Call for Paper - October 2019 Edition
IJCA solicits original research papers for the October 2019 Edition. Last date of manuscript submission is September 20, 2019. Read More

Color Image Steganography based on Wavelet Transform

Print
PDF
IJCA Proceedings on International Conference on Advances in Science and Technology
© 2015 by IJCA Journal
ICAST 2014 - Number 2
Year of Publication: 2015
Authors:
Meenakshi Dhaundiyal
Sangita Nikumbh

Meenakshi Dhaundiyal and Sangita Nikumbh. Article: Color Image Steganography based on Wavelet Transform. IJCA Proceedings on International Conference on Advances in Science and Technology ICAST 2014(2):30-34, February 2015. Full text available. BibTeX

@article{key:article,
	author = {Meenakshi Dhaundiyal and Sangita Nikumbh},
	title = {Article: Color Image Steganography based on Wavelet Transform},
	journal = {IJCA Proceedings on International Conference on Advances in Science and Technology},
	year = {2015},
	volume = {ICAST 2014},
	number = {2},
	pages = {30-34},
	month = {February},
	note = {Full text available}
}

Abstract

Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. In this paper comparative analysis of image compression is done by two transform method, which are Discrete Wavelet Transform (DWT) & Integer Wavelet Transform (IWT). Steganography can be applied on different file formats, such as audio, video, text, image etc. In image steganography, data in the form of image is hidden under some image by using transformations such as Discrete Cosine transformation (DCT), IWT, DWT etc and then sent to the destination. At the destination, the data is extracted from the cover image using the inverse transformation. This paper presents a new approach for image steganography using DWT & IWT. The cover image is divided into higher and lower frequency sub-bands and data is embedded into higher frequency sub-bands. The proposed approach is implemented in MATLAB 7. 0 and evaluated on the basis of PSNR, capacity and correlation. In this method, we concentrated for perfecting the visual effect of the stego image and robustness against the various attacks by using different wavelet families.

References

  • G. Prabhakaran, Dr. R. Bhavaniand Kanimozhi, Dual Transform Based Steganography Using Wavelet families and statistical Methods. "Proceedings of 2013International Conference on Pattern recognition Informatics & Mobile Engineering(PRIME) Feb. 21-22 IEEE 2013.
  • Stuti Goel, Arun Rana and Manpreet Kaur, "A Review of Comparision Techniques of Image Steganography. " Global Journal of Computer Science & Technology, Vol. XIII Issue IV Version I Year 2013.
  • Ghasemi. E. , Sci. & Res. Branch, Islamic Azad Univ. , Tehran,Iran, Shanbehzadeh. J. ,Zahir Azami. B. "A Steganographic Method Based On Integer Wavelet Transform And Genetic Algorithm. " International Conference On Communication And Signal Processing (ICCSP), 2011 IEEE Feb. 2011 ISBN: 978-1-4244-97980.
  • Sabyasachi Pattnaik, R. K. Chhotaray,K. B. Raja and K. B. Shiva Kumar,"Performance Comparision Of Robust Steganography Based On Multiples Transformation Techniques. ", International Jouranal On Computer Technology Applications, Vol 2(4), Pp. 1035-1047, 2011.
  • K. B. Raja And H. S. Manjunatha Reddy, "Wavelet Based Non Lsb Steganography," International Journal Of Advanced Networking And Applications, Vol 03(3), Pp. 1203-1209,2011.
  • Ghosal. N. ,Mandal J. K. ,"A Steganographic Schemes For Colour Images Authtntication (SSCIA)", International Conference On Recent Trends In Information Technology (ICRTIT 2011). (Madras Institute Of Technology Chennai, India June 13-05,2011), IEEE Conference Publications, 826-831.
  • Nilanjan Dey, Anamitra B. R, And Sayantan D. " A Novel Approach Of Color Image Hidind Using Rgb Color Planes And DWT, " International Jouranal Of Computer Applications, Volume 36-No. December 2011.
  • Sarreshtedari. S. ,Ghaemmaghami S. "High Capacity Image Steganography In Wavelet Domain. In Proceedings Of 2010 7th IEEE Consumer Communications And Networking Conference (CCNC) (Las Vegas,Nevada, USA, 9-12 January 2010), IEEE Conference Publications,1-5.
  • Chen, R. J. , Peng, Y. C. , Lin, J. J. , Lai, J. L. , Horng, S. J. , " Novel Multi-Bit Bitwise Adaptive Embedding Algorithms With Minimum Error For Data Hiding" Fourth International Conference On Network And Systems Security (NSS 2010), (Melbourne, Australia 1-3 September 2010), IEEE Conference Publications, 306-311.
  • Ali Al-Ataby And Fawzi Al-Naima, "A Modified High Capacity Based On Wavelet Transform," International Arab Journal Of Information Technology, Vol. 7,Pp,1-7,2010.
  • Weiqi Luo, Fangjun Huang And Jiwu Huang , "Edge Adaptive Image Steganography Based On LSB Matching Revisited" IEEE Transaction On Information Forensics And Security, Vol. 5, No. 2, June 2010.
  • Xie, Qing, Xie, Jianquan, Xiao, Yunhua, "A High Capacity Information Hiding Algorithm In Color Images", 2nd International Conference On E-Business And Information System Security (EBIISS 2010). (Wuhan China, 22-23 May, 2010),IEEE Conference Publications, 1-4.
  • Sacha Klonus And Manfred Ehlers , "Performance Of Evaluations Methods In Image Fusion ", 12th International Conference On Information Fusion Seattle, W. A. USA, Pp. 1409-1416,2009.
  • R. O. EI Safy, H. H. Zayed, EI Dessouki Remote Sensing and Space Sciences, "An Adaptive Steganographic Technique Based on Integer Wavelet Transform",IEEE-2009.
  • Sunil Lee ,Chang D. Yoo and Ton Kalker, "Reversible Image Watermarking Based on Integer-to-IntegerWavelet Transform" IEEE Transactions On Information Forensics And Security, Vol. 2, No. 3, September 2007.
  • Guorong Xuan, Jiang Zhu, Jidong Chen, Yun Q. Shi, Zhicheng Ni and Wei Su, "Distortionless data hiding based on integer wavelet transform", IEEE Electronic letters, December 2002 Vol. 38 No. 25, pp. 1646-1648.