Advertisement

DWT Based Mosaic Image Steganography

  • Ashvini Sandip Patil
  • Rupali M. Patil
  • Milind M. Shinde
Conference paper

Abstract

This paper proposes a DWT based Mosaic image steganography technique. A Mosaic image is generated by splitting original and cover image into fragments; the fragments of the covert image are embedded into the target image. The color transformation is applied to secret image tiles such that it looks like target image, this leads an existence of covert image in the cover image undetected. The resulting meta- information of tile mapping sequence, color transformation, and tile transformation is compressed using Haar wavelet transform. In order to recoup the original image, the receiver needs a mosaic image, meta-information, and secret key. The key contribution is instead of embedding meta-information in the mosaic image itself, it is compressed using Haar transform and kept in meta file. This ensures that only mosaic image is not sufficient to recover secret image, but also needs meta-information.

Keywords

DWT Haar transform Mosaic Steganography 

References

  1. 1.
    Balasi And GD, Gallo G (2005) Artificial mosaic. Vis Comput 21:373–383CrossRefGoogle Scholar
  2. 2.
    Dobashi, Y, Haga T, Johan H, Nishita T (2002) A method for creating mosaic image using voronoi diagrams. In: Proceedings of eurographics, Saarbrucken, Germany, pp 341–348Google Scholar
  3. 3.
    Smith JR, Chang SF (1995) Tools and techniques for color image retrieval. Proc IS T/SPIE 2670:2–7Google Scholar
  4. 4.
    Kimand J, Pellacini F (2002) Jigsaw image mosaics. In: Proceedings of SIGGRAPH, San Antonio, TX, USA, pp 657–664Google Scholar
  5. 5.
    Battiato S, Di Blasi G, Gallo G, Guarnera GC, Puglisi G (2008) Artificial mosaic by gradient vector flow. In: Proceedings of Eurographics, Creete, Greece, pp 53–56Google Scholar
  6. 6.
    Coltuc D, Chassery JM (2007) Very fast watermarking by reversible contrast mapping. IEEE Signal Process Lett 14(4):255258CrossRefGoogle Scholar
  7. 7.
    Reinhard E, Ashikhmin M, Gooch B, Shirley P (2001) Color transfer between images. IEEE Comput Graph Appl 21(5):34–41CrossRefGoogle Scholar
  8. 8.
    Lai IJ, Tsai WH (2011) Secret-fragment-visible mosaic image a new computer art and its application to information hiding. IEEE Inform Forensics Secur 14(4):971–979Google Scholar
  9. 9.
    Thien CC, Lin JC (2003) A simple and high-hiding capacity method for hiding digit-by digit data in images based on modulus function. Pattern Recogn 36:28752881CrossRefGoogle Scholar
  10. 10.
    Gregory K (1992) Wallace the JPEG still picture compression standard. IEEE Trans Consum Electron 38(1):1–29CrossRefGoogle Scholar
  11. 11.
    Pennebaker WB, Mitchell JL (1993) JPEG: still image data compression standard. Van Nostrand Reinhold, New York, p 3438Google Scholar
  12. 12.
    Gonzalez RC, Woods RE (2002) Digital image processing, 2nd edn. Prentice Hall, Upper Saddle RiverGoogle Scholar
  13. 13.
    Devi MDA, Shivkumar KB (2014) Secured covert color image transmision using secret fragment visible mosiac image and reversible color transformation techniques.  https://doi.org/10.1109/ICEECCOT.2016.7955184CrossRefGoogle Scholar
  14. 14.
    Chavan A, Manjrekar A (2015) Emerging research in computing, information, communication and applications. Springer.  https://doi.org/10.1007/978-81-322-2553-9_41Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Ashvini Sandip Patil
    • 1
  • Rupali M. Patil
    • 1
  • Milind M. Shinde
    • 2
  1. 1.Department of Computer Science & EngineeringAnnasaheb Dange College of Engineering & TechnologyAshta SangliIndia
  2. 2.Department of Computer Science & EngineeringSVERI’s College of EngineeringPandharpurIndia

Personalised recommendations