三级| 日韩三级视频一区二区三区| 国产亚洲精品一区二区www | 男女高潮啪啪啪动态图| 久久久久精品人妻al黑| 女人爽到高潮嗷嗷叫在线视频| 欧美日韩中文字幕国产精品一区二区三区 | 成人18禁高潮啪啪吃奶动态图| 日本精品一区二区三区蜜桃| 91精品国产国语对白视频| 亚洲美女黄片视频| 别揉我奶头~嗯~啊~动态视频| 欧美日韩精品网址| 亚洲一区二区三区欧美精品| 亚洲精品在线美女| 黄色片一级片一级黄色片| 亚洲精品在线观看二区| 美女扒开内裤让男人捅视频| 男女床上黄色一级片免费看| netflix在线观看网站| 亚洲七黄色美女视频| 黄色成人免费大全| 制服诱惑二区| videos熟女内射| 老司机午夜福利在线观看视频 | 夜夜夜夜夜久久久久| 久久狼人影院| 黄色a级毛片大全视频| 午夜福利免费观看在线| 国产精品国产高清国产av | 天堂8中文在线网| 日韩熟女老妇一区二区性免费视频| 美国免费a级毛片| 久久亚洲真实| 成人av一区二区三区在线看| 亚洲成国产人片在线观看| 午夜福利一区二区在线看| 亚洲欧美日韩高清在线视频 | 美女国产高潮福利片在线看| 国产色视频综合| 天天躁夜夜躁狠狠躁躁| 欧美成人免费av一区二区三区 | 国产精品九九99| 精品一区二区三区av网在线观看 | 亚洲天堂av无毛| 免费日韩欧美在线观看| 最近最新免费中文字幕在线| 久久久久久久大尺度免费视频| 成人国产av品久久久| 成人国语在线视频| 久久精品国产亚洲av香蕉五月 | 狠狠精品人妻久久久久久综合| 操美女的视频在线观看| 久久精品国产亚洲av香蕉五月 | 天堂俺去俺来也www色官网| 最黄视频免费看| 精品亚洲成a人片在线观看| 法律面前人人平等表现在哪些方面| 国产精品二区激情视频| 美国免费a级毛片| 老鸭窝网址在线观看| 一边摸一边抽搐一进一出视频| 日韩欧美免费精品| 久久精品国产综合久久久| 亚洲av日韩精品久久久久久密| 啦啦啦中文免费视频观看日本| 天堂动漫精品| 丰满迷人的少妇在线观看| 国产伦理片在线播放av一区| 中文字幕最新亚洲高清| 国产精品香港三级国产av潘金莲| 成人影院久久| 五月开心婷婷网| 国产精品国产高清国产av | 脱女人内裤的视频| 亚洲精品中文字幕一二三四区 | 两人在一起打扑克的视频| 一区二区日韩欧美中文字幕| 日日爽夜夜爽网站| 男女下面插进去视频免费观看| 欧美日韩黄片免| 日韩大片免费观看网站| 国产91精品成人一区二区三区 | a级毛片在线看网站| 久久久久久久大尺度免费视频| 大码成人一级视频| 十八禁网站网址无遮挡| 欧美国产精品va在线观看不卡| 国产色视频综合| 在线观看人妻少妇| 丰满迷人的少妇在线观看| 黄色视频,在线免费观看| 在线观看66精品国产| 18禁黄网站禁片午夜丰满| 久久国产精品男人的天堂亚洲| 我的亚洲天堂| 亚洲精品中文字幕一二三四区 | 母亲3免费完整高清在线观看| 色老头精品视频在线观看| cao死你这个sao货| 亚洲欧美精品综合一区二区三区| av超薄肉色丝袜交足视频| 亚洲成人免费电影在线观看| 国产区一区二久久| 人妻一区二区av| 一本大道久久a久久精品| 桃红色精品国产亚洲av| 精品亚洲成国产av| 天堂8中文在线网| 一夜夜www| 丝袜在线中文字幕| 大片电影免费在线观看免费| 日本黄色日本黄色录像| 五月天丁香电影| 欧美日韩一级在线毛片| 国产主播在线观看一区二区| 日日爽夜夜爽网站| 国产精品 国内视频| 黑人巨大精品欧美一区二区蜜桃| 多毛熟女@视频| 国产精品一区二区在线观看99| 侵犯人妻中文字幕一二三四区| 三级毛片av免费| 久久精品国产亚洲av香蕉五月 | 涩涩av久久男人的天堂| 久久热在线av| 亚洲七黄色美女视频| 少妇粗大呻吟视频| 午夜成年电影在线免费观看| 国产成人精品在线电影| 亚洲欧美激情在线| 在线av久久热| 捣出白浆h1v1| 水蜜桃什么品种好| 亚洲人成伊人成综合网2020| 欧美激情 高清一区二区三区| 国产精品久久久久成人av| 免费观看a级毛片全部| av在线播放免费不卡| 国产免费视频播放在线视频| 一级片免费观看大全| 嫩草影视91久久| av天堂久久9| 黄频高清免费视频| 久久婷婷成人综合色麻豆| 熟女少妇亚洲综合色aaa.| 亚洲精品国产精品久久久不卡| 黄色成人免费大全| 亚洲免费av在线视频| 99国产精品免费福利视频| 久久精品亚洲熟妇少妇任你| 操出白浆在线播放| av视频免费观看在线观看| 在线观看舔阴道视频| 香蕉国产在线看| 成年动漫av网址| 精品卡一卡二卡四卡免费| 久久性视频一级片| 国产xxxxx性猛交| 男男h啪啪无遮挡| 一区二区三区精品91| 久久国产精品男人的天堂亚洲| 在线观看免费高清a一片| 99riav亚洲国产免费| 波多野结衣av一区二区av| 亚洲 欧美一区二区三区| 男女边摸边吃奶| 日韩成人在线观看一区二区三区| 看免费av毛片| 亚洲一区二区三区欧美精品| 亚洲国产毛片av蜜桃av| 99精品在免费线老司机午夜| 国产黄色免费在线视频| 在线观看一区二区三区激情| 在线观看免费高清a一片| 一区二区三区精品91| 亚洲国产看品久久| 精品卡一卡二卡四卡免费| 欧美乱妇无乱码| 日韩欧美一区视频在线观看| av电影中文网址| 日韩有码中文字幕| 久久中文看片网| 一边摸一边抽搐一进一出视频| 亚洲伊人久久精品综合| 国产欧美日韩精品亚洲av| 变态另类成人亚洲欧美熟女 | 亚洲久久久国产精品| 97人妻天天添夜夜摸|