Skip to main content

Singular Value Decomposition Based Image Steganography Using Integer Wavelet Transform

  • Conference paper
  • First Online:
Advances in Signal Processing and Intelligent Recognition Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 425))

Abstract

Transform domain Steganography techniques embed secret message in significant areas of cover image. These techniques are generally more robust against common image processing operations. In this paper, we propose an image Steganography method using singular value decomposition (SVD) and integer wavelet transform (IWT). SVD and IWT strengthen the performance of image Steganography and improve the perceptual quality of Stego images. Results have been taken over standard image data sets and compared with discrete cosine transform (DCT) and redundant discrete wavelet transform (RDWT) based image Steganography methods using peak signal to noise ratio (PSNR) correlation coefficients (CC) metrics. Experimental results show that the proposed SVD and IWT based method provides more robustness against image processing and geometric attacks, such as JPEG compression, low-pass filtering, median filtering, and addition of noise, scaling, rotation, and histogram equalization.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fridrich, J.: Steganography in digital media: principles, algorithms, and applications. Cambridge University Press (2010)

    Google Scholar 

  2. Atawneh, S., Almomani, A., Sumari, P.: Steganography in digital images: common approaches and tools. IETE Technical Review 30(4), 344–358 (2013)

    Article  Google Scholar 

  3. Cheddad, A., Condell, J., Curran, K., Kevitt, M.P.: Digital image Steganography: survey and analysis of current methods. Signal Processing 90(3), 727–752 (2010)

    Article  MATH  Google Scholar 

  4. Cox, J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital watermarking and Steganography. Elsevier (2008)

    Google Scholar 

  5. Katzenbeisser, S., Petitcolas, F.A.P.: Information hiding techniques for Steganography and digital watermarking. Artech House Inc., Norwood (2000)

    Google Scholar 

  6. Johnson, N.F., Jajodia, S.: Exploring Steganography: seeing the unseen. IEEE Computer 31(2), 26–34 (1998)

    Article  Google Scholar 

  7. Westfield, A., Pfitzmann, A.: Attacks on steganographic systems. In: Lecture Notes in Computer Science, vol. 1768, pp. 61−75. Springer (2000)

    Google Scholar 

  8. Singh, S., Siddiqui, T.J.: A security enhanced robust steganography algorithm for data hiding. International Journal of Computer Science Issues 9(3), 131–139 (2012)

    Google Scholar 

  9. Singh, S., Siddiqui, T.J.: Robust image data hiding technique for copyright protection. International Journal of Information Security and Privacy 7(2), 44–56 (2013)

    Article  Google Scholar 

  10. Singh, S., Siddiqui, T.J.: Transform domain techniques for image steganography. Information Security in Diverse Computing Environments, 245−259. IGI global (2014)

    Google Scholar 

  11. Devaney, R.: An Introduction to chaotic dynamical systems, 2nd edn. Adddison-Wiesley (1989)

    Google Scholar 

  12. Sun, X.H., Dai, Y.W., Wang, Z.Q.: The generation of chaotic sequence and its application to image encryption. Journal of Nanjing Normal University (Engineering and Technology) 4(1), 56–78 (2004)

    Google Scholar 

  13. Jessa, M.: The period of sequences generated by tent- like maps. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications 49(1), 84–88 (2002)

    Article  MathSciNet  Google Scholar 

  14. Kakarala, R., Ogunbona, P.O.: Signal analysis using a multiresolution form of the singular value decomposition. IEEE Transactions on Image Processing 10(5), 724–735 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  15. Liu, R., Tan, T.: An SVD-based watermarking scheme for protecting rightful ownership. IEEE Transactions on Multimedia 4(1), 121–128 (2002)

    Article  Google Scholar 

  16. Chang, C.C., Tsai, P., Lin, C.C.: SVD-based digital image watermarking scheme. Pattern Recognition Letters 26(10), 1577–1586 (2005)

    Article  Google Scholar 

  17. Wang, M.S., Chen, W.C.: A hybrid DWT-SVD copyright scheme based on K-mean clustering and visual cryptography. Computer Standard and Interfaces 31(4), 750–762 (2009)

    Google Scholar 

  18. Calderbank, A.R., Daubechies, I., Sweldens, W., Yeo, B.L.: Wavelet transforms that map integers to integers. Applied Computation Harmonic Analysis 5(3), 332–369 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  19. Arsalan, M., Malik, S.A., Khan, A.: Intelligent reversible watermarking in integer wavelet domain for medical images. Journal of System and Software 85(4), 883–894 (2012)

    Article  Google Scholar 

  20. Sweldens, W.: The lifting scheme: a construction of second generation wavelets. SIAM Journal Mathematical Analysis 29(2), 511–546 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  21. Adams, M.D., Kossentini, F.: Reversible integer-to-integer wavelet transforms for image compression: performance evaluation and analysis. IEEE Transactions on Image Processing 9(6), 1010–1024 (2000)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Siddharth Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Singh, S., Singh, R., Siddiqui, T.J. (2016). Singular Value Decomposition Based Image Steganography Using Integer Wavelet Transform. In: Thampi, S., Bandyopadhyay, S., Krishnan, S., Li, KC., Mosin, S., Ma, M. (eds) Advances in Signal Processing and Intelligent Recognition Systems. Advances in Intelligent Systems and Computing, vol 425. Springer, Cham. https://doi.org/10.1007/978-3-319-28658-7_50

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-28658-7_50

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-28656-3

  • Online ISBN: 978-3-319-28658-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics