Skip to main content

Recent Trend of Transform Domain Image Steganography Technique for Secret Sharing

  • Conference paper
  • First Online:
Cyber Warfare, Security and Space Research (SpacSec 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1599))

Included in the following conference series:

Abstract

The security of information is one of the most important attributes to be available when the secret information passes between two parties. Many techniques like watermarking, cryptography and steganography used for this purpose. Cryptography changes the position of original information or scramble the original information, but it reveals the existence of secret information. The hiding the data behind any other object is steganography characteristic. Information hiding characteristic make the steganography more popular as compare to cryptography process. In this paper transform domain-based steganography process are discussed. The main focus in transform domain steganography is the wavelet family; paper includes detail information about different wavelet used in steganography process. The procedure is investigated and contended in the provisions of its payload limit i.e., the capacity to conceal data, how much data can be covered up, and its robustness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sharma, N., Batra, U.: A review on spatial domain technique based on image steganography. In: 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), Gurgaon, India, pp. 24–27. IEEE (2017)

    Google Scholar 

  2. Azani Mustafa, W., et al.: Image enhancement based on discrete cosine transforms (DCT) and discrete wavelet transform (DWT): a review. In: IOP Conference Series: Materials Science and Engineering, Bogor, Indonesia, pp. 1–10. IOP Publishing (2019)

    Google Scholar 

  3. Raid, A.M., Khedr, W.M., El-dosuky, M.A., Wesam, A.: JPEG image compression using discrete cosine transform - a survey. Int. J. Comput. Sci. Eng. Surv. 5(2), 39–47 (2014)

    Article  Google Scholar 

  4. Hemalatha, S., Dinesh Acharay, U., Renuka, A., Priya, R.: A secure color image steganography in transform domain. Int. J. Cryptogr. Inf. Secur. 3(1), 17–24 (2013)

    Google Scholar 

  5. Zhou, J.: Realization of discrete fourier transform and inverse discrete fourier transform on one single multimode interference coupler. IEEE Photonics Technol. Lett. 23, 302–304 (2011)

    Article  Google Scholar 

  6. Sharda, S., Budhiraja, S.: Performance analysis of image steganography based on DWT and Arnold transform. Int. J. Comput. Appl. 69, 46–50 (2013)

    Google Scholar 

  7. Kaur, S., Rani, V.: Designing an efficient image encryption-compression system using a new HAAR, SYMLET and COIFLET wavelet transform. Int. J. Comput. Appl. 129(15), 1–6 (2015)

    Google Scholar 

  8. Shaker, A.N.: Comparison between orthogonal and bi-orthogonal wavelets. J. Southwest Jiaotong Univ. 55(2), 1–10 (2020)

    Article  Google Scholar 

  9. Abidin, Z.Z., Manaf, M., Shibhgatullah, A.S.: Experimental approach on thresholding using reverse biorthogonal wavelet decomposition for eye image. In: 2013 IEEE International Conference on Signal and Image Processing Applications, Melaka, Malaysia, pp. 349–353. IEEE (2013)

    Google Scholar 

  10. Zhang, X., Deng, C., Han, Y.: The image space of meyer wavelet transform. In: Proceedings of 2013 2nd International Conference on Measurement, Information and Control, Harbin, pp. 1136–1139. IEEE (2013)

    Google Scholar 

  11. Mostafa, H., Fouad, A., Sami, G.: A hybrid curvelet transform and genetic algorithm for image steganography. Int. J. Adv. Comput. Sci. Appl. 8(8), 328–336 (2017)

    Google Scholar 

  12. Alzubi, S., Islam, N., Abbod, M.: Multiresolution analysis using wavelet, ridgelet, and curvelet transforms for medical image segmentation. Int. J. Biomed. Imaging 2011(2011), 1–18 (2011)

    Article  Google Scholar 

  13. Liu, S., Huang, X., Zhang, D., Yan, Q., Du, X., Fang, F.: Stationary tetrolet transform: an improved algorithm for tetrolet transform. J. Phys: Conf. Ser. 1069(1), 1–8 (2018)

    Google Scholar 

  14. Ceylan, M.: Performance comparison of tetrolet transform and wavelet-based transforms for medical image denoising. Int. J. Intell. Syst. Appl. Eng. 5(4), 222–231 (2017)

    Article  MathSciNet  Google Scholar 

  15. Rajeshkumar, N., Yuvaraj, D., Manikandan, G., Balakrishnan, R., Karthikeyan, B., Raajan, N.R.: Secret image communication scheme based on visual cryptography and tetrolet tiling patterns. Comput. Mater. Continua 65(2), 1283–1301 (2020)

    Article  Google Scholar 

  16. Indra, P.: Tetrolet transform based efficient breast cancer classification system. In: Second International Conference on Current Trends in Engineering and Technology - ICCTET, Coimbatore, India, pp. 579–583. IEEE (2014)

    Google Scholar 

  17. Achmamad, A., Jbari, A.: A comparative study of wavelet families for electromyography signal classification based on discrete wavelet transform. Bull. Electr. Eng. Inform. 9(4), 1420–1429 (2020)

    Article  Google Scholar 

  18. Asmara, R.A., Agustina, R.: Comparison of Discrete Cosine Transforms (DCT), Discrete Fourier Transforms (DFT), and Discrete Wavelet Transforms (DWT) in Digital Image Watermarking. Int. J. Adv. Comput. Sci. Appl. 8(2), 245–249 (2017). https://doi.org/10.14569/IJACSA.2017.080232

    Article  Google Scholar 

  19. Abhinav, D., Swatilekha, M.: Comparative analysis of Coieflet and Daubechies wavelets using global threshold for image denoising. Int. J. Adv. Eng. Technol. 6(5), 2247–2252 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jyoti Khandelwal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Khandelwal, J., Sharma, V.K., Raguru, J.K., Goyal, H. (2022). Recent Trend of Transform Domain Image Steganography Technique for Secret Sharing. In: Joshi, S., Bairwa, A.K., Nandal, A., Radenkovic, M., Avsar, C. (eds) Cyber Warfare, Security and Space Research. SpacSec 2021. Communications in Computer and Information Science, vol 1599. Springer, Cham. https://doi.org/10.1007/978-3-031-15784-4_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-15784-4_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-15783-7

  • Online ISBN: 978-3-031-15784-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics