Call for Paper - August 2019 Edition
IJCA solicits original research papers for the August 2019 Edition. Last date of manuscript submission is July 20, 2019. Read More

High Imperceptibility Image Steganography Methods based on HAAR DWT

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Y. Taouil, E.B. Ameur, A. Souhar, A. El Harraj, M.T. Belghiti
10.5120/ijca2016908984

Y Taouil, E B Ameur, A Souhar, El A Harraj and M T Belghiti. Article: High Imperceptibility Image Steganography Methods based on HAAR DWT. International Journal of Computer Applications 138(10):38-43, March 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

@article{key:article,
	author = {Y. Taouil and E.B. Ameur and A. Souhar and A. El Harraj and M.T. Belghiti},
	title = {Article: High Imperceptibility Image Steganography Methods based on HAAR DWT},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {138},
	number = {10},
	pages = {38-43},
	month = {March},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}
}

Abstract

While cryptography keeps unknown the hidden content of information, steganography provides a higher level of data security by making even the existence of hidden information secret, it is the art of dissimulating information in digital media considering it as an unremarkable support. In this paper we propose a new two methods of image steganography by using Haar discrete wavelet transform, the secret data are hidden in the frequency domain to minimize the distortions occurring on the cover during the steganographic process. The floating point in the coefficients of the transform can cause a loss in information. To prevent this problem, data is embedded in the integer part of high frequency coefficients in such a way that increases the imperceptibility.

Extensive experiments on variety of images were performed and the results show that the proposed methods provide better image quality and a high imperceptibility in comparison with prior works. This was achieved using a random key that scrambles the location of the pixels where data is hidden.

References

  1. C.P.Sumathi, T.Santanam and G.Umamaheswari "A Study of Various Steganographic Techniques Used for Information Hiding" International Journal of Computer Science \& Engineering Survey (IJCSES) Vol.4, No.6, December 2013.
  2. Kevin Curran & Karen Bailey "An Evaluation of Image Based Steganography Methods" International Journal of Digital Evidence Fall 2003, Volume2, Issue 2.
  3. N. Ajeeshvali and B.Rajasekhar "Steganography Based on Integer Wavelet Transform and Bicubic Interpolation" I.J. Image, Graphics and Signal Processing, 2012, 12, 26- 33.
  4. Shashikala Channalli, Ajay Jadhav Sinhgad "Steganography, An Art of Hiding Data", International Journal on Computer Science and Engineering Vol.1 (3), 2009, 137-141.
  5. Wien Hong & Tung-Shou Chen "Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism", J. Vis. Commun. Image R. 22 (2011) 131-140.
  6. Ki-Hyun Jung & Kee-Young "Steganographic method based on interpolation and LSB substitution of digital images", Multimed Tools Appl DOI 10.1007/s11042-013-1832-y.
  7. Jie Hu, Tianrui Li "Reversible steganography using extended image interpolation technique", Computers & Electrical Engineering, Volume 46, August 2015, Pages 447–455.
  8. Deepak Singla & Rupali Syal "Data Security Using LSB & DCT Steganography In Images", International Journal Of Computational Engineering Research/ ISSN: 2250-3005.
  9. Bo Yang and Beixing Deng "Steganography in gray images using wavelet" In Proceedings of ISCCSP 2006.
  10. Nur Azman Abu, Prajanto Wahyu Adi and Othman Mohd "Robust Digital Image Steganography within Coefficient Difference on Integer Haar Wavelet Transform" International Journal of Video\&Image Processing and Network Security IJVIPNS-IJENS Vol: 14 No: 02.
  11. A. Cheddad, J. Condell, K. Curran, and P.M. Kevitt, "Digital Image Steganography: Survey and Analysis of Current Methods", Digital Signal Processing, vol.90, no.3, pp.727-752, 2010.
  12. B. Li, J. He, J. Huang, and Y. Shi, "A Survey on Image Steganography and Steganalysis", Journal of Information Hiding and Multimedia Signal Processing, vol.2, no.2, pp.142-172, 2011.
  13. R. Roy, S. Changder, A. Sarkar, and N.C. Debnath, "Evaluating Image Steganography Techniques: Future Research Challenges", Computing, Management and Telecommunications (ComManTel), pp.21-24, Ho Chi Minh, Vietnam, 2013.
  14. J. Zollner, H. Federrath, H. Klimant, A. Pitzman, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, "Modeling the Security of Steganographic Systems" Information Hiding Workshop, pp.345-355, Portland, USA, 1998.
  15. C. Cachin "An Information theoretic Model for Steganography", Information and Computation, vol.192, no.1, pp.41-56, 2004.

Keywords

Steganography, Hiding information, Haar discrete wavelet transform, Imperceptibility, Random key.