QR Code Steganography for Multiple Image and Text Hiding using Improved RSA-3DWT Algorithm

In this research, we presented another implanting calculation for QR Code Image Steganography and Text Hiding, which is based on 3-discrete wavelet transform (DWT) and improved RSA algorithm. Firstly, enter the text message and choose four random numbers for RSA encryption. After that, take four pictures: one is cover image and another is secret image. In the process of embedding, we divide RGB image into three planes: Red, Green and Blue. In this work, embed multiple color secret images into a single cover image for providing security. At last, encrypted text message is concealed into an embedded picture using Least significant bit (LSB). We evaluate performance on the basis of the peak signal noise ratio (PSNR) and structural similarity matrix (SSIM) with different varying weights. In this proposed, compared this algorithm to 1-DWT. In the extraction process, recover three secret image from stego image and decrypt text message.In this experiment, improved PSNR value as compared to previous paper. The experimental outcomes will be reached upto 84%. In our method, DWT is applied to decompose the cover image and produce the low and high frequency coefficients to take benefits of robustness and security goods.

[1]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.

[2]  Palak Patel,et al.  Secure and Authentic DCT Image Steganography through DWT - SVD Based Digital Watermarking with RSA Encryption , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.

[3]  Scott Craver,et al.  On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.

[4]  Raj Jaiswal,et al.  Reformed RSA Algorithm Based on Prime Number , 2014 .

[5]  Vijay Kumar,et al.  Performance evaluation of DWT based image steganography , 2010, 2010 IEEE 2nd International Advance Computing Conference (IACC).

[6]  Arvind R. Yadav,et al.  Invisible Digital Video Watermarking Using 4-level DWT , 2011 .

[7]  Ross J. Anderson Stretching the Limits of Steganography , 1996, Information Hiding.

[8]  K. Naresh,et al.  QR Verification System Using RSA Algorithm , 2014 .

[9]  Partha Pratim Sarkar,et al.  A Novel Technique for Image Steganography Based on DWT and Huffman Encoding , 2011 .

[10]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[11]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[12]  R. Bhavani,et al.  A High Secure and robust Image Steganography using Dual wavelet and blending Model , 2013, J. Comput. Sci..

[13]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[14]  Gautam Sanyal,et al.  A Robust Image Steganography using DWT Difference Modulation (DWTDM) , 2012 .