CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Biometrics based Steganography using Circular Folding in DWT Domain

by Santhi K, Anil Kumar M N
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 61 - Number 10
Year of Publication: 2013
Authors: Santhi K, Anil Kumar M N
10.5120/9968-4624

Santhi K, Anil Kumar M N . Biometrics based Steganography using Circular Folding in DWT Domain. International Journal of Computer Applications. 61, 10 ( January 2013), 47-51. DOI=10.5120/9968-4624

@article{ 10.5120/9968-4624,
author = { Santhi K, Anil Kumar M N },
title = { Biometrics based Steganography using Circular Folding in DWT Domain },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 61 },
number = { 10 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 47-51 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume61/number10/9968-4624/ },
doi = { 10.5120/9968-4624 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:08:47.585285+05:30
%A Santhi K
%A Anil Kumar M N
%T Biometrics based Steganography using Circular Folding in DWT Domain
%J International Journal of Computer Applications
%@ 0975-8887
%V 61
%N 10
%P 47-51
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the art and science of hiding or embedding data in a transmission medium. The goal of steganography is to hide an information message inside a harmless cover medium in such a way that it is not possible even to detect that there is a secret message. In this paper, the object oriented steganography is based on biometrics. Data is embedded into some regions of the skin and not to the whole region. To separate the skin and non-skin regions, skin tone detection is performed using HSV color space. To increase the security, cropping and circular folding is performed on the B plane of the cover image. The secret data is embedded into the high frequency sub-band coefficients of DWT domain. Because human eyes are less sensitive in this sub-band, security is improved. In this paper, we analyze both cropping and non-cropping cases. This results into more security with cropping than without cropping with almost same PSNR.

References
  1. A. Alboil, L. Torres, and E. J. Delp, "Optimum Colour Spaces for Skin Detection", In Proceedings of the international Conference on Image Processing, vol. 1, 122-124, 2001.
  2. S. Barve, U. Nagaraj, and N. Gulabani, "Efficient and secure Biometric Image Steganography using Discrete Wavelet transform," International Journal of Computer Science & Communication Networks,Vol 1(1),September-October 2011.
  3. Y. Dinesh, A P Ramesh, "Efficient Capacity Image Steganography by using Wavelets," International Journal of Engineering Research and Applications,Voi. 2, pp. 251-259,Jan-Feb 2012.
  4. D. Artz, "Digital steganography: hiding data within data," IEEE Internet Computing, pp. 75-80, May-June 2001.
  5. V. Vezhnevets, V. Sazonov, A. Andreeva, "A Survey on Pixel-Based Colour Detection Techniques", Proc. Graphicon2003, Moscow, Russia, September 2003.
  6. P. Y. Chen and H. J. Lin, "A DWT Based Approach for Image Steganography", International Journal of Applied Science and Engineering, 4,3: 275-290, 2006.
  7. E Ghasemi, J Shanbehzadeh, and N Fassihi,"High Capacity Image Steganography usingWavelet Transform and Genetic Algorithm", Proceedings of the International Multi Conference of Engineering and Computer Scientista 2011 Vol I, IMECS 2011, March 16-18,2011.
  8. N. Wu and M. Hwang. "Data Hiding: Current Status and Key Issues," International Journal of Network Security, Vol. 4, No. 1, pp. 1-9, Jan. 2007.
  9. L. Tawadw, R Mahajan and Chandan Kulthe, "Efficient & Secure Data Hiding Using Secret Reference Matrix," , International Journal of Network Security & Its Applications (IJNSA), Vol. 4, No. 1, January 2012.
  10. A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt, "Biometric inspired digital image Steganography", in: Proceedings of the 15th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS'08), Belfast, pp. 15916, 2008 .
  11. A. A, Shejul, and U. L. Kulkarni, "A DWT based approach for Steganography Using Biometric", International Conference on Data Storage and Data Engineering,2010.
  12. Abbas Chedda, Joan Condell, Kevin Curran and Paul Mc Kevitt "A Skin Tone Detection Algorithm for an Adaptive Approach to Steganography", School of Computing and Intelligent Systems, Faculty of Computing and Engineering, University of Ulster, BT48 7JL, Londonderry, Northern Ireland, UK,2008.
  13. C. C. Chang, T. S. Chan and L. Z. Chung, "A steganographic method based upon JPEG and quantization table modification", An International Journal on Information Sciences, 123-138, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Biometrics Skin tone detection Cropping DWT Circular- folding PSNR