CFP last date
20 December 2024
Reseach Article

Wavelet Steganography: An approach based on 3-level Haar Wavelet Transform

Published on May 2012 by Dhanraj. R. Dhotre
National Conference on Recent Trends in Computing
Foundation of Computer Science USA
NCRTC - Number 8
May 2012
Authors: Dhanraj. R. Dhotre
4dceb7a0-bbf3-4744-b117-f759f252006a

Dhanraj. R. Dhotre . Wavelet Steganography: An approach based on 3-level Haar Wavelet Transform. National Conference on Recent Trends in Computing. NCRTC, 8 (May 2012), 6-9.

@article{
author = { Dhanraj. R. Dhotre },
title = { Wavelet Steganography: An approach based on 3-level Haar Wavelet Transform },
journal = { National Conference on Recent Trends in Computing },
issue_date = { May 2012 },
volume = { NCRTC },
number = { 8 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 6-9 },
numpages = 4,
url = { /proceedings/ncrtc/number8/6571-1061/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Computing
%A Dhanraj. R. Dhotre
%T Wavelet Steganography: An approach based on 3-level Haar Wavelet Transform
%J National Conference on Recent Trends in Computing
%@ 0975-8887
%V NCRTC
%N 8
%P 6-9
%D 2012
%I International Journal of Computer Applications
Abstract

Secret communication over network has captured the imagination of researchers for many years. Steganography and Digital watermarking techniques are used to protect copyright information, address digital rights management, and conceal secrets. Secret data hiding techniques provide an interesting challenge for digital forensic investigations. Research into steganalysis techniques aids in the discovery of such hidden information as well as leads research toward improved methods for hiding information. This paper presents a new approach of steganography based on Wavelet transform technique on raw images to enhance the security of the secret data. Steganography is a technique to hide secret information into the image so as unknown to an attacker. The proposed method has ability to hide secret message in a digital color image. In this technique, the bits of secret information are embedded in the coefficients of the Haar Wavelet Transformed cover image. Haar wavelet transform is applied for the separation of different frequency components of image i. e. Low, medium low, medium high and high frequency components of image and these are called sub bands of image. After forming these sub bands we can select high frequency component band from the above four sub bands and embed the bits of secret information into the high frequency coefficient of the selected sub band. To extract secret information apply wavelet transform on stego image, then select the embedded coefficients and extract the secret information bits from the high frequency coefficient. Without secret key nobody is able to extract the secret information from the stegoed image or even not proves the secret information present in the image. An experimental result shows that this approach perform better and improves the data embedding capacity by 15% approximately than 1-level,2-level haar wavelet methods.

References
  1. Johnson, N. F. and Jajodia, S. "Exploring steganography: Seeing the unseen", IEEE Computer Journal, vol. 31 no. 2, pp. 26–34, 1998.
  2. Niels Provos, Peter Honeyman, "Hide and Seek: Introduction to Steganography" , IEEE Transaction on Security & privacy, vol. 1, no. 3 pp. 32-44, 2003.
  3. Potdar, V. , Chang E. , "Grey level modification steganography for secret communication", Proceedings of IEEE Conference on Industrial Informatics, pp. 223-228, 2004.
  4. Jen-Chang Liu , Ming-Hong Shih, "Generalizations of pixel-value differencing steganography for data hiding in images", Elsevier Journal on Pattern Recognition Letters, vol. 83, no. 3, pp. 319-335, 2008.
  5. Bender, W. , Gruhl, D. ,Morimoto, N. , Lu A. , "Techniques for data hiding" , IBM System Journal, vol. 35, no. 4, pp. 313-336, 1996.
  6. Colm Mulcahy, "Image compression using the Haar wavelet transform", Spelman Science and Math Journal , vol. 1, no. 4, pp. 22-31, 1995.
  7. Henk Heijmans and Lute Kamstra, " Reversible Data Embedding Based on the Haar Wavelet Decomposition", Proceedings of VII th IEEE conference on Digital Image Computing: Techniques and Applications, pp. 10-12, 2003.
  8. Jianyun Xu, Andrew H. Sung, Peipei Shi, Qingzhong Liu, "JPEG Compression Immune Steganography Using Wavelet Transform", Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) pp. 7695-2108, 2004.
  9. Cox, I. J. , Miller, M. L. , Bloom, J. A. , "Digital watermarking", Academic Press, vol. 4, pp. 68-74, 2002.
  10. Wu, M. , Liu, B. , "Data hiding in image and video: part I – fundamental issues and solutions", IEEE Transaction on Image Processing, vol. 12, no. 3, pp. 685-695, 2003.
  11. Dewitte, S. , Cornelis, J. , "Lossless integer wavelet transform", IEEE Transaction on Signal Processing, vol. 4, no. 6, 1997.
  12. Masry, M. , Ramos, M. , Hemami, S. S. , "Robust data hiding using psychovisual thresholding" , Processing IEEE International Conference Image Processing, vol. 1, pp. 593-596, 2000.
  13. Norishige Morimoto, "Digital Watermarking Technology with Practical Applications" Information science special issue of Journal on Multimedia Informing Technologies part1, vol. 2, no. 4 pp. 107-111, 1999.
  14. Kessler, G. , "An Overview of Steganography for the Computer Forensics Examiner", Computer & Digital Forensics Program, Champlain College, Burlington, Vermont, February 2004.
  15. Fridrich, J. , Goljan, M. , Du, R. , "Detecting LSB steganography in color, and gray scale images", IEEE Transaction on Multimedia, vol. 8, no. 4, pp. 22-28,2001.
  16. Standard Test Images from USC-SIPI Image Database, available on http:\www. usc-sipi. com.
  17. M. F. Tolba, M. A. Ghonemy, I. A. Taha, and A. S. Khalifa , "Steganography using Integer wavelet Transform in Colored Image Steganography" IJICIS vol. 4, no. 2, pp. 75-85, 2004.
  18. C. K. Chan. L. M. Cheng, "Hiding data in images by simple LSB substitution", Elsevier Journal on Pattern Recognition, vol. 37, no. 3, pp. 469-474, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Security Algorithms Design Embedding Extraction Performance Experimentation Verification