CFP last date
20 May 2024
Reseach Article

Integer Wavelet based Secret Data Hiding by Selecting Variable Bit Length

by Sumanth Sakkara, Akkamahadevi D.h., K. Somashekar, Raghu K.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 48 - Number 19
Year of Publication: 2012
Authors: Sumanth Sakkara, Akkamahadevi D.h., K. Somashekar, Raghu K.
10.5120/7454-0458

Sumanth Sakkara, Akkamahadevi D.h., K. Somashekar, Raghu K. . Integer Wavelet based Secret Data Hiding by Selecting Variable Bit Length. International Journal of Computer Applications. 48, 19 ( June 2012), 7-11. DOI=10.5120/7454-0458

@article{ 10.5120/7454-0458,
author = { Sumanth Sakkara, Akkamahadevi D.h., K. Somashekar, Raghu K. },
title = { Integer Wavelet based Secret Data Hiding by Selecting Variable Bit Length },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 48 },
number = { 19 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 7-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume48/number19/7454-0458/ },
doi = { 10.5120/7454-0458 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:44:29.307710+05:30
%A Sumanth Sakkara
%A Akkamahadevi D.h.
%A K. Somashekar
%A Raghu K.
%T Integer Wavelet based Secret Data Hiding by Selecting Variable Bit Length
%J International Journal of Computer Applications
%@ 0975-8887
%V 48
%N 19
%P 7-11
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is a process of hiding secret information's like image, video, audio, and text message in a carrier's like image, video, and audio. Proposed method uses the secret information as a text message which is embedded in a color image. The existing methods hide the information using constant bit length in integer wavelet coefficients. This paper uses variable bit length based on integer wavelet coefficients to hide the data in a particular positions using secret key by LSB substitution method. Hence this algorithm increases the embedding capacity of the text message and obtained stego image is imperceptible for human vision. This technique embeds binary bit stream of secret text message into the 8 bit color image. The embedded confidential information can be extracted from stego image without the knowledge of original image by considering the same secret key. On average of 2. 50 bits can be embedded in each wavelet coefficient of the input color image. Hence this method gives better results in both embedding capacity and PSNR than the existing methods.

References
  1. Souvik Bhattacharyya et. al, 2010. A Novel Approach to Develop a Secure Image based Steganographic Model using Integer Wavelet Transform. International Conference on Recent Trends in Information, Telecommunication and Computing.
  2. Thanikaiselvan. V et al, 2011. Wave(Let) Decide Choosy Pixel Embedding for Stego. International Conference on Computer, Communication and Electrical Technology ICCCET.
  3. Saeed Sarreshtedari et al, 2010. High Capacity Image Steganography in Wavelet Domain. IEEE CCNC.
  4. Jammi Ashok et. al, 2010. Steganography: an overview International Journal of Engineering Science and Technology,.
  5. Dr. V. Vijayalakshmi et al, 2009. A Modulo Based LSB Steganography Method. International Conference On Control, Automation, Communication And Energy Conservation.
  6. KokSheik Wong et. al, 2006. Graphical Comparative Study on DCT-based Steganographic Methods. IEEE.
  7. Ahmed A. Abdelwahab et. al, 2008. A Discrete Wavelet Transform Based Technique For Image Data Hiding. 25th National Radio Science Conference (NRSC),
  8. Guorong Xuan et. al, 2002. Lossless Data Hiding Based on Integer Wavelet Transform. IEEE.
  9. Fabien A. et. al, 1999. Information Hiding-A Survey. IEEE.
  10. R. Amirtharajan et al. 2010. Tri-Layer Stego for Enhanced Security – A Keyless Random Approach. IEEE.
  11. Mehdi Hussain et al, 2010 "Pixel Intensity Based High Capacity Data Embedding Method", IEEE,.
  12. Bret Dunbar et. Al. 2002. A Detailed look at Steganographic Techniques and their use in an Open Systems Environment", SANS Institute Reading Room.
  13. Beenish Mehboob, 2008. A StegnographyImplementation. IEEE.
  14. Hanan Mahmoud et al, 2010. Novel Algorithmic Countermeasures for Diffirential power analysis attacks on smart cards. Sixth International conference on Information Assurance and Security.
  15. Ahmad Khalil Khan et. al, 2006. An Analytical Framework for Comparative Analysis of Various Watermarking and Steganographic Techniques. IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Integer Wavelet Transform (iwt) Variable Bit Length Secret Key Psnr (peak-signal-to-noise-ratio)