Skip to main content
Log in

A modified DWT-based image steganography technique

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The main challenges of image steganography are imperceptibility of the cover image and no recoverability of the secret data. To deal with these challenges, a modified digital image steganography technique based on Discrete Wavelet Transform (DWT) is proposed. In proposed approach, two new concepts are being proposed to minimize the distortion in the cover image. The first one i.e. secret key computation concept is proposed to make it more robust and resistive towards steganalysis. The second one, known as blocking concept, is introduced to ensure least variation in the cover image. The proposed approach is tested over ten different cover images and two secret images. Its performance is compared with the six well-known steganography techniques. The experimental results reveal that the proposed approach performs better than the existing techniques in terms of imperceptibility, security and quality measures. The six image processing attacks are also applied on the stego-image to test the robustness of the proposed approach. The effects of compression, rotation, and application of different wavelets have also been investigated on the proposed approach. The results demonstrate the robustness of the proposed approach under different image processing attacks. Both stego-image and extracted secret images possess better visual quality.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Abdelwahab AA, Hassan LA (2008) A discrete wavelet transform based technique for image hiding. Proceedings of 25th National Radio Science Conference, Egypt, pp 1–9

    Google Scholar 

  2. Al-Ataby A, Al-Naima F (2010) A modified high capacity image steganography technique based on wavelet transform. Int Arab J Info Technol 7(4):358–364

    Google Scholar 

  3. Al-Shatanawi OM, El-Emam NN (2015) A new image steganography algorithm based on MLSB method with random pixels selection. Int J Netw Sec Appl 7:37–53

    Google Scholar 

  4. Baby D, Thomas J, Augustine G, George E, Michael NR (2015) A novel DWT based image securing method using steganography. Procedia Comput Sci 46:612–618

    Article  Google Scholar 

  5. Bas P, Filler T, Pevny T (2011) Break our steganographic system-the ins and outs of organizing BOSS. Proceeding of International Conference on Information Hiding, Prague, pp 59–70

    Google Scholar 

  6. Cachin C (2004) An information-theoretic model for steganography. Inf Comput 192(1):41–56

    Article  MathSciNet  MATH  Google Scholar 

  7. Chan CK, Chang LM (2003) Hiding data in image by simple LSB substitution. Pattern Recogn 37:469–474

    Article  Google Scholar 

  8. Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90:727–752

    Article  MATH  Google Scholar 

  9. Chen PY, Wu WE (2006) A DWT based approach for image steganography. Int J Appl Sci Eng 4(3):275–290

    MathSciNet  Google Scholar 

  10. Chen PY, Wu WE (2009) A modified side match scheme for image steganography. Int J Appl Sci Eng 7(1):53–60

    Google Scholar 

  11. Denemark T, Boroumand M, Fridrich J (2016) Steganalysis features of content-adaptive JPEG steganography. IEEE Trans Info Forens Sec 11(8):1736–1746

    Article  Google Scholar 

  12. El-Emam N, Al-Zubidy R (2013) New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm. J Syst Softw 86:1465–1481

    Article  Google Scholar 

  13. Ghazanfari, K., Ghaemmaghami, S. & Khosravi, S.R. 2011. LSB++: An improvement to LSB+ steganography. Proceedings of IEEE Region Conference TENCON, Pp. 364–368. doi:10.1109/TENCON.2011.6129126

  14. Ghebleh M, Kanso A (2014) A robust chaotic algorithm for digital image steganography. Commun Nonlinear Sci Numer Simul 19:1898–1907

    Article  Google Scholar 

  15. Guo, L., Ni, J., & Shi, Y.-Q. 2012. An efficient JPEG steganographic scheme using uniform embedding. Proceeding of 4th IEEE International Workshop on Information Forensics and Security, Spain, Pp. 169-174

  16. Hemalatha S, Acharya UD, Renuka A, Kamath PR (2013) A secure and high capacity image steganography technique. Sign Image Proc 4:83–89

    Google Scholar 

  17. Hemalatha S, Acharya UD, Renuka A (2015) Wavelet transform based steganography technique to hide audio signals in image. Procedia Comput Sci 47:272–281

    Article  Google Scholar 

  18. Holub, V., & Fridrich, J. 2012. Designing steganographic distortion using directional filters. Proceeding of IEEE International Workshop on Information Hiding and Multimedia Security, 234–239

  19. Holub V, Fridrich J (2013) Digital image steganography using universal distortion. Proceeding of ACM Workshop on Information Hiding and Multimedia Security, France, pp 59–68

    Google Scholar 

  20. Holub V, Fridrich J, Denemark T (2014) Universal distortion design for steganography in an arbitrary domain. EURASIP J Inf Secur 1:1–13

    Google Scholar 

  21. Hussan M, Wahab AWA, Ho ATS, Javed N, Jung K-H (2017) A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Process Image Commun 50:44–57

    Article  Google Scholar 

  22. Ioannidou A, Halkidis ST, Stephanides G (2012) A novel technique for image steganography based on a high payload method and edge detection. Expert Syst Appl 39:11517–11524

    Article  Google Scholar 

  23. Johnson, N.F. & Katzenbbeisser, S. 2000. A survey of steganographic techniques. Information Hiding, Artech House, 43–78

  24. Kumar V, Kumar D (2010a) Performance evaluation of dwt based image steganography. Proceedings of 2nd International Conference on Advance Computing, Patiala, pp 223–228

    Google Scholar 

  25. Kumar V, Kumar D (2010b) In: Das VV, Vijaykumar R (eds) Digital image steganography based on combination of DCT and DWT. Information and Communication Technologies, Kochi

    Chapter  Google Scholar 

  26. Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. Proceedings of International Conference on Image Processing, Paris, pp 4206–4210

    Google Scholar 

  27. Masaebi S, Moghaddam AME (2012) A new approach for image hiding based on contourlet transform. Int J Electric Comput Eng 2(5):699–708

    Google Scholar 

  28. Muhammad K, Ahmad J, Rho S, Baik SW (2017) Image steganography for authenticity of visual contents in social networks. Multi Tools Appl:1–20

  29. Mythreyi S, Vaidehi V (2007) Gabor transform based image steganography. IETE J Res 53(2):103–112

    Article  Google Scholar 

  30. Narasimmalou T, Joseph AR (2012) Optimized discrete wavelet transform based steganography. Proceedings of IEEE International Conference on Advanced Communication Control and Computing Technologies, Ramanathapuram, pp 88–91

    Google Scholar 

  31. Raftari N, Moghadam AME (2012) Digital image steganography based on assignment algorithm and combination of DCT-IWT. Proceedings of International Conference on Computational Intelligence, Communication Systems and Networks, Phuket, pp 295–300

    Google Scholar 

  32. Sedighi V, Cogranne R, Fridrich J (2016) Content adaptive steganography by minimizing statistical detectability. IEEE Trans Info Forens Sec 11(2):221–234

    Article  Google Scholar 

  33. Shuliang S (2016) Image steganography based on nonsubsampled contourlet transform and hill cipher. Telecommun Sci 32(6):124–128

    Google Scholar 

  34. Singh S, Singh R, Siddiqui TJ (2015) Singular value decomposition based image steganography using integer wavelet transform. Proceedings of International Symposium on Signal Processing and Intelligent Recognition Systems, Trivandrum, pp 593–601

    Google Scholar 

  35. Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: A survey. Comput Sci Rev 13:95–113

    Article  MATH  Google Scholar 

  36. Wang M-S, Chen W-C (2009) A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography. Comput Stand Interf 31(4):757–762

    Article  Google Scholar 

  37. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: From error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  38. Wu H-T, Dugelay J-L, Cheung Y-M (2008) A data mapping method for steganography and its application to images. Proceedings of International Workshop on Information Hiding, USA, pp 236–250

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vijay Kumar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, V., Kumar, D. A modified DWT-based image steganography technique. Multimed Tools Appl 77, 13279–13308 (2018). https://doi.org/10.1007/s11042-017-4947-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4947-8

Keywords

Navigation