CFP last date
20 December 2024
Reseach Article

High Imperceptibility Image Steganography Methods based on HAAR DWT

by Y. Taouil, E.B. Ameur, A. Souhar, A. El Harraj, M.T. Belghiti
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 138 - Number 10
Year of Publication: 2016
Authors: Y. Taouil, E.B. Ameur, A. Souhar, A. El Harraj, M.T. Belghiti
10.5120/ijca2016908984

Y. Taouil, E.B. Ameur, A. Souhar, A. El Harraj, M.T. Belghiti . High Imperceptibility Image Steganography Methods based on HAAR DWT. International Journal of Computer Applications. 138, 10 ( March 2016), 38-43. DOI=10.5120/ijca2016908984

@article{ 10.5120/ijca2016908984,
author = { Y. Taouil, E.B. Ameur, A. Souhar, A. El Harraj, M.T. Belghiti },
title = { High Imperceptibility Image Steganography Methods based on HAAR DWT },
journal = { International Journal of Computer Applications },
issue_date = { March 2016 },
volume = { 138 },
number = { 10 },
month = { March },
year = { 2016 },
issn = { 0975-8887 },
pages = { 38-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume138/number10/24419-2016908984/ },
doi = { 10.5120/ijca2016908984 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:39:22.090803+05:30
%A Y. Taouil
%A E.B. Ameur
%A A. Souhar
%A A. El Harraj
%A M.T. Belghiti
%T High Imperceptibility Image Steganography Methods based on HAAR DWT
%J International Journal of Computer Applications
%@ 0975-8887
%V 138
%N 10
%P 38-43
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

While cryptography keeps unknown the hidden content of information, steganography provides a higher level of data security by making even the existence of hidden information secret, it is the art of dissimulating information in digital media considering it as an unremarkable support. In this paper we propose a new two methods of image steganography by using Haar discrete wavelet transform, the secret data are hidden in the frequency domain to minimize the distortions occurring on the cover during the steganographic process. The floating point in the coefficients of the transform can cause a loss in information. To prevent this problem, data is embedded in the integer part of high frequency coefficients in such a way that increases the imperceptibility. Extensive experiments on variety of images were performed and the results show that the proposed methods provide better image quality and a high imperceptibility in comparison with prior works. This was achieved using a random key that scrambles the location of the pixels where data is hidden.

References
  1. C.P.Sumathi, T.Santanam and G.Umamaheswari "A Study of Various Steganographic Techniques Used for Information Hiding" International Journal of Computer Science \& Engineering Survey (IJCSES) Vol.4, No.6, December 2013.
  2. Kevin Curran & Karen Bailey "An Evaluation of Image Based Steganography Methods" International Journal of Digital Evidence Fall 2003, Volume2, Issue 2.
  3. N. Ajeeshvali and B.Rajasekhar "Steganography Based on Integer Wavelet Transform and Bicubic Interpolation" I.J. Image, Graphics and Signal Processing, 2012, 12, 26- 33.
  4. Shashikala Channalli, Ajay Jadhav Sinhgad "Steganography, An Art of Hiding Data", International Journal on Computer Science and Engineering Vol.1 (3), 2009, 137-141.
  5. Wien Hong & Tung-Shou Chen "Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism", J. Vis. Commun. Image R. 22 (2011) 131-140.
  6. Ki-Hyun Jung & Kee-Young "Steganographic method based on interpolation and LSB substitution of digital images", Multimed Tools Appl DOI 10.1007/s11042-013-1832-y.
  7. Jie Hu, Tianrui Li "Reversible steganography using extended image interpolation technique", Computers & Electrical Engineering, Volume 46, August 2015, Pages 447–455.
  8. Deepak Singla & Rupali Syal "Data Security Using LSB & DCT Steganography In Images", International Journal Of Computational Engineering Research/ ISSN: 2250-3005.
  9. Bo Yang and Beixing Deng "Steganography in gray images using wavelet" In Proceedings of ISCCSP 2006.
  10. Nur Azman Abu, Prajanto Wahyu Adi and Othman Mohd "Robust Digital Image Steganography within Coefficient Difference on Integer Haar Wavelet Transform" International Journal of Video\&Image Processing and Network Security IJVIPNS-IJENS Vol: 14 No: 02.
  11. A. Cheddad, J. Condell, K. Curran, and P.M. Kevitt, "Digital Image Steganography: Survey and Analysis of Current Methods", Digital Signal Processing, vol.90, no.3, pp.727-752, 2010.
  12. B. Li, J. He, J. Huang, and Y. Shi, "A Survey on Image Steganography and Steganalysis", Journal of Information Hiding and Multimedia Signal Processing, vol.2, no.2, pp.142-172, 2011.
  13. R. Roy, S. Changder, A. Sarkar, and N.C. Debnath, "Evaluating Image Steganography Techniques: Future Research Challenges", Computing, Management and Telecommunications (ComManTel), pp.21-24, Ho Chi Minh, Vietnam, 2013.
  14. J. Zollner, H. Federrath, H. Klimant, A. Pitzman, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, "Modeling the Security of Steganographic Systems" Information Hiding Workshop, pp.345-355, Portland, USA, 1998.
  15. C. Cachin "An Information theoretic Model for Steganography", Information and Computation, vol.192, no.1, pp.41-56, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Hiding information Haar discrete wavelet transform Imperceptibility Random key.