An Adaptive Image Steganography Algorithm Using Successive Pixel Difference Embedding and Integer Wavelet Transform

  • Anirudh H. Yajurvedi
  • Sudarshanpatil Kulkarni
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 221)


In this paper an adaptive, secure and high capacity image steganography algorithm based on Integer Discrete Wavelet Transform is proposed. The algorithm is adaptive as it chooses the optimum value for threshold based on cover image and secret image through an iterative process, using least possible number of DWT coefficients. The experimental results show that the algorithm chooses the optimum value for the variable threshold for the given cover image and secret image and helps in obtaining the best PSNR for the steganography image.


Secure image steganography High embedding Capacity DWT Adaptive scheme 


  1. 1.
    Wu DC, Tsai WH (2003) A steganography method for images by pixel-value differencing. Pattern Recogn Lett 24:1613–1626MATHCrossRefGoogle Scholar
  2. 2.
    Chang KC, Chang CP, Huang PS, Tua TM (2008) A novel image steganography method using tri-way pixel-value differencing. J Multimedia 3(2):37–44Google Scholar
  3. 3.
    Jaafar S, Manaf AA, Zeki AM (2007) Steganography technique using modulus arithmetic. In: 9th international symposium on signal processing and its applications, pp 1–4Google Scholar
  4. 4.
    Katzenbeisser S, Petitcolas FAP (1999) Information hiding techniques for steganography and digital watermarking. Artech House, Norwood, pp 56–92Google Scholar
  5. 5.
    Sutaone MS, Khandare MV (2008) Image based steganography using LSB insertion. In proceedings of IET conference on wireless, mobile and multimedia networks, pp 146–151Google Scholar
  6. 6.
    Banoci V, Bugar G, Levicky D (2011) A novel method of image steganography in DWT domain. In: 21st international conference radioelektronika (RADIOELEKTRONIKA), pp 19–20Google Scholar
  7. 7.
    Calderbank AR, Daubechies I, Sweldens W, Yeo BL (1996) Wavelet transforms that map integers to integers. Appl Comput Harmonic Anal (ACHA)Google Scholar
  8. 8.
    Jinna SK, Ganesan L (2011) Reversible image data hiding using lifting wavelet transform and histogram shifting. Int J Comput Sci Inf Secur 7(3):283–289Google Scholar
  9. 9.
    Bilgin A, Sementilli PJ, Sheng F, Marcellin MW (2000) Scalable image coding using reversible integer wavelet transforms. IEEE Trans Image Process 9(11):1972–1977MathSciNetMATHCrossRefGoogle Scholar
  10. 10.
    Tolba MF, Ghonemy MA, Taha IA, Khalifa AS (2004) Using integer wavelet transforms in colour image-steganography. IJICIS 4(2):75–85Google Scholar
  11. 11.
    Nag A, Biswas S, Sarkar D, Sarkar PP (2011) A novel technique for image steganography based on DWT and Huffman encoding. Int J Comput Sci Secur 4(6):561–570Google Scholar
  12. 12.
    Reddy HSM, Raja KB (2009) High capacity and security steganography using discrete wavelet transform. Int J Comput Sci Secur 3(6):462–472Google Scholar
  13. 13.
    Kumar KBS, Raja KB, Pattnaik S (2011) Hybrid domain in LSB steganography. Int J Comput Appl 19(7):35–40Google Scholar
  14. 14.
    Masud Karim SM, Rahman MS, Hossain MI (2011) A new approach for LSB based image steganography using secret key. In: 14th international conference on computer and information technology, pp 286–291Google Scholar
  15. 15.
    Zhiweil K, Jing L, Yigang H (2007) Steganography based on wavelet transform and modulus function. J Syst Eng Electron 18(3):628–632CrossRefGoogle Scholar

Copyright information

© Springer India 2013

Authors and Affiliations

  • Anirudh H. Yajurvedi
    • 1
  • Sudarshanpatil Kulkarni
    • 1
  1. 1.Department of Electronics and Communication EngineeringSJCEMysoreIndia

Personalised recommendations