Performance analysis of image steganography using wavelet transform for safe and secured transaction

  • Guru Vimal Kumar MuruganEmail author
  • Ragupathy Uthandipalayam Subramaniyam


Internet applications are increased and growing at efficient way. By this technological growth, data communication in the internet in secured way has got a challenging task. Transmitting information in network is a great risk. Hacking the data and use those data for their benefits is done by intruders. To control these unwanted acts, steganography is used. It ensures safety of secret message. Invisible communication is a study by Steganography and it denotes with communicating message hiding. Data embedding can make in transform and spatial domain for secret communication, military communication, multimedia (hiding, copyright protection), authentication etc. A best steganography algorithm will have maximum embedding capacity, high fidelity and the good security level. Image Steganography has the robustness and security problem in the existing work. For the defence application, social problems such as terrorists, more number of attacks (cyber) and Geometric attack are caused. To overcome such drawbacks, this research work proposes Discrete Wavelet Transform (DWT) which has more advantages than other transforms technique like DCT (Discrete Cosine Transform). This is because of quality scalability, Interest in region coding, low bit rate transmission which is quickly operating and also it is compatible to Visual System by Human that provides good perception quality. Geometric attack induces synchronization errors between the first image and also the extracted stego image throughout the detection method during which its positions are modified. Image characters are analyzed well by Wavelet Space - frequency property of localization which makes additional strong to the attack such as geometric. This property will enlarge the embedded area and improves the security. Hence DWT results in high imperceptibility and PSNR in range of 30-54 dB.


Data hiding Steganography DWT Security 



  1. 1.
    Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and fibonacci bit-plane mapping, in: International Conference on Research in Security Standardisation, Springer, pp. 151–166Google Scholar
  2. 2.
    Baby D, Thomas J, Augustine G, George E, Michael NR (2015) A novel DWT based image securing method using steganography. Procedia Computer Science 46:612–618CrossRefGoogle Scholar
  3. 3.
    BalaAnand M, Karthikeyan N, Karthik S (2018) Designing a framework for communal software: based on the assessment using relation modelling. Int J Parallel Prog.
  4. 4.
    Balasubramanian S, Selvakumar SG (2014) High payload image steganography with reduced distortion using octonary pixel pairing scheme. Multimed Tools Appl 73:2223–2245CrossRefGoogle Scholar
  5. 5.
    E Lin E Delp A (1999) Review of Data Hiding in Digital Images. Proceedings of the Image Processing, Image Quality, Image Capture Systems Conference (PICS'99), Savannah, Georgia, April 25–28Google Scholar
  6. 6.
    El_Rahman SA (2016) “A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information”, Elsevier, Computers and Electrical Engineering 0 0 0 1–20Google Scholar
  7. 7.
    M. Guru Vimal Kumar and U.S. Ragupathy (2016) “A Survey on current key issues and status in Cryptography”, IEEE International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET-2016), SSN College of EngineeringGoogle Scholar
  8. 8.
    Hemalatha S, Acharya UD, Renuka A (2015) Wavelet transform based steganography technique to hide audio signals in image. Procedia Computer Science 47:272–281CrossRefGoogle Scholar
  9. 9.
    Hussain M, Wahab AWA, Javed N, Jung KH (2016) Recursive Information Hiding Scheme Through LSB, PVD Shift, and MPE, IETE Technical Review, 1–11Google Scholar
  10. 10.
    Hussain M, Abdul Wahab AW, Javed N, Jung K-H (2016) Hybrid data hiding scheme using right-Most digit replacement and adaptive least significant bit for digital images. Symmetry 8:41MathSciNetCrossRefGoogle Scholar
  11. 11.
    Hussain M, Wahid A, Wahab A, Idna Y, Idris B, Ho ATS, Jung K-H (2018) Image steganography in spatial domain: a survey. Signal Processing: Image Communication, Elsevier 65:46–66Google Scholar
  12. 12.
    Jeevitha S, Amutha Prabha N (2019) Effective payload and improved security using HMT Contourlet transform in medical image steganography", Health and Technology 1–13Google Scholar
  13. 13.
    Johnson N, Jajodia S (1998) Exploring steganography: seeing the unseen, IEEE Computer, pp. 26–34CrossRefGoogle Scholar
  14. 14.
    Johnson NF, Katzenbeisser S (2000) A Survey of steganographic Information Hiding Techniques for Steganography and Digital Watermarking, S.Katzenbeisser and F. Petitcolas, Ed. London: Artech House, pp. 43–78Google Scholar
  15. 15.
    Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography, in: Image Processing (ICIP), 2014 IEEE International Conference on, IEEE, pp. 4206–4210Google Scholar
  16. 16.
    Malathi P (2017) Highly Improved DNA Based Steganography”, Elsevier, Procedia Computer Science 115: 651–659Google Scholar
  17. 17.
    Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimed Tools Appl 75:14867–14893CrossRefGoogle Scholar
  18. 18.
    Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2016) CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimed Tools Appl:1–30Google Scholar
  19. 19.
    Mumthas S, Lijiya A (2017) Transform domain video steganography using RSA, random DNA encryption and Huffman encoding, Elsevier. Procedia Computer Science 115:660–666CrossRefGoogle Scholar
  20. 20.
    Nair NS et al (2015) A proactive approach to reversible data hiding in encrypted images. Procedia Computer Science 46:1510–1517CrossRefGoogle Scholar
  21. 21.
    Nipanikar SI (2017) A sparse representation based image steganography using Particle Swarm Optimization and wavelet transform, Elsevier, Alexandria Engineering JournalGoogle Scholar
  22. 22.
    Shiu C-W et al (2015) Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Elsevier, Signal Processing: Image Communication 39:226–233Google Scholar
  23. 23.
    Shiu C-W, Chen Y-C, Hong W (2015) Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Process Image Commun 39 (226–233CrossRefGoogle Scholar
  24. 24.
    Sidhik S, Sudheer SK, Mahadhevan Pillai VP (2015) Performance and analysis of high capacity steganography of color images involving wavelet transform. Optik-International Journal for Light and Electron Optics 126(23):3755–3760CrossRefGoogle Scholar
  25. 25.
    Singh AK (2017) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed Tools Appl 76(6):8881–8900CrossRefGoogle Scholar
  26. 26.
    Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Elsevier, Computer Science Review 13-14:95–113CrossRefGoogle Scholar
  27. 27.
    Wakure MA, Holambe AN (2015) A Discrete Wavelet Transform: A Steganographic Method for Transmitting Images, International Journal of Computer Applications (0975–8887), Volume 129 – No.5Google Scholar
  28. 28.
    Yuan H-D (2014) Secret sharing with multi-cover adaptive steganography. Inf Sci 254:197–212MathSciNetCrossRefGoogle Scholar
  29. 29.
    Zhang Q et al (2016) Joint image splicing detection in DCT and Contourlet transform domain. Elsevier, J Vis Commun Image R 40 (449–458CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Electronic and Instrumentation EngineeringKongu Engineering CollegeErodeIndia

Personalised recommendations