Skip to main content
Log in

Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper presents a new efficient embedding algorithm in the wavelet domain of digital images based on the diamond encoding (DE) scheme. Current discrete wavelet transform (DWT) steganography adds an unacceptable distortion to the images and is considered as an ineffective in terms of security. Applying the DE scheme to the current DWT steganographic methods solves the problems of these methods, and reduces the distortion added to the images, and thus improves the embedding efficiency. The proposed algorithm first converts the secret image into a sequence of base-5 digits. After that, the cover image is transformed into the DWT domain and segmented into 2 × 1 coefficient pairs. The DE scheme is used then to change at most one coefficient of each coefficient pair to embed the base-5 digits. Experimental results depict that the proposed algorithm is more efficient in embedding compared to other methods in terms of embedding payload and image quality. Moreover, the proposed algorithm is attacked by well-known steganalysis software. Results are showing that the proposed algorithm is secure against the powerful universal steganalyzer “ensemble classifier” and the histogram attack. The results also reveal that the proposed algorithm is robust against different image processing attacks such as compression, added noise, and cropping attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Al-Ani ZK et al (2010) Overview: main fundamentals for steganography. J Comput 2(3):158–165

    Google Scholar 

  2. Al-Dmour H, Al-Ani A (2016) A steganography embedding method based on edge identification and XOR coding. Exp Syst Appl 46:293–306

    Article  Google Scholar 

  3. Al-Korbi HA, Al-Ataby A, Al-Taee MA, Al-Nuaimy W (2015) High-capacity image steganography based on Haar DWT for hiding miscellaneous data. IEEE Jordan Conf Appl Electrical Eng Comput Technol (AEECT) 1:1–6

    Google Scholar 

  4. Atawneh S, Almomani A, Sumari P (2013) Steganography in digital images: common approaches and tools. IETE Tech Rev 30(4):344–358

    Article  Google Scholar 

  5. Baby D, Thomas J, Augustine G, George E, Michael NR (2015) A novel DWT based image securing method using steganography. Procedia Comput Sci 46:612–618

    Article  Google Scholar 

  6. Barve S, Nagaraj U, Gulabani R (2011) Efficient and secure biometric image stegnography using discrete wavelet transform. Int J Comput Sci Commun Netw 1(1):96–99

    Google Scholar 

  7. Chan C-K, Cheng L-M (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474

    Article  MATH  Google Scholar 

  8. Chao RM et al (2009) A novel image data hiding scheme with diamond encoding. EURASIP J Inf Secur 2009(1):1–9

    Google Scholar 

  9. Chen M et al (2006) Analysis of current steganography tools: classifications & features. International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP’06), California, USA

  10. CVG image database. Available: http://decsai.ugr.es/cvg/dbimagenes/g512.php, accessed Apr. 2014

  11. Hemalatha S et al (2013) A secure color image steganography in transform domain. Int J Cryptography Inf Secur 3(1):17–24

    Article  MathSciNet  Google Scholar 

  12. Kanso A, Own HS (2012) Steganographic algorithm based on a chaotic map. Commun Nonlinear Sci Numer Simul 17(8):3287–3302

    Article  MathSciNet  Google Scholar 

  13. Keyvanpour M, Bayat FM (2013) Blind image watermarking method based on chaotic key and dynamic coefficient quantization in the DWT domain. Math Comput Model 58(1):56–67

    Article  MATH  Google Scholar 

  14. Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensics and Secur 7(2):432–444

    Article  Google Scholar 

  15. Li B et al (2011) A survey on image steganography and steganalysis. J Inf Hiding Multimed Signal Process 2(2):142–172

    Google Scholar 

  16. Mali SN, Patil PM, Jalnekar RM (2012) Robust and secured image-adaptive data hiding. Digital Signal Process 22(2):314–323

    Article  MathSciNet  Google Scholar 

  17. Nag A et al (2011) A novel technique for image steganography based on DWT and Huffman encoding. Int J Comput Sci Secur 4(6):561–570

    MathSciNet  Google Scholar 

  18. Ndoundam R, Ekodeck SGR. PDF Steganography based on Chinese Remainder Theorem. J Information Security Appl, ISSN 2214–2126, Available online February 2016

  19. Pol K (2014) Image steganography based on DWT using Huffman LWZ encoding. Int J Eng Technical Res (IJETR) 2(3):100–103

    Google Scholar 

  20. RSP image database. Available: http://dud.inf.tu-dresden.de/~westfeld/rsp/rsp.html. Accessed Feb 2014

  21. Singh AK, Dave M, Mohan A (2014) Hybrid technique for robust and imperceptible image watermarking in DWT–DCT–SVD domain. Natl Acad Sci Lett 37(4):351–358

    Article  Google Scholar 

  22. Singh AK, Dave M, Mohan A (2015) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimedia Tools and Applications, pp. 1-21

  23. Sun S (2016) A novel edge based image steganography with 2k correction and Huffman encoding. Inf Process Lett 116(2):93–99

    Article  MATH  Google Scholar 

  24. USC-SIPI image database. Available: http://sipi.usc.edu/database/, accessed Jan. 2013

  25. Verma A et al (2013) Implementation of image steganography using 2-level DWT technique. Int J Comput Sci Bus Inf 1(1):1–14

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Samer Atawneh.

Appendix 1

Appendix 1

Table 4

Table 4 Comparison results of PSNR of the DE-DWT algorithm and other techniques. Payload = 65,536 bits

Table 5

Table 5 Comparison results of PSNR of the DE-DWT algorithm and other techniques. Payload = 131,072 bits

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Atawneh, S., Almomani, A., Al Bazar, H. et al. Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76, 18451–18472 (2017). https://doi.org/10.1007/s11042-016-3930-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3930-0

Keywords

Navigation