Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(377.58KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
High Capacity and Security Steganography Using Discrete Wavelet Transform
H S Manjunatha Reddy, K B Raja
Pages - 462 - 472     |    Revised - 10-11-2009     |    Published - 12-12-2009
Volume - 3   Issue - 6    |    Publication Date - January 2010  Table of Contents
MORE INFORMATION
KEYWORDS
Steganography, Wavelet Fusion, Security, Imperceptibility, Embedding strength parameters
ABSTRACT
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
CITED BY (53)  
1 Olaniyi, O. M., Arulogun, O. T., Omidiora, O. E., & Okediran, O. O. (2015). Implementing generic security requirements in e–voting using modified stegano–cryptographic approach. International Journal of Information and Computer Security, 7(1), 64-90.
2 Omotosho, A., Adegbola, O., Mikail, O. O., & Emuoyibofarhe, J. (2015). A Secure Electronic Prescription System Using Steganography with Encryption Key Implementation. arXiv preprint arXiv:1502.01264.
3 Sathisha, N., Babu, K. S., Raja, K. B., & Venugopal, K. R. (2015). Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT. International Journal of Image Processing (IJIP), 9(2), 41.
4 Varsaki, E. E., Fotopoulos, V., & Skodras, A. N. (2014). A discrete Gould transform data hiding scheme. Mathematical Methods in the Applied Sciences, 37(2), 283-288.
5 Othman, J. A. (2014). Steganographic scheme to avoid statistical Steganalysis. J. Of College Of Education For Women, 25(1).
6 Bagade, A. M. (2014). A High Quality Steganographic Method Using Morphing. Journal of information processing systems, 10(2), 256-270.
7 Azaminezhad, M. S., & Bidgoli, A. M. (2014). A new high capacity steganography based on bit-inverting method in DWT domain. Journal of Advanced Computer Science & Technology, 3(2), 169-178.
8 Mandal, P. C. (2014). A study of Steganography Techniques using Discrete Wavelet Transform. Journal of Global Research in Computer Science, 5(5), 7-14.
9 aldeen najim Alzubaidy, D. (2014). Paper of Nagham. pdf.
10 Usha, B. A., Srinath, N. K., Nanjangud, N. C. A., Deshpande, A. M., & Rebello, A. (2014). A Survey on Secure and High Capacity Image Steganography Techniques. International Journal of Advanced Research in Computer and Communication Engineering, 2(3).
11 Abdullah, K. A., Al-Jawad, N., & Abdulla, A. A. (2014, May). Effect of using different cover image quality to obtain robust selective embedding in steganography. In SPIE Photonics Europe (pp. 913808-913808). International Society for Optics and Photonics.
12 Desmukh, P. R., & Rahangdale, B. (2014). Hash Based Least Significant Bit Technique For Video Steganography. International Journal of Engineering Research and Applications (IJERA), 4(1).
13 Kumar, S., Gupta, A., Chandwani, A., Yadav, G., & Swarnkar, R. (2014, September). RGB image watermarking on video frames using DWT. In Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference- (pp. 675-680). IEEE.
14 Singh, P., & Chadha, R. S. (2013). A survey of digital watermarking techniques, applications and attacks. International Journal of Engineering and Innovative Technology (IJEIT), 2(9), 165-175.
15 Hussain, M., & Hussain, M. (2013). A survey of image steganography techniques.
16 Sehgal, P., & Sharma, V. K. (2013). Eliminating Cover Image Requirement in Discrete Wavelet Transform based Digital Image Steganography. International Journal of Computer Applications, 68(3), 37-42.
17 Sahu, M., Pradhan, S. R., & Das, M. (2013). Unicode and Colours Mapping for Cryptography and Steganography using Discrete Wavelet Transform. International Journal of Computer Applications, 70(5), 36-41.
18 Tayel, M., Hafez, A., & Shawky, H. (2013, December). A new hybrid fuzzy-decomposed full capacity Stego-system. In High Capacity Optical Networks and Enabling Technologies (HONET-CNS), 2013 10th International Conference on (pp. 16-20). IEEE.
19 ShivaKumar, K. B., Jayaramu, H. S., & Srinidhi, G. A. (2013, September). A novel data hiding technique. In Research & Technology in the Coming Decades (CRT 2013), National Conference on Challenges in (pp. 1-5). IET.
20 Yajurvedi, A. H., & Kulkarni, S. (2013, January). An Adaptive Image Steganography Algorithm Using Successive Pixel Difference Embedding and Integer Wavelet Transform. In Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012) (pp. 203-212). Springer India.
21 Saejung, S., Boondee, A., Preechasuk, J., & Chantrapornchai, C. (2013, September). On the comparison of digital image steganography algorithm based on DCT and wavelet. In Computer Science and Engineering Conference (ICSEC), 2013 International (pp. 328-333). IEEE.
22 Fayyaz, N., Imranuddin, R., Anwar, S. U., & Rukh, L. (2013). Steganography Based Authentication to Prevent IP Spoofing. Life Science Journal, 10(12s).
23 Nagaty, K. A. (2013). Secret Sharing using Image Hashing. International Journal of Computer Applications, 73(20), 14-22.
24 Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012). Image steganography techniques: an overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168-187.
25 Bhattacharyya, S., & Sanyal, G. (2012). A robust image steganography using dwt difference modulation (dwtdm). International Journal of Computer Network and Information Security (IJCNIS), 4(7), 27.
26 Mandal, P. C. (2012). Modern Steganographic technique: A survey. International Journal of Computer Science & Engineering Technology (IJCSET), 3(9), 444-448.
27 Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012). A Comparison between using SIFT and SURF for characteristic region based image steganography. International Journal of Computer Science Issues, 9(33-3), 110-116.
28 Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. (2012, April). Characteristic region based image steganography using Speeded-Up Robust Features technique. In Future Communication Networks (ICFCN), 2012 International Conference on (pp. 141-146). IEEE.
29 Barukab, O. M., Khan, A. I., Shaik, M. S., Murthy, M. R., & Khan, S. A. (2012). Secure Communication Using Symmetric and Asymmetric Cryptographic Techniques. International Journal of Information Engineering and Electronic Business (IJIEEB), 4(2), 36.
30 Anitha, M. P., & Sivanandham, S. N. (2012). An efficient neural network based algorithm for detecting steganography content in corporate mails: A web based steganalysis. IJCSI International journal of computer science issues, 9(3).
31 Sonaniya, A. K., & Rai, R. K. (2012). A Review on Comparison between Different Image Steganography Methods.
32 Hamid, N., Yahya, A., Ahmad, B., Al-Qershi, O. M., Najim, D., & Kanaan, L. (2012). Enhancing the Robustness of Digital Image Steganography Using ECC and Redundancy.
33 Kaur, A., & Kaur, B. Secure The Secret Information In An Image Using K-MM In Steganography.
34 Dalvi, A., & Kamathe, R. S. Color Image Steganography by Using Dual Wavelet Transform (DWT, SWT).
35 M. Subhedar and G. Birajdar, “Block Level Entropy Thresholding Technique for High Volume Image Adaptive Data Hiding”, International Journal on Graphics, Vision and Image Processing, 11(III), pp. 31--38, 2011.
36 F. Zhang, P. Li, Z. G. Hou, Y. Chen, F. Xu, J. Hu, Q. Li. and M. Tan, “SEMG feature extraction methods for pattern recognition of upper limbs”, in Proceedings of Advanced Mechatronic Systems (ICAMechS), 2011 International Conference , Zhengzhou, 11-13 Aug. 2011, pp. 222-227.
37 Zhang, F., Li, P., Hou, Z. G., Chen, Y., Xu, F., Hu, J., ... & Tan, M. (2011, August). SEMG feature extraction methods for pattern recognition of upper limbs. In Advanced Mechatronic Systems (ICAMechS), 2011 International Conference on (pp. 222-227). IEEE.
38 Christaline, J. A., & Vaishali, D. (2011, June). Image steganographic techniques with improved embedding capacity and robustness. In Recent Trends in Information Technology (ICRTIT), 2011 International Conference on (pp. 97-101). IEEE.
39 Subhedar, M., & Birajdar, G. (2011). Block Level Entropy Thresholding Technique for High Volume Image Adaptive Data Hiding. ICGST-GVIP Journal, 11(3).
40 Swetha, V., Prajith, V., & Kshema, V. Data Hiding Using Video Steganography-A Survey.
41 Cauvery, N. K. Empirical Computation Of Rs-Analysis For Building Robust Steganography Using Integer Wavelet Transform And Genetic Algorithm.
42 Kumar, D., & Anand, B. Evaluation of RS-Analysis Proficiency by Genetic Algorithm for Robust Steganography using IWT.
43 Chaturvedi, P., & Bairwa, R. K. Image Steganography Method for Hiding Secret Message in Colored Images by Using IWT.
44 Vyas, A., & Mondikathi, C. international journal of engineering sciences & research technology steganography image in color image using wavelet transform.
45 Girdhar, A., & Kaur, A. Secret Image Sharing Scheme with Steganography and Authentication Based on Discrete Wavelet Transform.
46 M. Sheikhan, K. Asadollahi and E. Hemmati, “High Quality Audio Steganography by Floating Substitution of Lsbs in Wavelet Domain”, World Applied Sciences Journal, 10(12), pp. 1501-1507, 2010.
47 V. J. Vivek , N. Chandrasekar and Y. Srinivas, “Improving Seismic Monitoring System for Small to Intermediate Earthquake Detection”, International Journal of Computer Science and Security (IJCSS), 4(3), pp. 308 – 315, 2010.
48 Bhattacharyya, S., & Sanyal, G. (2010). Data hiding in images in discrete wavelet domain using PMM. World Academy of Science, Engineering and Technology, 68, 597-605.
49 Joevivek, V., Chandrasekar, N., & Srinivas, Y. (2010). Improving seismic monitoring system for small to intermediate earthquake detection. International Journal of Computer Science and Security (IJCSS), 4(3), 308.
50 Thorat, S., & Bokare, M. M. A Dymanic Method To Secure Confidential Data Using Signcryption With Steganography. IJESAT] International Journal Of Engineering Science & Advanced Technology, 2, 183-191.
51 Prajapati, H. A., & Chitaliya, N. G. Secured and Robust Dual Image Steganography: A Survey.
52 Barukab, O. M., Shaik, M. S., Khan, S., & Thorat, S. Signcrypted Audio Steganography: A Sophisticated Technique for Data Security.
53 Bhattacharyyaa, S., & Sanyalb, G. A Robust Video Steganography using DWTDM.
1 Google Scholar
2 Academic Journals Database
3 ScientificCommons
4 CiteSeerX
5 refSeek
6 iSEEK
7 Socol@r
8 ResearchGATE
9 Libsearch
10 Bielefeld Academic Search Engine (BASE)
11 Scribd
12 WorldCat
13 slideshare
14 PdfSR
15 PDFCAST
1 Neil F. Johnson and Sushil Jajodia, “Steganalysis: The Investigation of Hidden Information,” IEEE conference on Information Technology, pp. 113-116, 1998.
2 Lisa M.Marvel and Charles T. Retter, “A Methodlogy for Data Hiding using Images,” IEEE conference on Military communication, vol. 3, Issue. 18-21, pp. 1044-1047, 1998.
3 Giuseppe Mastronardi, Marcello Castellano, Francescomaria Marino, “Steganography Effects in Various Formats of Images. A Preliminary Study,” International Workshop on Intelligent data Acquisition and Advanced Computing Systems: Technology and Applications, pp. 116-119, 2001.
4 LIU Tong, QIU Zheng-ding “A DWT-based color Images Steganography Scheme” IEEE International Conference on Signal Processing, vol. 2, pp.1568-1571, 2002.
5 Jessica Fridrich, Miroslav Goijan and David Soukal, “Higher-order statistical steganalysis of palette images” Proceeding of SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia ContentsV, vol. 5020, pp. 178-190, 2003.
6 Jessica Fridrich and David Soukal, “Matrix Embedding for Large Payloads” SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents , vol. 6072, pp. 727-738. 2006.
7 Yuan-Yu Tsai, Chung-Ming Wang “A novel data hiding scheme for color images using a BSP tree” Journal of systems and software, vol.80, pp. 429-437, 2007.
8 Jun Zhang, Ingemar J. Cox and Gwenael Doerr.G “Steganalysis for LSB Matching in Images With High-frequency Noise” IEEE Workshop on Multimedia Signal Processing, issue 1-3, pp.385- 388, 2007.
9 M. Mahdavi, Sh. Samavi, N. Zaker and M. Modarres-Hashemi, “Steganalysis Method for LSB Replacement Based on Local Gradient of Image Histogram,” Journal of Electrical and Electronic Engineering, vol. 4, no. 3, pp. 59-70, 2008.
10 Shilpa P. Hivrale, S. D. Sawarkar, Vijay Bhosale, and Seema Koregaonkar “Statistical Method for Hiding Detection in LSB of Digital Images: An Overview World Academy of Science, Engineering and Technology, vol. 32, pp. 658-661, 2008.
11 K. B. Raja, S. Sindhu, T. D. Mahalakshmi, S. Akshatha, B. K. Nithin, M. Sarvajith, K. R. Venugopal, L. M. Patnaik, “Robust Image Adaptive Steganography using Integer Wavelets” International conference on Communication Systems Software, pp. 614-621, 2008.
12 Jan Kodovsky, Jessica Fridrich “Influence of Embedding Strategies on Security of Steganographic Methods in the JPEG Domain” Proceedings of SPIE, the International Society for Optical Engineering, vol. 6819, pp. 681902.1-681902.13, 2008.
13 L. Y. Por, W. K. Lai, Z. Alireza, T. F. Ang, M. T. Su, B. Delina, “StegCure: A Comprehensive Steganographic Tool using Enhanced LSB Scheme,” Journal of WSEAS Transctions on Computers, vol. 8, pp. 1309-1318, 2008.
14 Gaetan Le Guelvouit, “Trellis-Coded Quantization for Public-Key Steganography,” IEEE International conference on Acostics, Speech and Signal Processing, pp.108-116, 2008.
15 Mohammed Ali Bani Younes and Aman Jantan, “A New Steganography Approach for Images Encryption Exchange by Using the Least Significant Bit Insertion,” International Journal of Computer Science and Network Security, vol. 8, no. 6, pp.247-257, 2008.
16 Chang-Chu Chen, and Chin-Chen Chang, “LSB-Based Steganography Using Reflected Grey Code,” The Institute of Electronics, Information and communication Engineers Transaction on Information and System,”, vol. E91-D (4), pp. 1110-1116, 2008.
17 Babita Ahuja and, Manpreet Kaur, “High Capacity Filter Based Steganography,” International Journal of Recent Trends in Engineering, vol. 1, no. 1, pp.672-674, May 2009.
18 Debnath Bhattacharyya, Poulami Das, Samir kumar Bandyopadhyay and Tai-hoon Kim, “Text Steganography: A Novel Approach,” International Journal of Advanced Science and Technology, vol.3, pp.79-85, February2009.
19 Chin- Chen Chang, Yung- Chen Chou and Chia- Chen Lin, “A steganography scheme based on wet paper codes suitable for uniformly distributed wet pixels,” IEEE International Symposium on circuits and Systems, pp. 501-504, 2009.
Professor H S Manjunatha Reddy
Global Academy of Technology - India
manjunathareddyhs@rediffmail.com
Dr. K B Raja
- India