Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1370))

Abstract

Image steganography involves embedding the secret information into a cover media without creating noticeable changes in it and keeping its presence hidden. In this paper, transform domain image steganography is proposed that benefits from the ridgelet transform and SVD matrix decomposition technique. The principal component obtained by singular value decomposition of ridgelet coefficients acts as an embedding location. Stego image is obtained by embedding the secret image in it. Experimental results in terms of imperceptibility and robustness are verified using standard image quality metrics. Simulation results validate superior visual quality with a large payload. Proposed approach is also robust to several image processing attacks like noise addition, geometric transformations, histogram equalisation, JPEG compression, etc.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M.S. Subhedar, V.H. Mankar, Current status and key issues in image steganography: a survey. Comput. Sci. Rev. 13–14, 95–113 (2014)

    Google Scholar 

  2. B. Li, J. He, J. Huang, Y.Q. Shi, A survey on image steganography and steganalysis. Int. J. Inf. Hid. Multimed. Sig. Process. 2(2), 142–172 (2011)

    Google Scholar 

  3. M.R. Ogiela, K. Koptyra, False and multi-secret steganography in digital images. Soft Comput. 19(11), 3331–3339 (2015)

    Google Scholar 

  4. M.H. Shirafkan, E. Akhtarkavan, J. Vahidi, A image steganography scheme based on discrete wavelet transform using lattice vector quantization and reed Solomon encoding, in 2nd International Conference on Knowledge Based Engineering and Innovation (2015)

    Google Scholar 

  5. A.K. Gulve, M.S. Joshi, An image steganography method hiding secret data into coefficients of integer wavelet transform using pixel value differencing approach, in Hindawi Mathematical Problems in Engineering (2015). Article ID 684824

    Google Scholar 

  6. T. Rabie, I. Kamel, Multimed Tools Appl. (2016). https://doi.org/10.1007/s11042-016-3301-x

  7. S. Pramanik, R.P. Singh, R. Ghosh, Application of bi-orthogonal wavelet transform and genetic algorithm in image steganography. Multimed. Tools Appl. 79, 17463–17482 (2020). https://doi.org/10.1007/s11042-020-08676-1

  8. N. Ayub, A. Selwal, An improved image steganography technique using edge based data hiding in DCT domain. J. Interdis. Math. 23(2), 357–366 (2020). https://doi.org/10.1080/09720502.2020.1731949

  9. M.S. Subhedar, V.H. Mankar, Performance evaluation of image steganography based on cover selection and Contourlet transform, in International Conference on Cloud & Ubiquitous Computing & Emerging Technologies (CUBE) (2013). https://doi.org/10.1109/CUBE.2013.39

  10. H. Sajedi, M. Jamzad, Adaptive steganography method based on Contourlet transform, in 9th International Conference on Signal Processing (2008). https://doi.org/10.1109/ICOSP.2008.4697237

  11. V. Hajduk, M. Broda, O. Kova, D. Levicky, Image steganography with using QR code and cryptography, in 26th Conference on Radio elektronika (2016)

    Google Scholar 

  12. P. Carrlle, E. Andres, Discrete analytical Ridgelet transform. Sig. Process., Elsevier 84(11), 2165–2173 (2004)

    Google Scholar 

  13. M.N. Do, M. Vetterli, The finite Ridgelet transform for image representation. IEEE Trans. Image Process. 12(1), 16–28 (2003). https://doi.org/10.1109/TIP.2002.806252

  14. J.M. Guo, H. Prasetyo, Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. AEU Int. J. Electron. Commun. 68(9), 816–834 (2014)

    Google Scholar 

  15. M.S. Subhedar, V.H. Mankar, Image steganography using redundant discrete wavelet transform and QR factorization. Comput. Electri. Eng. https://doi.org/10.1016/j.compeleceng.2016.04.017

  16. USC-SIPI (1997). http://sipi.usc.edu/database

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Subhedar, M. (2022). Image Steganography Using Ridgelet Transform and SVD. In: Thakkar, F., Saha, G., Shahnaz, C., Hu, YC. (eds) Proceedings of the International e-Conference on Intelligent Systems and Signal Processing. Advances in Intelligent Systems and Computing, vol 1370. Springer, Singapore. https://doi.org/10.1007/978-981-16-2123-9_6

Download citation

Publish with us

Policies and ethics