CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Image Steganography using DCT, DST, Haar and Walsh Transform

by Prashasti Kanikar, Ratnesh N. Chaturvedi, Vibhishek Kashyap, Pooja Likhite
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 65 - Number 17
Year of Publication: 2013
Authors: Prashasti Kanikar, Ratnesh N. Chaturvedi, Vibhishek Kashyap, Pooja Likhite
10.5120/11017-6381

Prashasti Kanikar, Ratnesh N. Chaturvedi, Vibhishek Kashyap, Pooja Likhite . Image Steganography using DCT, DST, Haar and Walsh Transform. International Journal of Computer Applications. 65, 17 ( March 2013), 34-37. DOI=10.5120/11017-6381

@article{ 10.5120/11017-6381,
author = { Prashasti Kanikar, Ratnesh N. Chaturvedi, Vibhishek Kashyap, Pooja Likhite },
title = { Image Steganography using DCT, DST, Haar and Walsh Transform },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 65 },
number = { 17 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 34-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume65/number17/11017-6381/ },
doi = { 10.5120/11017-6381 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:19:06.868572+05:30
%A Prashasti Kanikar
%A Ratnesh N. Chaturvedi
%A Vibhishek Kashyap
%A Pooja Likhite
%T Image Steganography using DCT, DST, Haar and Walsh Transform
%J International Journal of Computer Applications
%@ 0975-8887
%V 65
%N 17
%P 34-37
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is a means of hiding information within a more obvious form of communication. It exploits the use of host data to hide a piece of information in such a way that it is imperceptible to human observer. The major goals of effective steganography are High Embedding Capacity, Imperceptibility and Robustness. In this paper, the transform domain techniques of Image steganography have been discussed. The Orthogonal Transforms tested were DCT, DST, Haar and Walsh transform. The resultant stego images contained 4 different message images giving a 50% embedding capacity using these transforms. The message images have been normalized and then transformed to reduce the embedding error. The pixel values have been divided by a constant value of 255 to bring all the values into the range of 0. 1 to 1. 0. Therefore, High Embedding capacity has been achieved through the use of orthogonal transforms using the technique discussed in this paper. The paper compares image steganography schemes that hide secret message into simple orthogonal transforms such as DCT [Discrete Cosine Transform], DST [Discrete Sine Transform], Hartley, Walsh and Haar. The experimental results show that using DCT transform for image steganography achieve much better results as compared to DST, Walsh and Haar.

References
  1. Dr H. B Kekre, Archana B Patankar, DipaliKoshti (2012), 'Performance comparison of Orthogonal Transforms for Image Steganography', International Journal for computer Applications, Volume 44
  2. R. O. EI Safy, H. H. Zayed and A. EI Dessouki, "An Adaptive Steganographic Technique Based on Integer Wavelet Transform," International Conference on Networking and Media Convergence, 2009 (ICNM) 2009 ) on 24-25 March.
  3. Signal Processing, IEE Proceedings - Volume 152, Issue 5, 7 Oct. 2005.
  4. C. K Chan and L. M Cheng," Hiding data in images by simple LSB substitution," Pattern Recognition, pp. 469-474, Mar. 2004.
  5. Wu, H. -C. ; Wu, N. -I. ; Tsai, C. -S. ; Hwang, M. -S ," Image steganographic scheme based on pixel-value differencing and LSB replacement methods," Vision, Image and Signal Processing, IEE Proceedings - Volume 152, Issue 5, 7 Oct. 2005.
  6. C. K Chan and L. M Cheng ," Hiding data in images by simple LSB substitution ," Pattern Recognition , pp. 469-474, Mar. 2004.
  7. Dr. H. B. Kekre, Ms. ArchanaAthawale and Ms. Pallavi N. Halarnkar, "Increased Capacity of Information Hiding in LSBs Method for Text and Image", International Journal of Electrical, Computer and Systems Engineering,Volume2 Number 4.
  8. Dr. H. B. Kekre, Ms. ArchanaAthawale, "Information Hiding using LSB Technique with Increased Capacity" International Journal of Cryptography and Security, Vol-I, No. 2, Oct-2008
  9. Dr. H. B. Kekre, Dr. Tanuja K. Sarode, Aditya A. Tirodkar (2011), 'An Evaluation of Palm Print Recognition Techniques using DCT, Haar Transform and DCT Wavelets and their Performance with Fractional Coefficients', International Journal of Computer Applications (0975 – 8887) Volume 32– No. 1, October 2011
  10. NilanjanDey, SouravSamanta, AnamitraBardhan Roy(2011), 'A Novel Approach of Multilevel Binary Image Encoding using Walsh Table and Spiral Scanning'
  11. M. Barni, F. Bartolini, "Improved wavelet based watermarking through pixel wise masking', IEEE Trans. On Image Processing, vol 10. No 5. May 2001
  12. Ahmed, N. ; Natarajan, T. ; Rao, K. R. "Discrete Cosine Transform", IEEE TRANSACTIONS ON COMPUTERS,Volume: C-23 , Issue: 1, Page(s): 90 – 93, Jan. 1974.
  13. Dr. H. B. kekre, Ms. ArchanaAthawale and DipaliSadavarti,"A Novel Steganographic Scheme Using Discrete Sine Transform based upon energy distribution", International conference on contours of computing technology, Thinkquest-2010, held on 13th,14th March , 2010, Mumbai.
  14. Alfred Haar, "ZurTheorie der orthogonalenFunktionensysteme" (German), MathematischeAnnalen, Volume 69, No 3, pp 331 – 371, 1910
  15. J Walsh, "A closed set of normal orthogonal functions", American Journal of Mathematics, Volume 45, No 1, pp 5 – 24, 1923.
Index Terms

Computer Science
Information Sciences

Keywords

Stego Image Cover Image