We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Eliminating Cover Image Requirement in Discrete Wavelet Transform based Digital Image Steganography

by Parul Sehgal, Vijay Kumar Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 68 - Number 3
Year of Publication: 2013
Authors: Parul Sehgal, Vijay Kumar Sharma
10.5120/11562-6848

Parul Sehgal, Vijay Kumar Sharma . Eliminating Cover Image Requirement in Discrete Wavelet Transform based Digital Image Steganography. International Journal of Computer Applications. 68, 3 ( April 2013), 37-42. DOI=10.5120/11562-6848

@article{ 10.5120/11562-6848,
author = { Parul Sehgal, Vijay Kumar Sharma },
title = { Eliminating Cover Image Requirement in Discrete Wavelet Transform based Digital Image Steganography },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 68 },
number = { 3 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 37-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume68/number3/11562-6848/ },
doi = { 10.5120/11562-6848 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:26:50.909684+05:30
%A Parul Sehgal
%A Vijay Kumar Sharma
%T Eliminating Cover Image Requirement in Discrete Wavelet Transform based Digital Image Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 68
%N 3
%P 37-42
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Image steganography is the art and science of hiding secret image into digital media such that no one apart from the intended recipient is able to detect the existence of the information. There are many different carriers that can be used to hide the information such as digital images, videos, sound files and other computer files but digital images are the most popular. In this paper, a method has been proposed using which a large size secret image can be hidden into small size cover image securely. The main aim here is the absolute invisibility of the large size secret image. The secret image is first scrambled by using Arnold transformation. Haar Discrete Wavelet Transformation (DWT) is then applied on cover image and Arnold transformed secret image, followed by Alpha Blending operation. Then the Haar Inverse Discrete Wavelet Transformation (IDWT) is applied to obtain the stego image. At the receiver side, first the cover image is obtained from the stego image. Then Haar DWT is applied on the cover image and the stego image followed by the alpha blending operation. Haar IDWT is applied on the resulting image. Then by applying Arnold transformation, the secret image is obtained. The proposed method does not require the sender to send the cover image to the receiver for obtaining the secret image. The performance of the proposed method is investigated by comparing the cover image and the stego image in terms of Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE) and Normalized Cross Correlation (NCC). Experimental results demonstrate the effectiveness and accuracy of the proposed method.

References
  1. Prabakaran. G and Bhavani. R, "A Modified Secure Digital Image Steganography Based on Discrete Wavelet Transform", International Conference on Computing, Electronics and Electrical Technologies, pp. 1096-1100, 2012.
  2. P. Chen, and H. Lin, "A DWT based approach for image steganography", International Journal of applied Science and Engineering", volume 4, 3, pp 275-290, 2006.
  3. H S Manjunatha Reddy and K B Raja, "High Capacity and Security Steganography using Discrete Wavelet Transform", International Journal of Computer Science and Security (IJCSS), Volume (3): Issue (6), pp. 462-472.
  4. Nagham Hamid, Abid Yahya, R. Badlishah Ahmad, and Osamah M. Al-Qershi, "Image Steganography Techniques: An Overview", International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (3) : 2012, pp. 168-187
  5. Narasimmalou, T. and Allen, J. R. , "Optimized Discrete Wavelet Transform based Steganography", International Conference on Advanced Communication Control and Computing Technologies, pp. 88-91, 2012.
  6. K. B. Raja, S. Sindhu, T. D. Mahalakshmi, S. Akshatha, B. K. Nithin, M. Sarvajith, K. R. Venugopal,L. M. Patnaik, "Robust Image Adaptive Steganography using Integer Wavelets" International conference on Communication Systems Software, pp. 614-621, 2008.
  7. Babita Ahuja and Manpreet Kaur, "High Capacity Filter Based Steganography," International Journal of Recent Trends in Engineering, vol. I, no. I, pp. 672-674, May 2009.
  8. Tanmay Bhattacharya, Nilanjan Dey and S. R. Bhadra Chaudhuri, "A Novel Session Based Dual Steganographic Technique using DWT and Spread Spectrum", International Journal of Modern Engineering Research, Vol. 1, Issue1, pp-157-161.
  9. Nikita Kashyap and G. R. Sinha, "Image Watermarking Using 3-Level Discrete Wavelet Transform (DWT)", I. J. Modern Education and Computer Science, 2012, 3, pp. 50-56.
  10. M. Sifuzzaman, M. R. Islam and M. Z. Ali, "Application of Wavelet Transform and its Advantages Compared to Fourier Transform", Journal of Physical Sciences, Vol. 13, 2009, pp. 121-134.
  11. Amitava Nag, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar, "A Novel Technique for Image Steganography Based on DWT and Huffman Encoding", International Journal of Computer Science and Security, Volume (4): Issue (6), pp. 561-570.
  12. Arash Vosoughi and Mohammad. B. Shamsollahi, "Speckle Noise Reduction of Ultrasound Images Using M-band Wavelet Transform and Wiener Filter in a Homomorphic Framework", International Conference on Biomedical Engineering and Informatics, pp. 510-515, 2008.
  13. Shikha Sharda and Sumit Budhiraja, "Image Steganography: A Review", International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 1, January 2013, pp. 707-710.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Arnold Transformation Haar DWT Haar IDWT Alpha Blending Adaptive Thresholding