CFP last date
20 December 2024
Reseach Article

A Session Based Multiple Image Hiding Technique using DWT and DCT

by Tanmay Bhattacharya, Nilanjan Dey, S. R. Bhadra Chaudhuri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 38 - Number 5
Year of Publication: 2012
Authors: Tanmay Bhattacharya, Nilanjan Dey, S. R. Bhadra Chaudhuri
10.5120/4684-6808

Tanmay Bhattacharya, Nilanjan Dey, S. R. Bhadra Chaudhuri . A Session Based Multiple Image Hiding Technique using DWT and DCT. International Journal of Computer Applications. 38, 5 ( January 2012), 18-21. DOI=10.5120/4684-6808

@article{ 10.5120/4684-6808,
author = { Tanmay Bhattacharya, Nilanjan Dey, S. R. Bhadra Chaudhuri },
title = { A Session Based Multiple Image Hiding Technique using DWT and DCT },
journal = { International Journal of Computer Applications },
issue_date = { January 2012 },
volume = { 38 },
number = { 5 },
month = { January },
year = { 2012 },
issn = { 0975-8887 },
pages = { 18-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume38/number5/4684-6808/ },
doi = { 10.5120/4684-6808 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:24:46.000422+05:30
%A Tanmay Bhattacharya
%A Nilanjan Dey
%A S. R. Bhadra Chaudhuri
%T A Session Based Multiple Image Hiding Technique using DWT and DCT
%J International Journal of Computer Applications
%@ 0975-8887
%V 38
%N 5
%P 18-21
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This work proposes Steganographic technique for hiding multiple images in a color image based on DWT and DCT. The cover image is decomposed into three separate color planes namely R, G and B. Individual planes are decomposed into subbands using DWT. DCT is applied in HH component of each plane. Secret images are dispersed among the selected DCT coefficients using a pseudo random sequence and a Session key. Secret images are extracted using the session key and the size of the images from the planer decomposed stego image. In this approach the stego image generated is of acceptable level of imperceptibility and distortion compared to the cover image and the overall security is high.

References
  1. N. F. Johnson and S. Katzenbeisser,” .A survey of steganographic techniques”, in S. Katzenbeisser and F. Peticolas (Eds.): Information Hiding, pp.43-78. Artech House, Norwood, MA, 2000.
  2. Lou, D. C. and Liu, J. L. 2002. “Steganography Method for Secure Communications”. Elsevier Science on Computers& Security, 21, 5: 449-460.
  3. J. Fridrich and M. Goljan, .Practical steganalysis of digital images-state of the art., Proc. SPIE Photonics West, Vol. 4675, pp. 1-13, San Jose, California, Jan. 2002.
  4. Chan, C. K. and Cheng, L. M. 2003. Hiding data in image by simple LSB substitution. Pattern Recognition, 37:469-474.
  5. Iwata, M., Miyake, K., and Shiozaki, A. 2004. “Digital Steganography Utilizing Features of JPEG Images”, IEICE Transfusion Fundamentals, E87-A, 4:929-936.
  6. Blossom Kaur, Amandeep Kaur, Jasdeep Singh, “Steganographic Approach for Hiding Image in DCT Domain”, International Journal of Advances in Engineering & Technology, July 2011.
  7. Po-Yueh Chen* and Hung-Ju Lin, “A DWT Based Approach for Image Steganography”, International Journal of Applied Science and Engineering 2006. 4, 3: 275-290
  8. Ali Al-Ataby and Fawzi Al-Naima, “A Modified High Capacity Image Steganography Technique Based on Wavelet Transform”, The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010
  9. Tanmay Bhattacharya, Nilanjan Dey,S. R. Bhadra Chaudhuri,” A Novel Session Based Dual Steganographic Technique Using DWT and Spread Spectrum”, International Journal of Modern Engineering Research ,Vol.1, Issue1, pp- 157-161
  10. Ajit Danti, Preethi Acharya,” Randomized Embedding Scheme Based on DCT Coefficients for Image Steganography” IJCA Special Issue on “Recent Trends in Image Processing and Pattern Recognition” RTIPPR, 2010.
  11. K B Shiva Kumar, K B Raja,R K Chhotaray, Sabyasachi Pattanaik,” Bit Length Replacement Steganography based on DCT Coefficients”, International Journal of Engineering Science and Technology Vol. 2(8), 2010, 3561-3570.
Index Terms

Computer Science
Information Sciences

Keywords

DCT Session Based Key Pseudo Random Sequence RGB Color planes.