Open Access   Article Go Back

A novel technique to hide information using Daubechies Transformation

Jyotsna Kumar Mandal1 , Sujit Das2 , 3 , Madhumita Sengupta4

Section:Research Paper, Product Type: Conference Paper
Volume-04 , Issue-01 , Page no. 61-68, Feb-2016

Online published on Feb 26, 2016

Copyright © Jyotsna Kumar Mandal, Sujit Das,, Madhumita Sengupta . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Jyotsna Kumar Mandal, Sujit Das,, Madhumita Sengupta , “A novel technique to hide information using Daubechies Transformation,” International Journal of Computer Sciences and Engineering, Vol.04, Issue.01, pp.61-68, 2016.

MLA Style Citation: Jyotsna Kumar Mandal, Sujit Das,, Madhumita Sengupta "A novel technique to hide information using Daubechies Transformation." International Journal of Computer Sciences and Engineering 04.01 (2016): 61-68.

APA Style Citation: Jyotsna Kumar Mandal, Sujit Das,, Madhumita Sengupta , (2016). A novel technique to hide information using Daubechies Transformation. International Journal of Computer Sciences and Engineering, 04(01), 61-68.

BibTex Style Citation:
@article{Mandal_2016,
author = {Jyotsna Kumar Mandal, Sujit Das,, Madhumita Sengupta },
title = {A novel technique to hide information using Daubechies Transformation},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2016},
volume = {04},
Issue = {01},
month = {2},
year = {2016},
issn = {2347-2693},
pages = {61-68},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=34},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=34
TI - A novel technique to hide information using Daubechies Transformation
T2 - International Journal of Computer Sciences and Engineering
AU - Jyotsna Kumar Mandal, Sujit Das,, Madhumita Sengupta
PY - 2016
DA - 2016/02/26
PB - IJCSE, Indore, INDIA
SP - 61-68
IS - 01
VL - 04
SN - 2347-2693
ER -

           

Abstract

Steganography is an ancient approach of fusing data into innocence medium to hide data secretly in such a way no one can have knowledge of it. This paper presents a technique of Image steganography on frequency domain through Daubechies Transformation. This transformation converts image from spatial domain to frequency domain and allowed embedding with a payload of 2.0 bpb without visual degradation. A gray level image considered as innocent medium of size NxN, where N = 2p, p is an positive integer & is divided into 4x4 non-overlapping blocks in a row major order and a 2D Daubechies Transformation is applied to each of (NxN)/16 blocks to generate frequency components. Three layer of adjustment in terms of security enhancement are applied to improve the quality of stego image. The number of bits embedded per pixel or block is a variable and based on hash function which is used to find the position of each bit. After embedding 4 bits from LSB are grouped into two pairs and XORed, bitwise results are shuffled and stored on last four bits from LSB

Key-Words / Index Term

Daubechies Transform,Cover Image,Stego Image

References

[1] Alturki F.; Russell, Mersereau. (2001, October 7-10). Secure blind image steganographic technique using discrete Fourier transformation. International Conference on Image Processing. Proceedings., vol.2,. 542 545. doi: 10.1109/ICIP.2001.958548
[2] Hashad, A.I.; Madani, A.S.; Wahdan, A.E.M.A. (2005, December 5th 6th). A robust steganography technique using discrete cosine transform insertion. 3rd International Conference on Information and Communications Technology. Enabling Technologies for the New Knowledge Society: ITICT. 255 264, doi: 10.1109/ITICT.2005.1609628.
[3] J.K. Mandal,MadhumitaSengupta, ”Authentication/Secret Message Transformation through Wavelet Transform Based Subband Image Coding (WTSIC)”,2010
[4] Hsieh, Ming-Shing; Tseng, Din-Chang; Huang. Yong-Huai. (2001, October). Hiding digital watermarks using multiresolution wavelet transform. Industrial Electronics, IEEE Transactions on, 48(5). 875 882. doi: 10.1109/41.954550.
[5] MadhumitaSengupta,J. K. Mandal, N. Ghoshal ,”An Authentication Technique in Frequency Domain through Wavelet Transform (ATFDWT)”,2012
[6] Sengupta, Madhumita; Mandal, J. K.,”Transformed IRIS Signature fabricated Authentication in Wavelet based Frequency Domain (TISAWFD)”,2011
[7] MadhumitaSengupta,J.K. Mandal,”Authentication Through Hough Transformation Generated Signature on G-Let D3 Domain (AHSG)”,2013