CFP last date
20 January 2025
Reseach Article

Reversible Data Hiding by Integer Wavelet Transform with Lossless EZW Bit-Stream

by Mostafa A. Ahmad, Aly M. Meligy, Amal H. Hashim, Ayoub K. Al-hamadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 66 - Number 2
Year of Publication: 2013
Authors: Mostafa A. Ahmad, Aly M. Meligy, Amal H. Hashim, Ayoub K. Al-hamadi
10.5120/11054-5952

Mostafa A. Ahmad, Aly M. Meligy, Amal H. Hashim, Ayoub K. Al-hamadi . Reversible Data Hiding by Integer Wavelet Transform with Lossless EZW Bit-Stream. International Journal of Computer Applications. 66, 2 ( March 2013), 8-15. DOI=10.5120/11054-5952

@article{ 10.5120/11054-5952,
author = { Mostafa A. Ahmad, Aly M. Meligy, Amal H. Hashim, Ayoub K. Al-hamadi },
title = { Reversible Data Hiding by Integer Wavelet Transform with Lossless EZW Bit-Stream },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 66 },
number = { 2 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 8-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume66/number2/11054-5952/ },
doi = { 10.5120/11054-5952 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:21:15.374516+05:30
%A Mostafa A. Ahmad
%A Aly M. Meligy
%A Amal H. Hashim
%A Ayoub K. Al-hamadi
%T Reversible Data Hiding by Integer Wavelet Transform with Lossless EZW Bit-Stream
%J International Journal of Computer Applications
%@ 0975-8887
%V 66
%N 2
%P 8-15
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A reversible data hiding method using integer wavelet transform with embedded zero-tree wavelet for gray scale images is proposed. The proposed method merges traditional data hiding technique that depends on integer wavelet transform into the EZW image compression algorithm. It can recover the secret message again from the last pass of bit-stream of EZW robustly. This is due to shifting parts of histogram of high frequency subbands in the invertible integer-to-integer wavelet domain of EZW to make space for data hiding. The effect of embedded secret message into EZW coefficients on both of the compression ratio of coding algorithm and stego-image quality is discussed. Experimental results give high visual quality of stego-images at high payloads. The compression ratio of coding algorithm is affected by about 2% on average because of hiding process. Both of secret message and the original cover image are reconstructed without any loss.

References
  1. S. Singh, and G. Agarwal, "Use of image to secure text message with the help of LSB replacement," International Journal of Applied Engineering Research, Dindigul, Vol. 1, No. 1, 2010, pp. 200–205.
  2. M. Abu Zaher, "Modified Least Significant Bit (MLSB)," Computer and Information Science, Vol. 4, No. 1, 2011, pp. 60–67.
  3. C. Chan, and L. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition, Vol. 37, 2004, pp. 469–474.
  4. K. Kumar, K. Raja, R. Chhotaray, and S. Pattanaik, "Bit Length Replacement Steganography Based on DCT Coefficients," International Journal of Engineering Science and Technology, Vol. 2, No. 8, 2010, pp. 356–570.
  5. C. Lin, and P. Shiu, "High Capacity Data Hiding Scheme for DCT-based Images," Journal of Information Hiding and Multimedia Signal Processing, Vol. 1, No. 3, 2010, pp. 220–240.
  6. A. Al-Ataby, and F. Al-Naima, "A Modified High Capacity Image Steganography Technique Based on Wavelet Transform," The International Arab Journal of Information Technology, Vol. 7, No. 4, 2010, pp. 358–364.
  7. P. Chen, and H. Lin, "A DWT Based Approach for Image Steganography," International Journal of Applied Science and Engineering, Vol. 4, No. 3, 2006, pp. 275–290.
  8. L. Ganesan, and S. Jinna, "Reversible Image Data Hiding Using Lifting Wavelet Transform and Histogram Shifting," International Journal of Computer Science and Information Security, Vol. 7, No. 3, 2010, pp. 283–290.
  9. S. Singh, and T. Siddiqui, "A security Enhanced Robust Steganography Algorithm for Data Hiding," International Journal of Computer Science Issues, Vol. 9, No. 1, 2012, pp. 131- 139.
  10. C. Kung, S. Chao, Y. Tu, and Y. Yan, "A Robust Watermarking and Image Authentication Scheme used for Digital Contant Application," Journal of Multimedia, Vol. 4, No. 3, 2009, pp. 112-119.
  11. G. Xuan, Y. Shi, C. Yang, Y. Zheng, D. Zou, and P. Chai, "Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique," Multimedia and Expo, ICME, IEEE International Conference, 2005, pp. 1520–1523.
  12. C. Chang, P. Pai, C. Yeh, and Y. Chan. "A high payload frequency-based reversible image hiding method," Information Science, Elsevier 180, 2010, pp. 2286–2298.
  13. J. Shapiro, "Embedded Image Coding Using Zerotrees of Wavelet Coefficients," IEEE Transaction On Signal Processing, Vol. 4, No. 12, 1993, pp. 3445–3462.
Index Terms

Computer Science
Information Sciences

Keywords

Integer Wavelet Transform (IWT) Embedded Zero-Tree Wavelet (EZW) Data Hiding Histogram Shifting Stego-Image