A Comparative Study of Image Steganography in Wavelet Domain

نویسنده

  • Sushil Kumar
چکیده

Abstract— In this paper we present a comparative study of four different image steganography algorithms based on orthogonal Haar Wavelet Transform and biorthogonal CDF9/7 Transform. One can divide the steganography techniques into two categories: Reversible techniques and Irreversible techniques. There are applications such as medical image system and law enforcement where it is desirable to recover the original cover image with no distortion. In this paper we shall discuss the four different embedding techniques: three are irreversible, namely, Modified (or Randomized) LSB method, LSB varying mode method and Fusion method and one is reversible, known as distortionless (or reversible or lossless) thresholding technique. The four basic requirements of Steganography are Imperceptibility, Security, Embedding payload and robustness to common statistical attacks and image processing operations. For measuring the robustness against common statistical attacks we present the histogram analysis between the original and stego-image. We apply self-synchronization variable length code, namely T-codes in place of Huffman codes for source encoding to provide security and better compression of original message. The Modified LSB method is simple, high payload, fast and most popular steganography embedding technique but fails to be robust against common channel noise such as Gaussian, Salt-n-peppers and others. The LSB Varying mode technique based on Haar transform is proposed by chen and lin [6]. The authors have shown that their method provides acceptable PSNR value, though one require extra space for key-matrix along with stego-image in the transmission. We modify this technique using T-code as source encoder and compare the results with cdf9/7 transform. The Wavelet-based Fusion method is proposed by Tolba and Ghonemy [17]. This is a high capacity cover-screw algorithm with the results of high invisibility. From the experimental results we observe that Fusion method is best for high capacity, high invisibility and robustness to common attacks in compare to other techniques and the reversible thresholding technique gives better imperceptibility in Haar domain than cdf9/7 domain.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Singular Value Decomposition based Steganography Technique for JPEG2000 Compressed Images

In this paper, a steganography technique for JPEG2000 compressed images using singular value decomposition in wavelet transform domain is proposed. In this technique, DWT is applied on the cover image to get wavelet coefficients and SVD is applied on these wavelet coefficients to get the singular values. Then secret data is embedded into these singular values using scaling factor. Different com...

متن کامل

A New Hybrid Method for Colored Image Steganography Based On DWT

Data transmission security has become an extremely important field of research. Steganography is an art of hiding information in image, audio and video files in a way that would meet the security requirements in the form of overt or covert. In this study, we propose a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blu...

متن کامل

Reversible Image Steganography Based on Wavelets and Wavelet-like-transform

So far we have focussed on evaluating the performance of algorithms of irreversible image steganography in the ECCs domain and Transform domain for the grayscale and color images. In this Chapter we shall cover the two type of reversible image steganographic algorithms using the Companding technique (also called Reversible Thresholding Method) based on SLTPerceptual and Robust. We shall also gi...

متن کامل

A New Hybrid Method for Colored Image Steganography Based On DWT

Data transmission security has become an extremely important field of research. Steganography is an art of hiding information in image, audio and video files in a way that would meet the security requirements in the form of overt or covert. In this study, we propose a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blu...

متن کامل

Image Steganalysis Based on Co-Occurrences of Integer Wavelet Coefficients

We present a steganalysis scheme for LSB matching steganography based on feature vectors extracted from integer wavelet transform (IWT). In integer wavelet decomposition of an image, the coefficients will be integer, so we can calculate co-occurrence matrix of them without rounding the coefficients. Before calculation of co-occurrence matrices, we clip some of the most significant bitplanes of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013