CFP last date
20 December 2024
Reseach Article

A Robust Image Steganography using CDF Lifting Scheme and Huffman Encoding

by Suganthi Venkatachalam, A. Shamim Banu, M. Padmaa
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 110 - Number 11
Year of Publication: 2015
Authors: Suganthi Venkatachalam, A. Shamim Banu, M. Padmaa
10.5120/19359-0921

Suganthi Venkatachalam, A. Shamim Banu, M. Padmaa . A Robust Image Steganography using CDF Lifting Scheme and Huffman Encoding. International Journal of Computer Applications. 110, 11 ( January 2015), 8-11. DOI=10.5120/19359-0921

@article{ 10.5120/19359-0921,
author = { Suganthi Venkatachalam, A. Shamim Banu, M. Padmaa },
title = { A Robust Image Steganography using CDF Lifting Scheme and Huffman Encoding },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 110 },
number = { 11 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 8-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume110/number11/19359-0921/ },
doi = { 10.5120/19359-0921 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:46:04.217611+05:30
%A Suganthi Venkatachalam
%A A. Shamim Banu
%A M. Padmaa
%T A Robust Image Steganography using CDF Lifting Scheme and Huffman Encoding
%J International Journal of Computer Applications
%@ 0975-8887
%V 110
%N 11
%P 8-11
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the modern era, concerns about safeguarding the information from attacks are on rise. Here, 2-d lifting wavelet decomposition of a grayscale cover image through Cohen, Daubechies and Feauveau (2,2) lifting wavelet is performed and three secret images are shuffled and embedded in detail coefficients of the transform using approximation coefficients as indicator. Here, a novel Approximate Coefficients Value Indicator methodology is used to shuffle and embed the binary images in detail coefficients. Lossy and lossless steganographic techniques, followed by a lossless compression scheme using Huffman encoding are proposed. In lossy steganographic technique, secret images are embedded in LSB values of high frequency bands of the transform. In lossless technique, high frequency band values are expanded and images are embedded as previous method. Attacks such as Histogram attacks, statistical attacks are performed to check the robustness of the proposed algorithm. MSE and PSNR values are calculated to demonstrate the imperceptibility of the proposed method.

References
  1. Andreas Westfeld and Andreas Pfitzmann, "Attacks on Steganographic Systems Breaking the Steganographic Utilities - EzStego, Jsteg, Steganos, and S-Tool"
  2. J. Y. Hsiao. C. C. Chang. and C. -S. Chan. "Finding optimal least significant-bit substitution in image hiding by dynamic programming strategy" Pattern Recognition, 36:1583– 1595, 2003.
  3. Chan, C. K. and Cheng. L. M. "Hiding data in image by simple LB substitution" Pattern Recognition, 37: 469 – 474, 2003.
  4. D. C. Wu and W. H. Tsai "A steganographic method for Images by pixel value differencing" Pattern Recognition Letters" 24- 1613– 1626, 2003
  5. Chang, C. C and Tseng, H. W. "A Steganographic method for digital images using side match". Pattern Recognition Letters, 25: 1431 – 1437, 2004.
  6. Chen, P. Y. and Wu, W. E. "A Modified Side Match Scheme for Image Steganography" International Journal of Applied Science and Engineering, 7(1): 53 – 60, 2009.
  7. Chu, Y. P. , Guo, S. W. , Chan, Y. K. and Wu, H. C. "Image Hiding Based on a Hybrid Technique of VQ Compression and Discrete Wavelet Transform ",International Computer Symposium, 313-317,2004.
  8. Bao, P and Ma, X. "Image Adaptive Watermarking Using Wavelet Domain Singular Value Decomposition", IEEE Transaction on Circuits and Systems for Video Technology, 15(1):2005
  9. Andrew Westfeld " F5-a steganographic algorithm: high capacity despite better steganalysis" In Proceedings of the 4th Information Hiding Workshop, volume 2137 of LNCS, pages 289-302. Springer, 2001.
  10. J. Fridrich, M. Goljan, and D. Hogea" Attacking the outguess" In Proceedings of 2002 ACM Workshop on Multimedia and Security, pages 36. ACM Press.
  11. Chia-Chen Lin" High capacity data hiding scheme for dct-based images" Journal of Information Hiding and Multimedia Signal Processing, 1, 2010
  12. Bo Yang and Beixing Deng" Steganography in gray images using wavelet" In Proceedings of ISCCSP 2006
  13. Po-Yueh Chen and Hung-Ju Lin" A dwt based approach for image steganography" International Journal of Applied Science and Engineering, 4:275– 290, 2006
  14. V. Kumar and D. Kumar" Performance evaluation of dwt based image steganography" In Proceedings of Advance Computing Conference (IACC), 2010 IEEE 2nd International, pages 223– 228, 2010.
  15. W. Sweldens, "The Lifting Scheme: A Custom-Design Construction of Biorthogonal Wavelets" , Academic Press, Inc, 1996.
  16. Daubechies and W. Sweldens, "Factoring Wavelet Transforms into Lifting Steps" Program for Applied and Computational Mathematics, Princeton University, November 1997
  17. Yun Q. Shi and Huifang Sun" Image and Video Compression for Multimedia Engineering", second edition CRC Press, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

DWT CDF Integer wavelet transform stego image cover image lossy lossless Histogram