Secure and Authentic DCT Image Steganography through DWT - SVD Based Digital Watermarking with RSA Encryption

With the rapid advance in digital network, digital libraries, and particularly WWW (World Wide Web) services, we can retrieve many kinds of information anytime. Thus, security has become one of the most significant problems for distributing new information. It is necessary to protect this information while communicated over insecure channels. Thus a need for developing technology that will help to provide security as well as authenticity. Steganography is the idea of hiding private or sensitive data or information within something that appears to be nothing out of the normal. Steganography and cryptography are similar in the way that they both are used to protect important information. Nowadays the term "Information Hiding" relates to both watermarking and steganography. So we proposed combined strategy of cryptography, steganography and digital watermarking to hide secure image with watermark logo inside cover image. For this purpose we use DCT, DWT, SVD and RSA approach. Using DCT, encrypted watermark logo (encryption perform using RSA) is hide inside Secure image, results in Stego image. This Stego image is hiding inside cover image using DWT and SVD. Our approach can be used to transmit secure information like copyright information of company, movie with their respective image, finger-print or thumb impression of particular person. This method can be used for security purpose. Thus would be beneficial to nation for over all security.

[1]  Anil Kumar,et al.  A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique , 2013 .

[2]  Huayong Ge,et al.  Steganography and steganalysis based on digital image , 2011, 2011 4th International Congress on Image and Signal Processing.

[3]  Ioannis Pitas,et al.  Asymptotically optimal detection for additive watermarking in the DCT and DWT domains , 2003, IEEE Trans. Image Process..

[4]  P. Nadiya,et al.  Image steganography in DWT domain using double-stegging with RSA encryption , 2013, 2013 International Conference on Signal Processing , Image Processing & Pattern Recognition.

[5]  Chin-Chen Chang,et al.  Reversible data hiding scheme using two steganographic images , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.

[6]  K. Murali,et al.  Chaos based spread spectrum image steganography , 2004, IEEE Transactions on Consumer Electronics.

[7]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[8]  Monisha Sharma,et al.  Wavelet Transform based Steganography , 2013 .

[9]  Jeff Stein Spy vs. Spy , 2003 .

[10]  Jamal Ali Hussein Spatial Domain Watermarking Scheme for Colored Images Based on Log-average Luminance , 2010, ArXiv.

[11]  Fawzi M. Al-Naima,et al.  A modified high capacity image steganography technique based on wavelet transform , 2010, Int. Arab J. Inf. Technol..

[12]  Vijay Kumar,et al.  Performance evaluation of DWT based image steganography , 2010, 2010 IEEE 2nd International Advance Computing Conference (IACC).

[13]  Ahmet Turan Özcerit,et al.  A new steganography algorithm based on color histograms for data embedding into raw video streams , 2009, Comput. Secur..

[14]  P. R. Deshmukh,et al.  Hash Based Least Significant Bit Technique For Video Steganography , 2014 .

[15]  Tieniu Tan,et al.  An SVD-based watermarking scheme for protecting rightful ownership , 2002, IEEE Trans. Multim..

[16]  Ahmed H. Tewfik,et al.  A novel high-capacity data-embedding system , 2006, IEEE Transactions on Image Processing.