CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Performance Analysis of Image Steganography based on DWT and Arnold Transform

by Shikha Sharda, Sumit Budhiraja
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 21
Year of Publication: 2013
Authors: Shikha Sharda, Sumit Budhiraja
10.5120/12099-8310

Shikha Sharda, Sumit Budhiraja . Performance Analysis of Image Steganography based on DWT and Arnold Transform. International Journal of Computer Applications. 69, 21 ( May 2013), 46-50. DOI=10.5120/12099-8310

@article{ 10.5120/12099-8310,
author = { Shikha Sharda, Sumit Budhiraja },
title = { Performance Analysis of Image Steganography based on DWT and Arnold Transform },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 21 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 46-50 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number21/12099-8310/ },
doi = { 10.5120/12099-8310 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:30:57.345065+05:30
%A Shikha Sharda
%A Sumit Budhiraja
%T Performance Analysis of Image Steganography based on DWT and Arnold Transform
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 21
%P 46-50
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the technique that communicates secret data in different carriers like image, audio files etc. in such a way that it is not be visible to attackers. In this paper, performance analysis of image steganography based on Discrete Wavelet Transform (DWT) associated to colored and gray scale images is done. Arnold transformation along with a private key is used during encoding to provide high security. DWT is applied on both the cover image and the secret image and then alpha blending operation is done. Stego-image is obtained by using Inverse Discrete Wavelet Transformation (IDWT) Performance analysis is done by using different wavelet families. The simulation results show that PSNR values of the Arnold Transform based method are better than existing methods.

References
  1. Nagham Hamid et al. "Image Steganography Techniques: An Overview"International Journal of Computer Science and Security (IJCSS), Volume (6): Issue (3): 2012.
  2. I. -C. Lin et al, "Hiding data in spatial domain images with distortion tolerance", Computer Standards & Interfaces 31 (2009) 458–464.
  3. C. -C. Chang et al. , "Reversible hiding in DCT-based compressed images", Information Sciences 177 (2007) 2768–2786.
  4. Yih-Kai Lin, "High capacity reversible data hiding scheme based upon discrete cosine Transformation", The Journal of Systems and Software 85 (2012) 2395– 2404.
  5. Y. -K. Chan et al. , "A HDWT-based reversible data hiding method", The Journal of Systems and Software 82 (2009) 411–421.
  6. Vijay Kumar and Dinesh Kumar, "Performance Evaluation of DWT Based Image Steganography", 2010 IEEE 2nd International Advance Computing Conference.
  7. S. Sarreshtedariet al. "High Capacity Image Steganographyin Wavelet Domain"IEEE CCNC 2010 proceedings
  8. N. Raftari, "Digital Image Steganography Based on Integer Wavelet Transform and Assignment Algorithm", 2012 Sixth Asia Modelling Symposium.
  9. Prabakaran. G and Bhavani. R, "A Modified Secure Digital Image Steganography Based on Discrete Wavelet Transform", 2012 International Conference on Computing, Electronics and Electrical Technologies [ICCEET].
  10. H. Motamedi"A New Image Steganography Based on DenoisingMethods in Wavelet Domain" 9thInternational ISC Conference on Information Security and Cryptology 2012.
  11. G. Prabakaran"Dual Transform Based Steganography Using Wavelet Families and Statistical Methods"Proceedingsof the 2013 International Conference onPattern Recognition, Informatics and Mobile Engineering (PRIME) February 21-22.
  12. Lingling Wu et al. "Arnold Transformation Algorithm and Anti-ArnoldTransformation Algorithm"The 1st International Conference on Information Science and Engineering (ICISE2009).
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Arnold Transformation Private Key Alpha Blending DWT