CFP last date
20 January 2025
Reseach Article

Image Steganography using Karhunen-Loeve Transform and Least Bit Substitution

by Ankit Chadha, Neha Satam, Rakshak Sood, Dattatray Bade
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 79 - Number 9
Year of Publication: 2013
Authors: Ankit Chadha, Neha Satam, Rakshak Sood, Dattatray Bade
10.5120/13771-1628

Ankit Chadha, Neha Satam, Rakshak Sood, Dattatray Bade . Image Steganography using Karhunen-Loeve Transform and Least Bit Substitution. International Journal of Computer Applications. 79, 9 ( October 2013), 31-37. DOI=10.5120/13771-1628

@article{ 10.5120/13771-1628,
author = { Ankit Chadha, Neha Satam, Rakshak Sood, Dattatray Bade },
title = { Image Steganography using Karhunen-Loeve Transform and Least Bit Substitution },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 79 },
number = { 9 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 31-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume79/number9/13771-1628/ },
doi = { 10.5120/13771-1628 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:52:35.620102+05:30
%A Ankit Chadha
%A Neha Satam
%A Rakshak Sood
%A Dattatray Bade
%T Image Steganography using Karhunen-Loeve Transform and Least Bit Substitution
%J International Journal of Computer Applications
%@ 0975-8887
%V 79
%N 9
%P 31-37
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As communication channels are increasing in number, reliability of faithful communication is reducing. Hacking and tempering of data are two major issues for which security should be provided by channel. This raises the importance of steganography. In this paper, a novel method to encode the message information inside a carrier image has been described. It uses Karhunen-Loève Transform for compression of data and Least Bit Substitution for data encryption. Compression removes redundancy and thus also provides encoding to a level. It is taken further by means of Least Bit Substitution. The algorithm used for this purpose uses pixel matrix which serves as a best tool to work on. Three different sets of images were used with three different numbers of bits to be substituted by message information. The experimental results show that algorithm is time efficient and provides high data capacity. Further, it can decrypt the original data effectively. Parameters such as carrier error and message error were calculated for each set and were compared for performance analysis.

References
  1. C. Schwab and R. A. Todor, "Karhunen-Loeve Approximation of Random Fields by Generalized Fast Multipole Methods", Research Report No. 2006-01, Seminar fur Angewandte Mathematik Eidgenossische Technische Hochschule CH-8092 Zurich, January 2006.
  2. Gregore W. Wornell, "A Karhunen-Loeve-like Expansion for 1/f Processes Via Wavelets", IEEE Transactions on Information Theory, Vol. 36, No. 4, July 1990.
  3. M. Gastpar, P. L. Dragotti, and M. Vetterli, "The distributed Karhunen-Loève transform," in Proc. 2002 Int. Workshop on Multimedia Signal Processing, St. Thomas, U. S. Virgin Islands, Dec. 2002, pp. 57–60.
  4. Michael Gastpar, Pier Luigi Dragotti and Martin Vetterli, "The Distributed Karhunen–Loève Transform", IEEE Transactions on Information Theory, Vol. 52, No. 12, December 2006
  5. Bhabatosh Chanda and Dwijesh Dutta Majumder, "Digital Image Processing and Analysis", PHI Learning Pvt. Ltd. , 2004, pp. 32-34.
  6. Chi-Hung Chi and Kwok-Yan Lam, "A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms", AWCC 2004, Zhen Jiang, Jiang Su, China, November 15-17, 2004, Proceedings, Springer, 2004, pp. 219-229.
  7. Ankit Chadha, Neha Satam, Rakshak Sood, Dattatray Bade, "An Efficient Method for Image and Audio Steganography using Least Significant Bit (LSB) Substitution", International Journal of Computer Applications (0975 – 8887), Vol. 77– No. 13, September 2013.
  8. Nikhil Pal and Sankar Pal, "A Review on Image Segmentation Techniques", Pergamon Press Ltd. , 1993, Pattern Recognition, Vol. 26, No. 9, pp. 1277-1294.
  9. Ankit Chadha, Neha Satam, "A Robust Rapid Approach to Image Segmentation with Optimal Thresholding and Watershed Transform", International Journal of Computer Applications (0975 – 8887), Volume 65– No. 9, March 2013.
  10. Markus Neteler and Helena Mitasova, "Open Source Gis: A Grass Gis Approach", Springer, 2002, pp. 254-261.
  11. Emilia Petri?or," Probabilit??i ?i statistic?. Aplica?ii în economie ?iinginerie", Editura "Politehnica" Timi?oara, 2007, ISBN 947-625-210-8.
  12. G. Strang," Introduction to Linear Algebra", Wellesley-Cambridge Press, 2003, (UPT library).
  13. Daniela Stanescu, Ioan-Gabriel Bucur, Mircea Stratulat, "Segment Compression Steganographic Algorithm", IEEE International Joint Conferences on Computational Cybernetics and Technical Informatics (ICCC-CONTI 2010), May 27-29, 2010, pp. 349-354.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Karhunen-Loève Transform Least Bit Substitution pixel matrix eigenvectors