Image Steganography using Non Embedding and Average Technique in Transform Domain

نویسندگان

  • N Sathisha
  • K Suresh Babu
  • K B Raja
  • K R Venugopal
چکیده

The steganography is an art and science of hiding information into a given media to ensurethe security of information over the communication channel. In this paper we propose a Image Steganography using Average Technique in Transform Domain (ISATT). The Lifting Wavelet Transform (LWT) is applied on both cover image and payload. The Diagonal band (CD) of cover image and Approximation band (PA) of payload are segmented into N x N blocks. The N x N matrix of PA is divided by N x N matrix of CD to generate resultant matrix based on Non Embedding Threshold Value (NETV) fixed by key. The average value of N x N resultant matrix is calculated and used to divide PA to generate modified CD. The average value of each N x N block are scale downed by key and embedded into corresponding N x N block of horizontal band (CH) of cover image. The inverse LWT is applied on stego object to derive stego image1. The Peak Signal to Noise Ratio (PSNR) is computed between cover image and stego image1 for different NETV values till maximum PSNR is obtained and the corresponding stego image is considered as final stego image. The capacity and PSNR values are high in the case of propos ed algorithm compared to existing algorithms since non embedding and average technique is used in transform domain.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Singular Value Decomposition based Steganography Technique for JPEG2000 Compressed Images

In this paper, a steganography technique for JPEG2000 compressed images using singular value decomposition in wavelet transform domain is proposed. In this technique, DWT is applied on the cover image to get wavelet coefficients and SVD is applied on these wavelet coefficients to get the singular values. Then secret data is embedded into these singular values using scaling factor. Different com...

متن کامل

An extended feature set for blind image steganalysis in contourlet domain

The aim of image steganalysis is to detect the presence of hidden messages in stego images. We propose a blind image steganalysis method in Contourlet domain and then show that the embedding process changes statistics of Contourlet coefficients. The suspicious image is transformed into Contourlet space, and then the statistics of Contourlet subbands coefficients are extracted as features. We us...

متن کامل

Eigenvalues-based LSB steganalysis

So far, various components of image characteristics have been used for steganalysis, including the histogram characteristic function, adjacent colors distribution, and sample pair analysis. However, some certain steganography methods have been proposed that can thwart some analysis approaches through managing the embedding patterns. In this regard, the present paper is intended to introduce a n...

متن کامل

A Frequency Domain Steganography using Z Transform (FDSZT)

Image steganography is art of hiding information onto the cover image. In this proposal a transformed domain based gray scale image authentication/data hiding technique using Z transform (ZT) termed as FDSZT, has been proposed. ZTransform is applied on 2×2 masks of the source image in row major order to transform original sub image (cover image) block to its corresponding frequency domain. One ...

متن کامل

Steganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images

In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015