Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(1.88MB)
This is an Open Access publication published under CSC-OpenAccess Policy.
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
Debasree Sarkar, Amitava Nag, Sushanta Biswas, Partha Pratim Sarkar
Pages - 561 - 570     |    Revised - 31-01-2011     |    Published - 08-02-2011
Volume - 4   Issue - 6    |    Publication Date - January / February  Table of Contents
MORE INFORMATION
KEYWORDS
Visualization, Wiki, Knowledge Discovery, Search Engine
ABSTRACT
Image steganography is the art of hiding information into a cover image. This paper presents a novel technique for Image steganography based on DWT, where DWT is used to transform original image (cover image) from spatial domain to frequency domain. Firstly two dimensional Discrete Wavelet Transform (2-D DWT) is performed on a gray level cover image of size M × N and Huffman encoding is performed on the secret messages/image before embedding. Then each bit of Huffman code of secret message/image is embedded in the high frequency coefficients resulted from Discrete Wavelet Transform. Image quality is to be improved by preserving the wavelet coefficients in the low frequency sub-band. The experimental results show that the algorithm has a high capacity and a good invisibility. Moreover PSNR of cover image with stego-image shows the better results in comparison with other existing steganography approaches. Furthermore, satisfactory security is maintained since the secret message/image cannot be extracted without knowing decoding rules and Huffman table.
CITED BY (61)  
1 Anju, P. S., Kuriakose, B., & Paul, V. A Survey On Steganographic Methods Used in Information Hiding.
2 Singh, K. (2016). Image Steganography Scheme Using Parent Child Relationship in Wavelet Domain. British Journal of Applied Science & Technology, 14(4), 1.
3 Yadav, M., & Dhankhar, A. (2015). A-Review on Image Steganography. International Journal for Innovative Research in Science and Technology, 2(2), 243-248.
4 Sahu, P., & Chourasia, B. (2015). State of the Art in Modern Steganography-A review. International Journal of Advanced Electronics and Communication Systems, 4(1).
5 Rubab, S., & Javed, Y. (2015). Efficient Image Steganogrphic Algorithms Utilizing Transforms: Wavelet and Contourlet with Blowfish Encryption. International Journal of Computer Network and Information Security (IJCNIS), 7(2), 15.
6 Rasheed, Z. A. S. (2015). ’Steganography Technique for Binary Text Image. International Journal of Science and Research (IJSR) ISSN (Online), 2319-7064.
7 Ujianto, e., harjoko, a., wardoyo, r., & moesriami, a. (2015). cascaded image steganography to increase robustness againts attack of the stego image. journal of theoretical & applied information technology, 79(3).
8 Kaur, R., & Prabha, E. C. a novel technique of image steganography.
9 Nuri, S. A Modified Robust and Effective Algorithm with Mathematical Calculation for Minutiae Detection.
10 Goel, S., Kumar, P., & Saraswat, R. High Capacity Image Steganography Method Using LZW, IWT and Modified Pixel Indicator.
11 Parul, M., & Rohil, H. (2014). Optimized Image Steganography using Discrete Wavelet Transform (DWT). International Journal of Recent Development in Engineering and Technology (IJRDET), 2(2), 75-81.
12 Nag, A., Singh, J. P., Biswas, S., Sarkar, D., & Sarkar, P. P. (2014). A Huffman Code Based Image Steganography Technique. In Applied Algorithms (pp. 257-265). Springer International Publishing.
13 Zan, M. M., & Aye, N. (2014). Implementation of Secure Steganography System Based on DWT in RGB Color Channel. IJCCER, 2(3), 114-118.
14 Manjunatha Reddy, H. S. (2014). Design of image steganographic systems for covert communication.
15 Azaminezhad, M. S., & Bidgoli, A. M. (2014). A new high capacity steganography based on bit-inverting method in DWT domain. Journal of Advanced Computer Science & Technology, 3(2), 169-178.
16 Mandal, P. C. (2014). A study of Steganography Techniques using Discrete Wavelet Transform. Journal of Global Research in Computer Science, 5(5), 7-14.
17 Kalami, A. (2014). A modified robust and effective algorithm with mathematical calculation for minutiae detection. Physical Sciences Research International, 2(1), 1-5.
18 Jana, B., Mondal, S. K., Jana, S., & Giri, D. (2014, February). Cheating prevention in Visual Cryptographic Schemes using message embedding: A hardware based practical approach. In Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on (pp. 319-324). IEEE.
19 Garg, S., & Mathur, M. (2014, February). Chaotic map based steganography of gray scale images in wavelet domain. In Signal Processing and Integrated Networks (SPIN), 2014 International Conference on (pp. 689-694). IEEE.
20 REZA, W. (2014). Implementasi Slantlet Transform (SLT) dan Huffman Coding pada Steganografi Citra Grayscale. Skripsi, Fakultas Ilmu Komputer.
21 Thanikaiselvan, V., Arulmozhivarman, P., Chakrabarty, S., Agarwal, A., Subashanthini, S., & Amirtharajan, R. (2014). Comparative Analysis of (5/3) and Haar IWT Based Steganography. Information Technology Journal, 13(16), 2534.
22 Nag, A., Singh, J. P., Biswas, S., Sarkar, D., & Sarkar, P. P. (2014, January). A Huffman Code Based Image Steganography. In Applied Algorithms: First International Conference, ICAA 2014, Kolkata, India, January 13-15, 2014. Proceedings (Vol. 8321, p. 257). Springer..
23 Goel, S., Kumar, P., & Saraswat, R. High Capacity Image Steganography Method Using LZW, IWT and Modified Pixel Indicator.
24 Maan, V. K., & Dhaliwal, H. S. 32× 32 Vector Quantization Based Colour Image Steganography.
25 Shahana, T. A Secure DCT Image Steganography based on Public-Key Cryptography.
26 Sahana, S., Sen, J., & Mondal, C. Secure Adaptive N-cryption (SAN).
27 Dagar, S. (2013). RGB Based Dual Key Image Steganography.
28 Mondal, A., Sahana, S., & Mahata, S. K. (2013, April). A Pictorial Block Steganography based Secure Algorithm for Data Transfer. In IJCA Special Issue on International Conference on Computing, Communication and Sensor Network (No. 4, pp. 12-15). Foundation of Computer Science (FCS).
29 Yajurvedi, A. H., & Kulkarni, S. (2013, January). An Adaptive Image Steganography Algorithm Using Successive Pixel Difference Embedding and Integer Wavelet Transform. In Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012) (pp. 203-212). Springer India.
30 Kanzariya, N., Nimavat, A., & Patel, H. (2013). Security of Digital Images using Steganography Techniques based on LSB, DCT and Huffman Encoding.
31 Lin, Q., Wang, R., Ye, N., & Wang, Z. (2013). Energy efficient distributed steganography for secure communication in wireless multimedia sensor networks. Journal of Electronics (China), 30(1), 9-16.
32 Zhou, Y., & Ng, W. W. (2013, July). A study of influence between digital watermarking and steganography. In Wavelet Analysis and Pattern Recognition (ICWAPR), 2013 International Conference on (pp. 49-55). IEEE.
33 Atawneh, S., & Sumari, P. (2013). Hybrid and Blind Steganographic Method for Digital Images Based on DWT and Chaotic Map. Journal of Communications, 8(11).
34 Sehgal, P., & Sharma, V. K. (2013). Eliminating Cover Image Requirement in Discrete Wavelet Transform based Digital Image Steganography. International Journal of Computer Applications, 68(3), 37-42.
35 Mazumder, J. A., & Hemachandran, K. (2013). Study of Image steganography using LSB, DFT and DWT. International Journal of Computers & Technology, 11(5), 2618-2627.
36 Mann, V. K., & Dhaliwal, H. S. (2013). 32* 32 Colour Image Steganography. International Journal of Engineering Trends and Technology (IJETT) Vol, 4.
37 Mazumder, J. A., & Hemachandran, K. (2013). A high capacity and secured color image steganographic technique using discrete wavelet transformation. International Journal of Computer Science and Information Technologies, 4(4), 583-589.
38 Mann, V. K., Dhaliwal, H. S., & Dhaliwal, H. S. Nav view search.
39 Kamble, S. V., & Warvante, B. G. A Review on Novel Image Steganography Techniques.
40 Chaturvedi, P., & Bairwa, R. K. Image Steganography Method for Hiding Secret Message in Colored Images by Using IWT.
41 Rasheed, Z. A. S. Comparative Study for Steganography Techniques.
42 Satyavathy, G., & Punithavalli, M. (2012). Distinct Steganographic Approach for 4D-DCT Combined with RSA and HAAR-DWT for Safe Delivery of Text and Images without Distortion. European Journal of Scientific Research, 91(4), 555-562.
43 Pandian, N., & Thangavel, R. (2012). Gray Coded Grayscale Image Steganoraphy using Hufman Encoding. International Journal of Image Processing (IJIP), 6(5), 334.
44 Goel, M. K., & Jain, N. (2012). A RSA-DWT Based Visual Cryptographic Steganogrphy Technique. International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE), 1(2), pp-95.
45 Nithyanandam, P., Ravichandran, T., Priyadharshini, E., & Santron, N. M. (2012). An image steganography for colour images using lossless compression technique. International Journal of Computational Science and Engineering, 7(3), 194-205.
46 Cauvery, N. K. Empirical Computation Of Rs-Analysis For Building Robust Steganography Using Integer Wavelet Transform And Genetic Algorithm.
47 Masoumi, M., & Amiri, S. (2012). A High Capacity Digital Watermarking Scheme for Copyright protection of Video Data based on YCbCr Color Channels Invariant to Geometric and Non-Geometric Attacks. International Journal of Computer Applications, 51(13), 0975-8887.
48 Vongurai, N., & Phimoltares, S. (2012, September). Frequency-Based Steganography Using 32x32 Interpolated Quantization Table and Discrete Cosine Transform. In Computational Intelligence, Modelling and Simulation (CIMSiM), 2012 Fourth International Conference on (pp. 249-253). IEEE.
49 Raftari, N., & Moghadam, A. M. E. (2012, July). Digital Image Steganography Based on Assignment Algorithm and Combination of DCT-IWT. In Computational Intelligence, Communication Systems and Networks (CICSyN), 2012 Fourth International Conference on (pp. 295-300). IEEE.
50 Chanu, Y. J., Singh, K. M., & Tuithung, T. (2012). Image steganography and steganalysis: A survey. International Journal of Computer Applications, 52(2).
51 Raftari, N., & Moghadam, A. M. E. (2012, May). Digital image steganography based on integer wavelet transform and assignment algorithm. In Modelling Symposium (AMS), 2012 Sixth Asia (pp. 87-92). IEEE.
52 Rubab, S., & Younus, M. (2012). Improved image steganography technique for colored images using wavelet transform. image, 100, 512x512.
53 Dey, N., Roy, A. B., & Dey, S. (2012). A novel approach of color image hiding using RGB color planes and DWT. arXiv preprint arXiv:1208.0803.
54 Zan, M. M., & Aye, N. A Modified High Capacity Colored Image Steganography in RGB Color Space.
55 Vishwakarma, D., Maheshwari, S., & Joshi, S. Efficient Information Hiding Technique Using Steganography.
56 Kumar, D., & Anand, B. Evaluation of RS-Analysis Proficiency by Genetic Algorithm for Robust Steganography using IWT.
57 N. Dey , A. Bardhan Roy and S. Dey, “A Novel Approach of Color Image Hiding using RGB Color planes and DWT”, International Journal of Computer Applications, 36(5), pp. 19-24, December 2011.
58 N. Dey , A. Bardhan Roy and S. Dey, “A Novel Approach of Color Image Hiding using RGB Color planes and DWT”, International Journal of Computer Applications, 36(5), pp. 19-24, December 2011.
59 P.Nithyanandam , T.Ravichandran , N.M.Santron and E. Priyadharshini, “A Spatial Domain Image Steganography Technique Based on Matrix Embedding and Huffman Encoding”, International Journal of Computer Science and Security (IJCSS), 5(5), pp. 456 – 468, 2011.
60 Nithyanandam, P., Ravichandran, T., Santron, N. M., & Priyadarshini, E. (2011). A spatial domain image steganography technique based on matrix embedding and huffman encoding. International Journal of Computer Science and Security (IJCSS), 5(5), 456.
61 Nag, A., Singh, J. P., Khan, S., Ghosh, S., Biswas, S., Sarkar, D., & Sarkar, P. P. (2011). A Weighted Location Based LSB Image Steganography Technique. In Advances in Computing and Communications (pp. 620-627). Springer Berlin Heidelberg.
1 Google Scholar
2 Academic Journals Database
3 CiteSeerX
4 refSeek
5 iSEEK
6 Socol@r
7 ResearchGATE
8 Libsearch
9 Scribd
10 WorldCat
11 SlideShare
12 PdfSR
1 N. F. Johnson and S. Katzenbeisser, “A survey of steganographic techniques”. Information Hiding, Artech House, pp. 43-78, 2000.
2 Moerland, T. “Steganography and Steganalysis”. Leiden Institute of Advanced Computing Science, www.liacs.nl/home/ tmoerl/privtech.pdf
3 Chan, C.K. and Cheng. L.M. “Hiding data in image by simple LSB substitution”. Pattern Recognition, 37: 469 – 474, 2003.
4 Chang, C.C and Tseng, H.W. “A Steganographic method for digital images using side match”. Pattern Recognition Letters, 25: 1431 – 1437, 2004.
5 Chen, T.S., Chang C.C., and Hwang, M.S. “A virtual image cryptosystem based upon vector quantization”. IEEE transactions on Image Processing, 7,(10): 1485 – 1488, 1998.
6 Chung, K.L., Shen, C.H. and Chang, L.C. “A novel SVD- and VQ-based image hiding scheme. Pattern Recognition Letters” 22: 1051 – 1058, 2001.
7 Iwata, M., Miyake, K., and Shiozaki, A. “Digital Steganography Utilizing Features of JPEG Images, IEICE Transfusion Fundamentals”. E87-A(4):929 – 936, 2004.
8 Chen, P.Y. and Wu, W.E. “A Modified Side Match Scheme for Image Steganography”. International Journal of Applied Science and Engineering, 7(1): 53 – 60, 2009..
9 Chu, Y.P., Guo, S.W., Chan, Y.K. and Wu, H.C. “Image Hiding Based on a Hybrid Technique of VQ Compression and Discrete Wavelet Transform”, International Computer Symposium, 313-317,2004.
10 Mythreyi S and Vaidehi V. “Gabor Transform based Image Steganography”, IETE Journal of Research, 53(2):. 103 – 112,2007.
11 A.A. Abdelwahab, L.A. Hassan. “A discrete wavelet transform based technique for image data hiding”, in: Proceedings of 25th National Radio Science Conference, Egypt, 2008.
12 Bao, P and Ma, X. “Image Adaptive Watermarking Using Wavelet Domain Singular Value Decomposition”, IEEE Transaction on Circuits and Systems for Video Technology, 15(1):2005
13 Maity S.P. and Kundu M.K., “A Blind CDMA Image Watermarking Scheme in Wavelet Domain” IEEE International Conference:2633 – 2336,2004.
14 Chen, P.Y. and Wu, W.E. “A DWT Based Approach for Image Steganography”, International Journal of Applied Science and Engineering, 4,3: 275 –290.
15 Jayaraman, S., Esakkirajan, S. and Veerakumar, T. “Digital Image Processing”, Tata McGraw Hill Education Private Limited, India, 2009.
16 K.B. Raja, C.R. Chowdary, K.R. Venugopal, L.M. Patnaik. “A secure image steganography using LSB, DCT and compression techniques on raw images”. Proceedings of IEEE 3rd International Conference on Intelligent Sensing and Information Processing, ICISIP’05, Bangalore, India, 14–17 December 2005..
17 Debnath Bhattacharyya, Poulami Das, Samir kumar Bandyopadhyay and Tai-hoon Kim. “Text Steganography: A Novel Approach,” International Journal of Advanced Science and Technology, vol.3, pp.79-85, February2009.
18 H. Arafat Ali. “Qualitative Spatial Image Data Hiding for Secure Data Transmission”. GVIP Journal, 7(1):35-43, 2007.
Dr. Debasree Sarkar
- India
Mr. Amitava Nag
- India
it_amitava@yahoo.co.in
Dr. Sushanta Biswas
- India
Dr. Partha Pratim Sarkar
- India