Skip to main content

Wavelet Pave the Trio Travel for a Secret Mission – A Stego Vision

  • Conference paper
Book cover Global Trends in Information Systems and Software Applications (ObCom 2011)

Abstract

Image steganography is a rapidly developing field with immense applications to offer high data security. There are two types’ or rather two domains in which image steganography has been achieved, spatial and frequency domain. Spatial domain steganography focuses on embedding of the payload on the LSB bits of the pixels on the image, while frequency domain steganography focuses on the transformation of the image pixels using various transform algorithms and then embedding data in the transformed pixels. The most commonly used transform mechanism is the IWT (Integer Wavelet Transform) because of the obvious reason that it yields integer coefficients which are very easy to work with. This paper elucidates the use of Haar Integer Wavelet Transform for Constant and Adaptive number of bit embedding method. Both types are analyzed and finally the method with the highest embedding capacity with high PSNR is adjudged best.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cheddad, A., Condell, J., Curran, K., Kevitt, P.M.: Digital image steganography: Survey and analysis of current methods. Information Sciences 90, 727–752 (2010)

    MATH  Google Scholar 

  2. Schneier, B.: Applied Cryptography Protocols, Algorithm and Source Code in C, 2nd edn. Wiley, India (2007)

    Google Scholar 

  3. Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Norwood (2000)

    Google Scholar 

  4. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3&4), 313–336 (1996)

    Article  Google Scholar 

  5. Chan, C.K., Chen, L.M.: Hiding data in images by simple LSB substitution. Pattern Recognition 37(3), 469–474 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  6. Thien, C.C., Lin, J.C.: A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition 36(11), 2875–2881 (2003)

    Article  MATH  Google Scholar 

  7. Lin, C., Lin, Y.B., Wang, C.M.: Hiding data in spatial domain images with distortion tolerance. Comput. Stand. Inter. 31(2), 458–464 (2009)

    Article  Google Scholar 

  8. Amirtharajan, R., John Bosco Balaguru, R.: Tri-Layer Stego for Enhanced Security – A Keyless Random Approach. IEEE Xplore, doi:10.1109/IMSAA.2009.5439438

    Google Scholar 

  9. Thanikaiselvan, V., Arulmozhivarman, P., Amirtharajan, R., Rayappan, J.B.B.: Wave(Let) Decide Choosy Pixel Embedding for Stego. In: IEEE Conference on  Computer, Communication and Electrical Technology ICCCET 2011, pp. 157–162 (2011)

    Google Scholar 

  10. Provos, N., Honeyman, P.: Hide and seek: An introduction to steganography. IEEE Security Privacy Mag. 1(3), 32–44 (2003)

    Article  Google Scholar 

  11. Ghasemi, E., Shanbehzadeh, J., ZahirAzami, B.: A Steganographic method based on Integer Wavelet Transform and Genetic Algorithm. In: International Conference on Communications and Signal Processing (ICCSP), pp. 42–45 (2011)

    Google Scholar 

  12. EI Safy, R.O., Zayed, H.H., EI Dessouki, A.: An Adaptive Steganographic Technique Based on Integer Wavelet Transform. In: International Conference on Networking and Media Convergence ICNM, pp. 111–117 (2009)

    Google Scholar 

  13. Xuan, G., Chen, J., Zhu, J., Shi, Y.Q., Ni, Z., Su, W.: Lossless data hiding based on integer wavelet transform. In: IEEE Workshop on Multimedia Signal Processing, vol. 2, pp. 29–32 (2002)

    Google Scholar 

  14. Lai, B., Chang, L.: Adaptive Data Hiding for Images Based on Harr Discrete Wavelet Transform. In: Chang, L.-W., Lie, W.-N. (eds.) PSIVT 2006. LNCS, vol. 4319, pp. 1085–1093. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  15. Amirtharajan, R., Rayappan, J.B.B.: Covered CDMA multi-user writing on spatially divided image. In: IEEE Wireless ViTAE Conference India (2011), doi:10.1109/WIRELESSVITAE.2011.5940912

    Google Scholar 

  16. Marvel, L.M., Boncelet Jr., C.G., Retter, C.T.: Spread spectrum image steganography. IEEE Trans. Image Process. 8(8), 1075–1083 (1999)

    Article  Google Scholar 

  17. Kumar, P.P., Amirtharajan, R., Thenmozhi, K., Rayappan, J.B.B.: Steg-OFDM blend for highly secure multi-user communication. In: IEEE Wireless ViTAE Conference India (2011), doi:10.1109/WIRELESSVITAE.2011.5940918

    Google Scholar 

  18. Wang, C.M., Wu, N.I., Tsai, C.S., Hwang, M.S.: A high quality steganography method with pixel-value differencing and modulus function. J. Syst. Softw. 81, 150–158 (2008)

    Article  Google Scholar 

  19. Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recognit. Lett. 24(9-10), 1613–1626 (2003)

    Article  MATH  Google Scholar 

  20. Padmaa, M., Venkataramani, Y., Amirtharajan, R.: Stego on 2n:1 Platform for Users and Embedding. Information Technology Journal 10, 1896–1907 (2010)

    Google Scholar 

  21. Thanikaiselvan, V., Kumar, S., Neelima, N., Amirtharajan, R.: Data Battle on the Digital Field between Horse Cavalry and Interlopers. Journal of Theoretical and Applied Information Technology 29(2), 85–91 (2011)

    Google Scholar 

  22. Aura, T.: Practical Invisibility in Digital Communication. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 265–278. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Thanikaiselvan, V., Arulmozhivarman, P., Amirtharajan, R., Balaguru Rayappan, J.B. (2012). Wavelet Pave the Trio Travel for a Secret Mission – A Stego Vision. In: Krishna, P.V., Babu, M.R., Ariwa, E. (eds) Global Trends in Information Systems and Software Applications. ObCom 2011. Communications in Computer and Information Science, vol 270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29216-3_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29216-3_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29215-6

  • Online ISBN: 978-3-642-29216-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics