Open Access   Article Go Back

Color Image Steganography Using Discrete Wavelet Transformation and Optimized Message Distribution Method

J.A. Mazumder1 , H. Kattamanchi2

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-7 , Page no. 90-100, Jul-2014

Online published on Jul 30, 2014

Copyright © J.A. Mazumder, H. Kattamanchi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: J.A. Mazumder, H. Kattamanchi , “Color Image Steganography Using Discrete Wavelet Transformation and Optimized Message Distribution Method,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.7, pp.90-100, 2014.

MLA Style Citation: J.A. Mazumder, H. Kattamanchi "Color Image Steganography Using Discrete Wavelet Transformation and Optimized Message Distribution Method." International Journal of Computer Sciences and Engineering 2.7 (2014): 90-100.

APA Style Citation: J.A. Mazumder, H. Kattamanchi , (2014). Color Image Steganography Using Discrete Wavelet Transformation and Optimized Message Distribution Method. International Journal of Computer Sciences and Engineering, 2(7), 90-100.

BibTex Style Citation:
@article{Mazumder_2014,
author = {J.A. Mazumder, H. Kattamanchi },
title = {Color Image Steganography Using Discrete Wavelet Transformation and Optimized Message Distribution Method},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2014},
volume = {2},
Issue = {7},
month = {7},
year = {2014},
issn = {2347-2693},
pages = {90-100},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=215},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=215
TI - Color Image Steganography Using Discrete Wavelet Transformation and Optimized Message Distribution Method
T2 - International Journal of Computer Sciences and Engineering
AU - J.A. Mazumder, H. Kattamanchi
PY - 2014
DA - 2014/07/30
PB - IJCSE, Indore, INDIA
SP - 90-100
IS - 7
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3499 3420 downloads 3603 downloads
  
  
           

Abstract

Steganography is the science of concealing secret information into any digital media such as images, audio, video etc so that no eavesdropper can empathies this secret communication. In this paper we have propounded a high security steganographic technique using discrete wavelet transformation and optimized message dispersing method. Here we have used Haar wavelet transformation which decomposes the cover image into high frequency and low frequency information and high frequency information contains information about the edges, corners etc. of the image where we have dispersed our secret information. Secret Message is inserted into all the color components of high frequency sub-bands that are Red, Green and Blue color components starting from the last column of each of the color components from top to bottom depending upon the length of the message. To measure the imperceptibility of the proposed steganography method we have used MSE and PSNR. For this experiment we have taken four image formats: PNG, BMP, JPEG and TIFF and we have inserted the secret message of sizes starting from 2 KB to 20 KB and evaluated their corresponding MSR and PSNR using standard method. Besides the analysis of MSE and PSNR we have also evaluated the message insertion and the message extraction time. Our experimental result shows that the MSE and Capacity are improved with acceptable PSNR compared to other methods.

Key-Words / Index Term

Steganography, DWT, MSE, PSNR, PNG, BMP, JPEG, TIFF

References

[1] Tian, Lei; Zhou, Ke; Jiang, Hong; Liu, Jin; Huang, Yongfeng; and Feng, Dan, "An M-Sequence Based Steganography Model for Voice over IP" (2008). CSE Technical reports. Paper 68.
[2] Cheddad, Abbas, Joan Condell, Kevin Curran, and Paul Mc Kevitt. "Digital image steganography: Survey and analysis of current methods." Signal Processing 90, no. 3 (2010): 727-752.
[3] T Morkel, JHP Eloff and MS Olivier, "An Overview of Image Steganography," in Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, June/July 2005 (Published electronically)
[4] Marvel, L.M., Boncelet Jr., C.G. & Retter, C., �Spread Spectrum Steganography�, IEEE Transactions on image processing, 8:08, 1999
[5] Anderson, R.J. & Petitcolas, F.A.P., �On the limits of steganography�, IEEE Journal of selected Areas in Communications, May 1998
[6] Marghny Mohamed, Fadwa Al-Afari and Mohamed Bamatraf, �Data Hiding by LSB Substitution Using Genetic Optimal Key-Permutation�, International Arab Journal of e-Technology, Vol. 2, No. 1, pp. 11-17, January 2011
[7] Elham Ghasemi, Jamshid Shanbehzadeh, and Nima Fassihi, �High Capacity Image Steganography Based on Genetic Algorithm and Wavelet Transform�, Intelligent Control and Innovative Computing, Vol. 10, pp. 395-402, 2012
[8] Fard, Amin Milani, M-R. Akbarzadeh-T, and Farshad Varasteh-A. "A new genetic algorithm approach for secure JPEG steganography." In Engineering of Intelligent Systems, 2006 IEEE International Conference on, pp. 1-6. IEEE, 2006.
[9] Hajizadeh, Hamzeh, Ahmad Ayatollahi, and Sattar Mirzakuchaki. "A new high capacity and EMD-based image steganography scheme in spatial domain." In Electrical Engineering (ICEE), 2013 21st Iranian Conference on, pp. 1-6. IEEE, 2013.
[10] Singh, Ravindra Kumar, Harsh Kumar Verma, and Charan Kamaljit Singh. "Bi-directional pixel-value differencing approach for RGB color image." InContemporary Computing (IC3), 2013 Sixth International Conference on, pp. 47-52. IEEE, 2013.
[11] Saraireh, Saleh. "A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY." International Journal of Computer Networks & Communications 5, no. 3 (2013).
[12] Bandyopadhyay, Samir K., and Sabyasachi Pramanik. "Application of Steganography in Symmetric Key Cryptography with Genetic Algorithm."INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 7 (2013): 1791-1799.
[13] Juneja, Mamta, and Parvinder S. Sandhu. "Data Hiding with Enhanced LSB Steganography and Cryptography for RGB Color Images."International Conference on Latest Computational Technologies (ICLCT`2013) June 17-18, 2013 London (UK)
[14] Balasubramanian, C., S. Selvakumar, and S. Geetha. "High payload image steganography with reduced distortion using octonary pixel pairing scheme."Multimedia Tools and Applications (2013): 1-23.
[15] Yang, Ching-Yu. "Robust Watermarking Scheme Based on Radius Weight Mean and Feature-Embedding Technique." ETRI Journal 35, no. 3 (2013).
[16] Chakraborty, Suman, Sudipta Roy, and Samir K. Bandyopadhyay. "Image Steganography Using DNA Sequence and Sudoku Solution Matrix."International Journal 2, no. 2 (2012).
[17] Shejul, Anjali A., and Umesh L. Kulkarni. "A DWT based approach for steganography using biometrics." In Data Storage and Data Engineering (DSDE), 2010 International Conference on, pp. 39-43. IEEE, 2010.
[18] Shejul, Anjali A., and Umesh L. Kulkarni. "A secure skin tone based steganography using wavelet transform." International Journal of computer theory and Engineering 3, no. 1 (2011): 16-22.
[19] Chen, Po-Yueh, and Hung-Ju Lin. "A DWT based approach for image steganography." International Journal of Applied Science and Engineering 4, no. 3 (2006): 275-290.
[20] Tolba, Mohamed Fahmy, MA-S. Ghonemy, IA-H. Taha, and Amal Said Khalifa. "High capacity image steganography using wavelet-based fusion." In Computers and Communications, 2004. Proceedings. ISCC 2004. Ninth International Symposium on, vol. 1, pp. 430-435. IEEE, 2004.
[21] El Safy, R. O., H. H. Zayed, and A. El Dessouki. "An adaptive steganographic technique based on integer wavelet transform." In Networking and Media Convergence, 2009. ICNM 2009. International Conference on, pp. 111-117. IEEE, 2009.
[22] Raja, K. B., S. Sindhu, T. D. Mahalakshmi, S. Akshatha, B. K. Nithin, M. Sarvajith, K. R. Venugopal, and Lalit M. Patnaik. "Robust image adaptive steganography using integer wavelets." In Communication Systems Software and Middleware and Workshops, 2008. COMSWARE 2008. 3rd International Conference on, pp. 614-621. IEEE, 2008.
[23] Bhattacharya, Tanmay, Nilanjan Dey, and S. R. Chaudhuri. "A novel session based dual steganographic technique using DWT and spread spectrum." arXiv preprint arXiv:1209.0054 (2012).
[24] Torres-Maya, Silvia, Mariko Nakano-Miyatake, and Hector Perez-Meana. "An image steganography systems based on bpcs and iwt." In Electronics, Communications and Computers, 2006. CONIELECOMP 2006. 16th International Conference on, pp. 51-51. IEEE, 2006.
[25] Chen, Wen-Yuan. "Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation." Applied Mathematics and Computation 185, no. 1 (2007): 432-448.
[26] Cheng, Qiang, and Thomas S. Huang. "An additive approach to transform-domain information hiding and optimum detection structure." Multimedia, IEEE Transactions on 3, no. 3 (2001): 273-284.
[27] Kociołek, Marcin, Andrzej Materka, Michał Strzelecki, and Piotr Szczypiński. "Discrete wavelet transform-derived features for digital image texture analysis." In International Conference on Signals and Electronic Systems, Ł�dź-Poland, pp. 99-104. 2001.
[28] S. Mallat: A wavelet Tour of Signal Processing, Academic Press, San Diego 1998
[29] K. Prasad, V. Jyothsna, S Raju and S. Indraneel, �High Secure Image Steganography in BCBS Using DCT and Fractal Compression,� International Journal of Computer Science and Network Security, vol. 10 No.4, April 2010.
[30] Mazumder, Juned Ahmed, and Kattamanchi Hemachandran. "A High Capacity and Secured Color Image Steganographic Technique Using Discrete Wavelet Transformation." IJCSIT) International Journal of Computer Science and Information Technologies 4, no. 4 (2013): 583-589.
[31] Mazumder, Juned Ahmed, and K. Hemachandran. "Study of Image steganography using LSB, DFT and DWT." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, no. 5 (2013): 2618-2627.
[32] Mazumder, Juned Ahmed, and K. Hemachandran. "Review Of Different Techniques Used In Recent Steganography Researches." International Journal of Engineering 1, no. 8 (2012).
[33] Devi, Ningthoujam Sunita, and K. Hemachandran. "Automatic Face Recognition System using Pattern Recognition Techniques: A Survey."