Image steganography using redundant discrete wavelet transform and QR factorization

Transform domain image steganography using RDWT and QR decomposition is demonstrated.Cover selection measure based on statistical texture properties is proposed. It helps to minimize detectability and improves security.QR decomposition has lower computational complexity and avoids false positive issue in SVD based methods.The redundancy in shift invariant RDWT helps to maximize embedding capacity and is robust to additive noise. The paper demonstrates image steganography using redundant discrete wavelet transform (RDWT) and QR factorization. RDWT helps to overcome artefacts due to variation in energy distribution caused by shifts in input signal. Also, when compared with SVD, QR factorization provides less computational complexity and avoids false positive issue; a major flaw in singular value decomposition (SVD) based data hiding methods. In addition, this study also proposes cover selection measure based on statistical texture analysis. Cover selection helps to enhance security of steganographic technique. Suitable cover is decomposed by RDWT and the scrambled secret image is embedded in QR factorised sub-band. Several experiments and comparative studies are performed to show efficacy of proposed method in terms of imperceptibility, capacity and robustness to various signal processing attacks. It is also examined with wavelet based and contourlet based steganalyzer. The average detection accuracy is found to be 52% and 56% respectively indicating poor ability of steganalyzer to identify stego images.

[1]  Amir-Masoud Eftekhari-Moghadam,et al.  An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method , 2015, Appl. Soft Comput..

[2]  Siwei Lyu,et al.  Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.

[3]  S. K. Sudheer,et al.  Performance and analysis of high capacity Steganography of color images involving Wavelet Transform , 2015 .

[4]  Bee Ee Khoo,et al.  A new robust lossless data hiding scheme and its application to color medical images , 2015, Digit. Signal Process..

[5]  Hedieh Sajedi,et al.  Using contourlet transform and cover selection for secure steganography , 2010, International Journal of Information Security.

[6]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[7]  Moyan Xiao,et al.  High capacity image steganography method based on framelet and compressive sensing , 2015, International Symposium on Multispectral Image Processing and Pattern Recognition.

[8]  Andrew P. Bradley Shift-invariance in the Discrete Wavelet Transform , 2003, DICTA.

[9]  Lingling Wu,et al.  Arnold Transformation Algorithm and Anti-Arnold Transformation Algorithm , 2009, 2009 First International Conference on Information Science and Engineering.

[10]  Robert M. Haralick,et al.  Textural Features for Image Classification , 1973, IEEE Trans. Syst. Man Cybern..

[11]  Bin Li,et al.  A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..

[12]  Jing-Ming Guo,et al.  Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition , 2014 .

[13]  Nasir D. Memon,et al.  Cover Selection for Steganographic Embedding , 2006, 2006 International Conference on Image Processing.

[14]  Mohamed-Jalal Fadili,et al.  The Undecimated Wavelet Decomposition and its Reconstruction , 2007, IEEE Transactions on Image Processing.

[15]  Mansi S. Subhedar,et al.  High Capacity Image Steganography based on Discrete Wavelet Transform and Singular Value Decomposition , 2014, ICTCS '14.

[16]  Gang Wang,et al.  Color image blind watermarking scheme based on QR decomposition , 2014, Signal Process..

[17]  Hamidreza Rashidy Kanan,et al.  A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm , 2014, Expert Syst. Appl..

[18]  Yongsheng Zhao,et al.  A blind double color image watermarking algorithm based on QR decomposition , 2013, Multimedia Tools and Applications.

[19]  Vijay H. Mankar,et al.  Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..

[20]  Hedieh Sajedi,et al.  CBS: Contourlet-Based Steganalysis Method , 2010, J. Signal Process. Syst..

[21]  Chang-Jun Ahn,et al.  Parallel detection algorithm using multiple QR decompositions with permuted channel matrix for SDM/OFDM , 2008, 2008 3rd International Symposium on Wireless Pervasive Computing.

[22]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[23]  J. E. Fowler,et al.  The redundant discrete wavelet transform and additive noise , 2005, IEEE Signal Processing Letters.