An image steganography algorithm using Haar Discrete Wavelet Transform with Advanced Encryption System

The security of data over the internet is a crucial thing specially if this data is personal or confidential. The transmitted data can be intercepted during its journey from device to another. For that reason, we are willing to develop a simple method to secure data. Data encryption is one method to secure the messages but the intruders can still try to crack it, in order to overcome this, steganography has been used to hide the data into a cover media(i.e. audio, image or video). Recently steganography attracts many researchers as a hot topic. This paper proposes an advanced technique for encrypting data using Advanced Encryption System (AES) and hiding the data using Haar Discreet Wavelet Transform (HDWT). HDWT aims to decrease the complexity in image steganology while providing less image distortion and lesser detectability. One-forth of the image carrying the details of the image in a region and other three regions carrying a less details of the image then the cipher text is concealed at most two Least Significant Bits (LSB) positions in the less detailed regions of the carrier image, if the message doesn't fit in the first LSB only it will use the second LSB. This proposed algorithm covers almost all type of symbols and alphabets.

[1]  S. Hemalatha,et al.  A Secure And High Capacity Image Steganography Technique , 2013, ArXiv.

[2]  C. Ern Information hiding techniques for steganography and digital watermarking , 2018 .

[3]  Shamim Ahmed Laskar High Capacity data hiding using LSB Steganography and Encryption , 2012 .

[4]  Chiang-Lung Liu,et al.  High-performance JPEG steganography using complementary embedding strategy , 2008, Pattern Recognit..

[5]  Kiyoshi Tanaka,et al.  A DCT-based Mod4 steganographic method , 2007, Signal Process..

[6]  Chin-Chen Chang,et al.  A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..

[7]  Subariah Ibrahim,et al.  Information hiding using steganography , 2003, 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings..

[8]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[9]  Ajaz Hussain Mir,et al.  Classification of steganalysis techniques: A study , 2010, Digit. Signal Process..

[10]  Zengqiang Chen,et al.  A new image encryption algorithm based on hyper-chaos , 2008 .

[11]  Mamta Juneja,et al.  A New Approach for Information Security using an Improved Steganography Technique , 2013, J. Inf. Process. Syst..

[12]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[13]  Po-Yueh Chen,et al.  A DWT Based Approach for Image Steganography , 2006 .

[14]  Nilanjan Dey,et al.  A Session based Multiple Image Hiding Technique using DWT and DCT , 2012, ArXiv.

[15]  Suneeta Agarwal,et al.  A New Technique for Extracting Image Information beyond Visibility , 2013 .