CFP last date
22 April 2024
Reseach Article

Color Image Steganography using Dual Wavelet Transforms

by Mahdi Abbasi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 47
Year of Publication: 2019
Authors: Mahdi Abbasi
10.5120/ijca2019918639

Mahdi Abbasi . Color Image Steganography using Dual Wavelet Transforms. International Journal of Computer Applications. 181, 47 ( Apr 2019), 32-38. DOI=10.5120/ijca2019918639

@article{ 10.5120/ijca2019918639,
author = { Mahdi Abbasi },
title = { Color Image Steganography using Dual Wavelet Transforms },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2019 },
volume = { 181 },
number = { 47 },
month = { Apr },
year = { 2019 },
issn = { 0975-8887 },
pages = { 32-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number47/30471-2019918639/ },
doi = { 10.5120/ijca2019918639 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:09:22.703304+05:30
%A Mahdi Abbasi
%T Color Image Steganography using Dual Wavelet Transforms
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 47
%P 32-38
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique which hides both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). The cover image and secret image coefficient values are embedded by using a fusion technique. The cover image is a color image and the secret image is a grayscale image. This algorithm first separates RGB color planes of the cover image. Next, the algorithm extracts either DWT or IWT coefficients of both R-plane of the cover image and secret image. These two extracted coefficient values are fused into a single image by using a wavelet-based fusion technique. By taking IDWT/IIWT transform of the fused image the stego image is obtained. Different combinations of DWT/IWT transforms were performed on the scrambled secret image and cover image. Experimental results shows that the proposed method can produce stego images with high level of perceptual invisibility and security.

References
  1. M. Hussain, A. W. A. Wahab, Y. I. B. Idris, A. T. S. Ho, and K.-H. Jung, "Image steganography in spatial domain: A survey," Signal Processing: Image Communication, vol. 65, pp. 46-66, 2018/07/01/ 2018.
  2. I. J. Kadhim, P. Premaratne, P. J. Vial, and B. Halloran, "Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research," Neurocomputing, vol. 335, pp. 299-326, 2019/03/28/ 2019.
  3. H. M. Reddy and K. Raja, "Wavelet based non LSB steganography," International Journal of Advanced networking and applications, vol. 3, p. 1203, 2011.
  4. M. I. S. Reddy and A. P. S. Kumar, "Secured Data Transmission Using Wavelet Based Steganography and Cryptography by Using AES Algorithm," Procedia Computer Science, vol. 85, pp. 62-69, 2016/01/01/ 2016.
  5. M. S. Subhedar and V. H. Mankar, "Image steganography using redundant discrete wavelet transform and QR factorization," Computers & Electrical Engineering, vol. 54, pp. 406-422, 2016/08/01/ 2016.
  6. M. Tolba, M. Ghonemy, I. Taha, and A. Khalifa, "Using integer wavelet transforms in colored image steganography," International Journal on Intelligent Cooperative Information Systems, vol. 4, pp. 230-235, 2004.
  7. [M. F. Tolba, M.-S. Ghonemy, I.-H. Taha, and A. S. Khalifa, "High capacity image steganography using wavelet-based fusion," in Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No. 04TH8769), 2004, pp. 430-435.
  8. T. Liu and Z.-d. Qiu, "A DWT-based color image steganography scheme," in 6th International Conference on Signal Processing, 2002., 2002, pp. 1568-1571.
  9. S. A. El_Rahman, "A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information," Computers & Electrical Engineering, vol. 70, pp. 380-399, 2018/08/01/ 2018.
  10. S. K. Sabnis and R. N. Awale, "Statistical Steganalysis of High Capacity Image Steganography with Cryptography," Procedia Computer Science, vol. 79, pp. 321-327, 2016/01/01/ 2016.
  11. M. S. Subhedar and V. H. Mankar, "Current status and key issues in image steganography: A survey," Computer Science Review, vol. 13-14, pp. 95-113, 2014/11/01/ 2014.
  12. Y. Liu, S. Liu, Y. Wang, H. Zhao, and S. Liu, "Video steganography: A review," Neurocomputing, vol. 335, pp. 238-250, 2019/03/28/ 2019.
  13. U. D. Acharya and P. R. Kamath, "A secure color image steganography in transform domain," arXiv preprint arXiv:1304.3313, 2013.
  14. T. Bhattacharya, N. Dey, and S. Chaudhuri, "A session based multiple image hiding technique using DWT and DCT," arXiv preprint arXiv:1208.0950, 2012.
  15. S. Muttoo and S. Kumar, "A multilayered secure, robust and high capacity image steganographic algorithm," World of Computer Science and Information Technology Journal, vol. 6, pp. 239-246, 2011.
  16. A. Yahya, "Steganography Techniques," in Steganography Techniques for Digital Images, ed: Springer, 2019, pp. 9-42.
  17. S. Mallat, A wavelet tour of signal processing: Elsevier, 1999.
  18. S. G. Mallat, "A theory for multiresolution signal decomposition: the wavelet representation," IEEE Transactions on Pattern Analysis & Machine Intelligence, pp. 674-693, 1989.
  19. C. Torrence and G. P. Compo, "A practical guide to wavelet analysis," Bulletin of the American Meteorological society, vol. 79, pp. 61-78, 1998.
  20. N. Solanki, S. Khandelwal, S. Gaur, and D. Gautam, "A Comparative Analysis of Wavelet Families for Invisible Image Embedding," in Emerging Trends in Expert Applications and Security, ed: Springer, 2019, pp. 219-227.
  21. A. Calderbank, I. Daubechies, W. Sweldens, and B.-L. Yeo, "Wavelet transforms that map integers to integers," Applied and computational harmonic analysis, vol. 5, pp. 332-369, 1998.
  22. A. R. Calderbank, I. Daubechies, W. Sweldens, and B.-L. Yeo, "Lossless image compression using integer to integer wavelet transforms," in Proceedings of International Conference on Image Processing, 1997, pp. 596-599.
  23. S. Lee, C. D. Yoo, and T. Kalker, "Reversible image watermarking based on integer-to-integer wavelet transform," IEEE Transactions on Information Forensics and Security, vol. 2, pp. 321-330, 2007.
  24. J. Ma, Y. Ma, and C. Li, "Infrared and visible image fusion methods and applications: A survey," Information Fusion, vol. 45, pp. 153-178, 2019
Index Terms

Computer Science
Information Sciences

Keywords

Color image steganography Discrete Wavelet Transform Integer Wavelet Transform.