A Novel Approach to Develop a Secure Image based Steganographic Model using Integer Wavelet Transform

Steganography is a process that involves hiding a message in an appropriate carrier like image or audio. It is of Greek origin and means "Covered or hidden writing". The carrier can be sent to a receiver without any one except the authenticated receiver only knows existence of the information. Steganography is an emerging area which is used for secured data transmission over any public media. Considerable amount of work has been carried out by different researchers on steganography. In this paper, a specific image based steganography technique for communicating information more securely between two locations is proposed. The author incorporated the idea of secret key for authentication at both ends in order to achieve high level of security. Before the embedding operation the cover image is segmented in different objects through normalized cut. As a further improvement of security level, the information has been permuted, encoded through integer wavelet transformation by lifting scheme and segmented in different parts and then finally each part has been embedded through modified lsb embedding method on different cuts of the cover image to form different stego objects. Finally stego image is formed by combining different stego objects and transmit to the receiver side. At the receiver side different reverse operation has been carried out to get back the original information. The proposed embedding approach works by selecting the embedding pixels using some mathematical function and then finds the 8 neighborhood of the selected pixel and map each bit of the secret message in each of the neighbor pixel in a specified manner. Before embedding a checking has been done to find out whether the selected pixel or its neighbor lies at the boundary of the image or not.

[1]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[2]  Wim Sweldens,et al.  The lifting scheme: a construction of second generation wavelets , 1998 .

[3]  Ross J. Anderson Stretching the Limits of Steganography , 1996, Information Hiding.

[4]  Jitendra Malik,et al.  Normalized cuts and image segmentation , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[5]  I. Daubechies,et al.  Wavelet Transforms That Map Integers to Integers , 1998 .

[6]  Dale K. Pace,et al.  The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1998 .

[7]  Scott Craver,et al.  On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.

[8]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[9]  Dirk Roose,et al.  Integer wavelet transforms using the lifting scheme , 1999 .

[10]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[11]  Yeuan-Kuen Lee,et al.  High capacity image steganographic model , 2000 .

[12]  Nasir D. Memon,et al.  Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[13]  S.T. Maya,et al.  Robust steganography using bit plane complexity segmentation , 2004, (ICEEE). 1st International Conference on Electrical and Electronics Engineering, 2004..

[14]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.

[15]  Kevin Curran,et al.  An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.