Abstract
Image steganography is a rapidly developing field with immense applications to offer high data security. There are two types’ or rather two domains in which image steganography has been achieved, spatial and frequency domain. Spatial domain steganography focuses on embedding of the payload on the LSB bits of the pixels on the image, while frequency domain steganography focuses on the transformation of the image pixels using various transform algorithms and then embedding data in the transformed pixels. The most commonly used transform mechanism is the IWT (Integer Wavelet Transform) because of the obvious reason that it yields integer coefficients which are very easy to work with. This paper elucidates the use of Haar Integer Wavelet Transform for Constant and Adaptive number of bit embedding method. Both types are analyzed and finally the method with the highest embedding capacity with high PSNR is adjudged best.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cheddad, A., Condell, J., Curran, K., Kevitt, P.M.: Digital image steganography: Survey and analysis of current methods. Information Sciences 90, 727–752 (2010)
Schneier, B.: Applied Cryptography Protocols, Algorithm and Source Code in C, 2nd edn. Wiley, India (2007)
Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Norwood (2000)
Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3&4), 313–336 (1996)
Chan, C.K., Chen, L.M.: Hiding data in images by simple LSB substitution. Pattern Recognition 37(3), 469–474 (2004)
Thien, C.C., Lin, J.C.: A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition 36(11), 2875–2881 (2003)
Lin, C., Lin, Y.B., Wang, C.M.: Hiding data in spatial domain images with distortion tolerance. Comput. Stand. Inter. 31(2), 458–464 (2009)
Amirtharajan, R., John Bosco Balaguru, R.: Tri-Layer Stego for Enhanced Security – A Keyless Random Approach. IEEE Xplore, doi:10.1109/IMSAA.2009.5439438
Thanikaiselvan, V., Arulmozhivarman, P., Amirtharajan, R., Rayappan, J.B.B.: Wave(Let) Decide Choosy Pixel Embedding for Stego. In: IEEE Conference on Computer, Communication and Electrical Technology ICCCET 2011, pp. 157–162 (2011)
Provos, N., Honeyman, P.: Hide and seek: An introduction to steganography. IEEE Security Privacy Mag. 1(3), 32–44 (2003)
Ghasemi, E., Shanbehzadeh, J., ZahirAzami, B.: A Steganographic method based on Integer Wavelet Transform and Genetic Algorithm. In: International Conference on Communications and Signal Processing (ICCSP), pp. 42–45 (2011)
EI Safy, R.O., Zayed, H.H., EI Dessouki, A.: An Adaptive Steganographic Technique Based on Integer Wavelet Transform. In: International Conference on Networking and Media Convergence ICNM, pp. 111–117 (2009)
Xuan, G., Chen, J., Zhu, J., Shi, Y.Q., Ni, Z., Su, W.: Lossless data hiding based on integer wavelet transform. In: IEEE Workshop on Multimedia Signal Processing, vol. 2, pp. 29–32 (2002)
Lai, B., Chang, L.: Adaptive Data Hiding for Images Based on Harr Discrete Wavelet Transform. In: Chang, L.-W., Lie, W.-N. (eds.) PSIVT 2006. LNCS, vol. 4319, pp. 1085–1093. Springer, Heidelberg (2006)
Amirtharajan, R., Rayappan, J.B.B.: Covered CDMA multi-user writing on spatially divided image. In: IEEE Wireless ViTAE Conference India (2011), doi:10.1109/WIRELESSVITAE.2011.5940912
Marvel, L.M., Boncelet Jr., C.G., Retter, C.T.: Spread spectrum image steganography. IEEE Trans. Image Process. 8(8), 1075–1083 (1999)
Kumar, P.P., Amirtharajan, R., Thenmozhi, K., Rayappan, J.B.B.: Steg-OFDM blend for highly secure multi-user communication. In: IEEE Wireless ViTAE Conference India (2011), doi:10.1109/WIRELESSVITAE.2011.5940918
Wang, C.M., Wu, N.I., Tsai, C.S., Hwang, M.S.: A high quality steganography method with pixel-value differencing and modulus function. J. Syst. Softw. 81, 150–158 (2008)
Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recognit. Lett. 24(9-10), 1613–1626 (2003)
Padmaa, M., Venkataramani, Y., Amirtharajan, R.: Stego on 2n:1 Platform for Users and Embedding. Information Technology Journal 10, 1896–1907 (2010)
Thanikaiselvan, V., Kumar, S., Neelima, N., Amirtharajan, R.: Data Battle on the Digital Field between Horse Cavalry and Interlopers. Journal of Theoretical and Applied Information Technology 29(2), 85–91 (2011)
Aura, T.: Practical Invisibility in Digital Communication. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 265–278. Springer, Heidelberg (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Thanikaiselvan, V., Arulmozhivarman, P., Amirtharajan, R., Balaguru Rayappan, J.B. (2012). Wavelet Pave the Trio Travel for a Secret Mission – A Stego Vision. In: Krishna, P.V., Babu, M.R., Ariwa, E. (eds) Global Trends in Information Systems and Software Applications. ObCom 2011. Communications in Computer and Information Science, vol 270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29216-3_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-29216-3_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29215-6
Online ISBN: 978-3-642-29216-3
eBook Packages: Computer ScienceComputer Science (R0)