A Secure Image Steganography Technique to Hide Multiple Secret Images

  • S. Hemalatha
  • U. Dinesh Acharya
  • A. Renuka
  • Priya R. Kamath
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 131)

Abstract

Steganography is the science of “invisible” communication. The purpose of Steganography is to maintain secret communication between two parties. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide multiple secret images and keys in color cover image using Discrete Wavelet Transform (DWT). There is no visual difference between the stego image and the cover image. The extracted secret images are also similar to the original secret images. Very good PSNR (Peak Signal to Noise Ratio) values are obtained for both stego and extracted secret images. The results are compared with the results of other techniques, where single image is hidden and it is found that the proposed technique is simple and gives better PSNR values than others.

Keywords

Steganography DWT MSE PSNR RGB Luminance  Chrominance  

References

  1. 1.
    Chen RJ, Peng YC, Lin JJ, Lai JL, Horng SJ (2010) Novel multi-bit bitwise adaptive embedding algorithms with minimum error for data hiding. In: Proceedings of 4th international conference on network and system security (NSS 2010), IEEE Conference Publications, Melbourne, Australia, 1–3 Sept 2010, pp 306–311Google Scholar
  2. 2.
    Ghoshal N, Mandal JK (2011) A steganographic scheme for colour image authentication (SSCIA). In: Proceedings of international conference on recent trends in information technology (ICRTIT 2011), IEEE Conference Publications, Madras Institute of Technology, Chennai, India, 03–05 June 2011, pp 826–831Google Scholar
  3. 3.
    Kamath PR, Hemalatha S, Dinesh Acharya U, Renuka A (2012) High quality technique for image steganography using discrete wavelet transform. In: Proceedings of national conference on advances in computer science and information security (ACSIS’12), Manipal Institute of Technology, Manipal, India, 6–7 Jan 2012, pp 89–92Google Scholar
  4. 4.
    KapreBhagyashri S, Joshi MY (2011) All frequency band DWT-SVD robust watermarking technique for color images in YUV color space. In: Proceedings of IEEE international conference on computer science and automation engineering (CSAE), IEEE Conference Publications, 10–12 June 2011, pp 295–299Google Scholar
  5. 5.
    Katzenbeisser S, Petitcolas FAP (2000) Information hiding techniques for steganography and digital watermarking. Artech House, Inc., BostonGoogle Scholar
  6. 6.
    Mandal JK, Sengupta M (2010) Authentication/secret message transformation through wavelet transform based subband image coding (WTSIC). In: Proceedings of international symposium on electronic system design (ISED), IEEE Conference Publications, Bhubaneswar, India, 20–22 Dec 2010, pp 225–229Google Scholar
  7. 7.
    Mandal JK, Sengupta M (2011) Steganographic technique based on minimum deviation of fidelity (STMDF). In: Proceedings of second international conference on emerging applications of information technology (EAIT 2011), IEEE Conference Publications, 19–20 Feb 2011, pp 298–301Google Scholar
  8. 8.
    Masud Karim SM, Rahman MS, Hossain MI (2011) A new approach for LSB based image steganography using secret key. In: Proceedings of 14th international conference on computer and information technology (ICCIT 201I), IEEE Conference Publications, Dhaka, Bangladesh 22–24 Dec 2011, pp 286–291Google Scholar
  9. 9.
    Roy S, Parekh R (2011) A secure keyless image steganography approach for lossless RGB images. In: Proceedings of the international conference on communication, computing and security (ICCCS ’11), ACM Publications, pp 573–576Google Scholar
  10. 10.
    Rubab S, Younus M (2012) Improved image steganography technique for colored images using wavelet transform. Int J Comput Appl 39(14):29–32Google Scholar
  11. 11.
    Sachdeva S, Kumar A (2012) Colour image steganography based on modified quantization table. In: Proceedings of 2012 second international conference on advanced computing and communication technologies (ACCT), IEEE Conference Publications, Rohtak, Haryana, India, 7–8 Jan 2012, pp 309–313Google Scholar
  12. 12.
    Sarreshtedari S, Ghaemmaghami S (2010) High capacity image steganography in wavelet domain. In: Proceedings of 2010 7th IEEE consumer communications and networking conference (CCNC), IEEE Conference Publications, Las Vegas, Nevada, USA, 9–12 Jan 2010, pp 1–5Google Scholar
  13. 13.
    Shejul AA, Kulkarni UL (2010) A DWT based approach for steganography using biometrics. In: Proceedings of the 2010 international conference on data storage and data engineering, IEEE Conference Publications, Bangalore, India, 9–10 Feb 2010, pp 39–43Google Scholar
  14. 14.
    Xie Q, Xie J, Xiao Y (2010) A high capacity information hiding algorithm in color image. In: Proceedings of 2010 2nd international conference on E-business and information system security (EBIISS2010), IEEE Conference Publications, Wuhan, China, 22–23 May 2010, pp 1–4Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • S. Hemalatha
    • 1
  • U. Dinesh Acharya
    • 1
  • A. Renuka
    • 1
  • Priya R. Kamath
    • 1
  1. 1.Manipal Institute of TechnologyManipal UniversityManipalIndia

Personalised recommendations