CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Hybrid Domain based Steganography using BPS, LSB and IWT

by H. S. Manjunatha Reddy, K. B. Raja
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 54 - Number 3
Year of Publication: 2012
Authors: H. S. Manjunatha Reddy, K. B. Raja
10.5120/8544-2096

H. S. Manjunatha Reddy, K. B. Raja . Hybrid Domain based Steganography using BPS, LSB and IWT. International Journal of Computer Applications. 54, 3 ( September 2012), 9-16. DOI=10.5120/8544-2096

@article{ 10.5120/8544-2096,
author = { H. S. Manjunatha Reddy, K. B. Raja },
title = { Hybrid Domain based Steganography using BPS, LSB and IWT },
journal = { International Journal of Computer Applications },
issue_date = { September 2012 },
volume = { 54 },
number = { 3 },
month = { September },
year = { 2012 },
issn = { 0975-8887 },
pages = { 9-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume54/number3/8544-2096/ },
doi = { 10.5120/8544-2096 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:54:43.733474+05:30
%A H. S. Manjunatha Reddy
%A K. B. Raja
%T Hybrid Domain based Steganography using BPS, LSB and IWT
%J International Journal of Computer Applications
%@ 0975-8887
%V 54
%N 3
%P 9-16
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Steganography used to transport information from one place to other place through public channel in covert way. In this paper we propose Hybrid domain Steganography using BPS, LSB and IWT (HSBLI). The payload is decomposed into two equal parts say part 1 and part 2. The cover and payload (PL) part 1 pixel intensity value are observed and if intensity values are more than or equal to 128 then Bit Plane Slicing (BPS) algorithm is used to embed payload in to cover image. If the intensity values of cover image and PL part 1 are less than 128, square root is applied to compress 8 bit pixel length to 4 bit pixel length and LSB technique is used to replace PL part 1 value by cover image LSB values. The BPS stego object is merged with LSB stego object to obtain intermediate stego object. The IWT is applied on intermediate stego object to derive four sub bands. The PL part 2 is considered and embedded into LL sub band of intermediate stego object using LSB replacement method to obtain final stego object. The inverse IWT is applied on final stego object to get stego image in spatial domain. The payload is extracted at the destination by applying reverse process of embedding. It is observed that the values of PSNR better in the case of proposed algorithm compare to existing algorithms.

References
  1. Eiji Kawaguchi and Richard O. Eason "Principle and Applications of BPCS-Steganography," Proceedings of SPIE: Multimedia Systems and Applications, Vol. 3528, pp. 464-463, 1998.
  2. Sarreshtedari S and Ghaemmaghami S, "High Capacity Image Steganography in Wavelet Domain," International Conference on Consumer Communications and Networking, pp. 1-6, 2010.
  3. Kumar V and Kumar D, "Performance Evaluation of DWT Based Image Steganography," IEEE International Conference on Advance Computing, pp. 223-228, February 2010.
  4. R O El Safy, H H Zayed and A El Dessouki "An Adaptive Steganographic Technique Based on Integer Wavelet Transform," International Conference on Networking and Media Convergence, pp. 111-117, March 2009.
  5. Shrikant S. Khaire and Sanjay L. Nalbalwar "Review: Steganography-Bit Plane Complexity Segmentation Technique," International Journal of Engineering Science and Technology, Vol. 2 (9), pp. 4860 – 4868, 2010.
  6. Marghny Mohamed and Mohamed Bamatraf, "Data Hiding by LSB Substitution using Genetic Optimal Key-Permutation," International Arab Journal of e-Technology, Vol-2, No. 1, January 2011.
  7. Rohini Sharma and Ekta Walia, "Analysis of Non-Adaptive and Adaptive Edge based LSB Steganography for Colored Images," International Journal of Computing and Business Research, Vol-2, 2011.
  8. Rupinder Kaur, Mandeep Kaur and Rahul Malhotra "A New Efficient Approach towards Steganography," International Journal of Computer Science and Information Technologies, Vol. 2(2), pp 673-676 , 2011.
  9. Joyshree Nath and Sankar Das "Advanced Steganographic Approach for Hiding Encrypted Secret Message in LSB, LSB+1, LSB+2 and LSB+3 bits in Non Standard Cover Files," International Journal of Computer Applications , Vol. 14, No. 7, pp 31-35, February 2011.
  10. Lifang Yu, Yao Zhao and Rongrong Ni "Improved Adaptive LSB Steganography based on Chaos and Genetic Algorithm," Journal on Advances in Signal Processing, pp. 1-6 , 2010.
  11. Sanjive Tyagi and Ajay Agarwal, " Multi layers Security Scheme for Embedding Secrets in Stego image," International Journal of Advanced Engineering Sciences and Technologies, Vol. 3 Issue. 1, pp. 029-033, 2011.
  12. Souvik Bhattacharya and Aparajit Khan "Pixel Mapping Method (PMM) based Bit Plane Complexity Segmentation (BPCS) Steganography," World Congress on Information and Communication Technologies, pp. 36-41, 2011.
  13. J. Anita Christaline and D. Vaishali, "Image Steganographic Techniques with Improved Embedding Capacity and Robustness," International Conference on Recent Trends in Information Technology, pp. 97-101 june, 2011.
  14. K Ramani, E V Prasad and S Vardarajan "Steganography using BPCS to the Integer Wavelet Transformed Image," International Journal of Computer Science and Network Security, vol. 7, No. 7, July 2007.
  15. El-Sayed M. El-Alfy, Azzat A. and Al-Sadi "A Comparative Study of PVD-Based Schemes for Data Hiding in Digital Images," IEEE International Conference on Computer Systems and Applications, pp. 144-149, 2011.
  16. Elham Ghasemi, Jamshid Shanbehzadeh and Bahram Zahir Azami "A Steganographic Method Based on Integer Wavelet Transform and Genetic Algorithm," International Conference on Communications and Signal Processing, pp. 42-45, 2011.
  17. Siva Janakiraman, Anitha Mary A and Jagannathan Chakravarthy, "Pixel Bit Manipulation for Encoded Hiding - An Inherent stego," International Conference on Computer Communication and Informatics pp. 1-6 Jan 2012.
  18. Yedla Dinesh and Addanki Purna Ramesh, "Efficient Capacity Image Steganography by Using Wavelets," International Journal of Engineering Research and Applications, vol. 2, issue 1, pp. 251-259 Feb 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography BPS embedding IWT Payload Cover Image