Call for Paper - May 2020 Edition
IJCA solicits original research papers for the May 2020 Edition. Last date of manuscript submission is April 20, 2020. Read More

Reversible Data Hiding by Integer Wavelet Transform with Lossless EZW Bit-Stream

Print
PDF
International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 66 - Number 2
Year of Publication: 2013
Authors:
Mostafa A. Ahmad
Aly M. Meligy
Amal H. Hashim
Ayoub K. Al-hamadi
10.5120/11054-5952

Mostafa A Ahmad, Aly M Meligy, Amal H Hashim and Ayoub K Al-hamadi. Article: Reversible Data Hiding by Integer Wavelet Transform with Lossless EZW Bit-Stream. International Journal of Computer Applications 66(2):8-15, March 2013. Full text available. BibTeX

@article{key:article,
	author = {Mostafa A. Ahmad and Aly M. Meligy and Amal H. Hashim and Ayoub K. Al-hamadi},
	title = {Article: Reversible Data Hiding by Integer Wavelet Transform with Lossless EZW Bit-Stream},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {66},
	number = {2},
	pages = {8-15},
	month = {March},
	note = {Full text available}
}

Abstract

A reversible data hiding method using integer wavelet transform with embedded zero-tree wavelet for gray scale images is proposed. The proposed method merges traditional data hiding technique that depends on integer wavelet transform into the EZW image compression algorithm. It can recover the secret message again from the last pass of bit-stream of EZW robustly. This is due to shifting parts of histogram of high frequency subbands in the invertible integer-to-integer wavelet domain of EZW to make space for data hiding. The effect of embedded secret message into EZW coefficients on both of the compression ratio of coding algorithm and stego-image quality is discussed. Experimental results give high visual quality of stego-images at high payloads. The compression ratio of coding algorithm is affected by about 2% on average because of hiding process. Both of secret message and the original cover image are reconstructed without any loss.

References

  • S. Singh, and G. Agarwal, "Use of image to secure text message with the help of LSB replacement," International Journal of Applied Engineering Research, Dindigul, Vol. 1, No. 1, 2010, pp. 200–205.
  • M. Abu Zaher, "Modified Least Significant Bit (MLSB)," Computer and Information Science, Vol. 4, No. 1, 2011, pp. 60–67.
  • C. Chan, and L. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition, Vol. 37, 2004, pp. 469–474.
  • K. Kumar, K. Raja, R. Chhotaray, and S. Pattanaik, "Bit Length Replacement Steganography Based on DCT Coefficients," International Journal of Engineering Science and Technology, Vol. 2, No. 8, 2010, pp. 356–570.
  • C. Lin, and P. Shiu, "High Capacity Data Hiding Scheme for DCT-based Images," Journal of Information Hiding and Multimedia Signal Processing, Vol. 1, No. 3, 2010, pp. 220–240.
  • A. Al-Ataby, and F. Al-Naima, "A Modified High Capacity Image Steganography Technique Based on Wavelet Transform," The International Arab Journal of Information Technology, Vol. 7, No. 4, 2010, pp. 358–364.
  • P. Chen, and H. Lin, "A DWT Based Approach for Image Steganography," International Journal of Applied Science and Engineering, Vol. 4, No. 3, 2006, pp. 275–290.
  • L. Ganesan, and S. Jinna, "Reversible Image Data Hiding Using Lifting Wavelet Transform and Histogram Shifting," International Journal of Computer Science and Information Security, Vol. 7, No. 3, 2010, pp. 283–290.
  • S. Singh, and T. Siddiqui, "A security Enhanced Robust Steganography Algorithm for Data Hiding," International Journal of Computer Science Issues, Vol. 9, No. 1, 2012, pp. 131- 139.
  • C. Kung, S. Chao, Y. Tu, and Y. Yan, "A Robust Watermarking and Image Authentication Scheme used for Digital Contant Application," Journal of Multimedia, Vol. 4, No. 3, 2009, pp. 112-119.
  • G. Xuan, Y. Shi, C. Yang, Y. Zheng, D. Zou, and P. Chai, "Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique," Multimedia and Expo, ICME, IEEE International Conference, 2005, pp. 1520–1523.
  • C. Chang, P. Pai, C. Yeh, and Y. Chan. "A high payload frequency-based reversible image hiding method," Information Science, Elsevier 180, 2010, pp. 2286–2298.
  • J. Shapiro, "Embedded Image Coding Using Zerotrees of Wavelet Coefficients," IEEE Transaction On Signal Processing, Vol. 4, No. 12, 1993, pp. 3445–3462.