Skip to main content

Highly Secure DWT Steganography Scheme for Encrypted Data Hiding

  • Conference paper
  • First Online:
Information and Communication Technology for Intelligent Systems

Abstract

Steganography is an application for concealed writing. Nowadays, development in the field of electronic media demands highly secure data transfer between computers over the globe. There is a pressing demand to send the secret information in the hidden form. Conceal writing is an ultimate feature of steganography which fulfills this demand. In general; a robust steganography scheme should have better visual imperceptibility of the hidden information with sufficient payload. In this paper, a steganography method based on cryptography is proposed. The proposed scheme uses two processes; first, encrypt the secret plaintext (PT) message followed by secret image generation from this encrypted message. Second, hide this secret image into the cover image using Daubechies discrete wavelet transform operation followed by mixing operation. After performing the Daubechies inverse discrete wavelet transform (IDWT) process, we get the stego image. Stego image visual quality is increased by using Daubechies wavelet. The effectiveness of the proposed scheme is shown by experimental results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Feng, B., Wei, L., Sun, W.: Secure binary image steganography based on minimizing the distortion on the texture. IEEE Trans. Inf. Forensics Secur. 10(2), 243–255 (2015)

    Article  Google Scholar 

  2. Sharma, V.K., Srivastava, D.K., Mathur, P.: A study of steganography based data hiding techniques. Int. J. Emerg. Res. Manag. Technol. 145–150 (2017)

    Google Scholar 

  3. Shejul, A.A., Kulkarni, U.L.: A DWT based approach for steganography using biometrics. In: IEEE International Conference on Data Storage and Data Engineering, pp. 39–43, Feb 2010

    Google Scholar 

  4. Swain, G., Lenka, S.K.: Steganography using the twelve square substitution cipher and an index variable. In: 2011 3rd IEEE International Conference on Electronics Computer Technology (ICECT), pp. 84–88 (2011)

    Google Scholar 

  5. Sharma, V.K., Srivastava, D.K.: Comprehensive data hiding technique for discrete wavelet transform-based image steganography using advance encryption standard. In: Computing and Network Sustainability, pp. 353–360. Springer (2017)

    Google Scholar 

  6. Shrestha, A., Timalsina, A.: Color image steganography technique using Daubechies discrete wavelet transform. In: 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA), pp. 9–15 (2015)

    Google Scholar 

  7. Prabakaran. G., Bhavani, R.: A modified secure digital image steganography based on discrete wavelet transform. In: International Conference on Computing, Electronics and Electrical Technologies, pp. 1096–1100, March 2012

    Google Scholar 

  8. Archana. S., Antony Judice, A., Kaliyamurthie, K.P.: A novel approach on image steganographic methods for optimum hiding capacity. Int. J. Eng. Comput. Sci. 2, 378–385 (2013)

    Google Scholar 

  9. Khalili, M., Asatryan, D.: Colour spaces effects on improved discrete wavelet transform-based digital image watermarking using Arnold transform map. IET Signal Proc. 7, 177–187 (2013)

    Article  MathSciNet  Google Scholar 

  10. Wang, R.-Z., Chen, Y.-S.: High payload image steganography using two-way block matching. IEEE Signal Process. Lett. 13(3), 161–164 (2006)

    Article  Google Scholar 

  11. Sehgal, P., Sharma, V.K.: Eliminating cover image requirement in discrete wavelet transform based digital image steganography. Int. J. Comput. Appl. 68(3), 37–42 (2013)

    Google Scholar 

  12. Moreno, J., Jaime, B., Saucedo, S.: Towards no-reference of peak signal to noise ratio. Int. J. Adv. Comput. Sci. Appl. 4(1), 123–130 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vijay Kumar Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, V.K., Mathur, P., Srivastava, D.K. (2019). Highly Secure DWT Steganography Scheme for Encrypted Data Hiding. In: Satapathy, S., Joshi, A. (eds) Information and Communication Technology for Intelligent Systems . Smart Innovation, Systems and Technologies, vol 106. Springer, Singapore. https://doi.org/10.1007/978-981-13-1742-2_66

Download citation

Publish with us

Policies and ethics