Optimal Data Embedding in Image Steganography Using CWT and LSB Masking Technique
نویسندگان
چکیده
Abstract -In today’s world of Internet every digitized object can be made exchangeable and transferable over the communication channel for various purposes. There are numerous security threats over the internet for digitized objects and hence they have to be made secure. Therefore, methods like steganography are gaining importance day by day. Steganography is the art which tends to obscure a part of information or useful data into another. Steganography can be applied on different file formats like audio, video, text and image. In image steganography data can be hidden in two domains namely Spatial and Transform domains. This paper proposes a technique for hiding image into another image using Continous Wavelet Transform (CWT) Method which helps in converting the data into higher and lower frequency components and also the LSB method for converting those components into bit stream and hiding the data in the last three bits of the covered medium. At the destination side the hidden data is recovered using Inverse Continous Wavelet Transform. Experimental results show a better PSNR value and lower MSE with increased capacity and security.
منابع مشابه
Secret Information Steganography Using LSB Insertion Methodwithout Bit Layout Section with Increasing Substitution Rate and High Reliability
In this paper, a faster method for embedding cryptographic information in the image ispresented by expressing the concept of latent prints (Steganography). Data is encrypted bytwo methods before embedding to increase reliability. Then they are embedded into the imageby a button, a method has been expressed to reduce potential noise impact on the wayinformation is encoded.
متن کاملEigenvalues-based LSB steganalysis
So far, various components of image characteristics have been used for steganalysis, including the histogram characteristic function, adjacent colors distribution, and sample pair analysis. However, some certain steganography methods have been proposed that can thwart some analysis approaches through managing the embedding patterns. In this regard, the present paper is intended to introduce a n...
متن کاملOptimizing image steganography by combining the GA and ICA
In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded inside an image using an algorithm which combines the random patterns based on Space Fillin...
متن کاملSteganalysis Method for LSB Replacement Based on Local Gradient of Image Histogram
In this paper we present a new accurate steganalysis method for the LSBreplacement steganography. The suggested method is based on the changes that occur in thehistogram of an image after the embedding of data. Every pair of neighboring bins of ahistogram are either inter-related or unrelated depending on whether embedding of a bit ofdata in the image could affect both bins or not. We show that...
متن کاملSingular Value Decomposition based Steganography Technique for JPEG2000 Compressed Images
In this paper, a steganography technique for JPEG2000 compressed images using singular value decomposition in wavelet transform domain is proposed. In this technique, DWT is applied on the cover image to get wavelet coefficients and SVD is applied on these wavelet coefficients to get the singular values. Then secret data is embedded into these singular values using scaling factor. Different com...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016