Image Steganography Based on Mantissa Replacement using LWT

Steganography is an art and science of hiding confidential information into a cover media to ensure the security of information over the communication channel. The concept of replacing mantissa part of cover image by the generated mantissa part of payload is proposed for higher capacity and security. The Lifting wavelet Transform (LWT) is applied on both cover image and payload of sizes a *a and 3a * 2a respectively. The mantissa values of Vertical band (CV), Horizontal band (CH) and Diagonal band (CD) of cover image are removed to convert into real values. The approximation band of payload is considered and the odd column element values and even column element values are divided by 300 and 30000 respectively to generate only mantissa part of payload. The modified odd and even column vector pairs are added element by element to form one resultant vector. The column vector elements of cover image and resultant column vector elements of payload are added to generate stego object, column vector elements corresponding to vertical, horizontal and diagonal elements. The inverse LWT is applied to generate stego image. Index Terms Steganography, LWT, Stego image,

[1]  Wei Lu,et al.  Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture , 2015, IEEE Transactions on Information Forensics and Security.

[2]  Hung T. Nguyen,et al.  An efficient steganography method for hiding patient confidential information , 2014, 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[3]  R. Bhavani,et al.  Dual Wavelet Transform in Color Image Steganography Method , 2014, 2014 International Conference on Electronics and Communication Systems (ICECS).

[4]  Juan M. Gutierrez-Cardenas,et al.  Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators , 2014, 2014 IEEE 38th International Computer Software and Applications Conference Workshops.

[5]  Sunny Dagar,et al.  Highly randomized image steganography using secret keys , 2014, International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014).

[6]  Yun Q. Shi,et al.  Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[7]  Md Sazzad Hossain,et al.  Improving the non-filtering steganographic algorithm using LSB verification method , 2014, 2014 International Conference on Electrical Engineering and Information & Communication Technology.

[8]  Nadeem Akhtar,et al.  An Improved Module Based Substitution Steganography Method , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.

[9]  Poonam,et al.  An enhanced Least Significant Bit steganography method using midpoint circle approach , 2014, 2014 International Conference on Communication and Signal Processing.

[10]  Wei Wang,et al.  HPS: Histogram preserving steganography in spatial domain , 2014, 2nd International Workshop on Biometrics and Forensics.

[11]  Monika Mathur,et al.  Chaotic map based steganography of gray scale images in wavelet domain , 2014, 2014 International Conference on Signal Processing and Integrated Networks (SPIN).

[12]  A. Raj,et al.  Comparison of LSB based and HS based reversible data hiding techniques , 2014, 2014 2nd International Conference on Devices, Circuits and Systems (ICDCS).

[13]  R. Pal,et al.  Image steganography using single digit sum with varying base , 2014, 2014 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT).

[14]  Vipin Kumar,et al.  Key Dependent Image Steganography Using Edge Detection , 2014, 2014 Fourth International Conference on Advanced Computing & Communication Technologies.

[15]  Sumedha Sirsikar,et al.  Analysis of Data Hiding Using Digital Image Signal Processing , 2014, 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies.

[16]  Z. Azimifar,et al.  Image steganography based on pixel ranking and Particle Swarm Optimization , 2012, The 16th CSI International Symposium on Artificial Intelligence and Signal Processing (AISP 2012).

[17]  Mugurel Ionut Andreica,et al.  SCONeP: Steganography and Cryptography approach for UDP and ICMP , 2011, 2011 RoEduNet International Conference 10th Edition: Networking in Education and Research.

[18]  El Mamoun Souidi,et al.  A novel steganographic method for gray-level images with four-pixel differencing and LSB substitution , 2011, 2011 International Conference on Multimedia Computing and Systems.

[19]  Paul Cotae,et al.  On the baseband communication performance of physical layer steganography , 2011, 2011 45th Annual Conference on Information Sciences and Systems.

[20]  Madhumita Sengupta,et al.  Steganographic Technique Based on Minimum Deviation of Fidelity (STMDF) , 2011, 2011 Second International Conference on Emerging Applications of Information Technology.

[21]  Weiming Zhang,et al.  Generalization and Analysis of the Paper Folding Method for Steganography , 2010, IEEE Transactions on Information Forensics and Security.

[22]  Shang-Kuan Chen,et al.  High-Payload Image Hiding Scheme Using k-Way Block Matching , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[23]  Richard E. Newman,et al.  J3: High payload histogram neutral JPEG steganography , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.

[24]  Paresh Marwaha,et al.  Visual cryptographic steganography in images , 2010, 2010 Second International conference on Computing, Communication and Networking Technologies.

[25]  Tao Zhang,et al.  Improved LSB matching steganography resisting histogram attacks , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[26]  George Ghinea,et al.  Stego image quality and the reliability of PSNR , 2010, 2010 2nd International Conference on Image Processing Theory, Tools and Applications.

[27]  Zhaohui Li,et al.  Statistical analysis against improved BPCS steganography , 2010, 2010 2nd International Conference on Advanced Computer Control.

[28]  Chao Wang,et al.  A content-adaptive approach for reducing embedding impact in steganography , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[29]  Shu-Fen Tu,et al.  Finding Optimal LSB Substitution Using Ant Colony Optimization Algorithm , 2010, 2010 Second International Conference on Communication Software and Networks.

[30]  Ling-di Ping,et al.  A New Steganography Algorithm Based on Spatial Domain , 2009, 2009 Second International Symposium on Information Science and Engineering.

[31]  Moazzam Hossain,et al.  Variable rate Steganography in gray scale digital images using neighborhood pixel information , 2009, 2009 12th International Conference on Computers and Information Technology.

[32]  Ruisong Ye A Novel Digital Image Hiding Scheme Based on Matrix Decomposition , 2009, 2009 International Forum on Information Technology and Applications.

[33]  Kaliappan Gopalan,et al.  A unified audio and image steganography by spectrum modification , 2009, 2009 IEEE International Conference on Industrial Technology.

[34]  Tom E. Bishop,et al.  Blind Image Restoration Using a Block-Stationary Signal Model , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[35]  Hideki Noda,et al.  High capacity and secure digital steganography to palette-based images , 2002, Proceedings. International Conference on Image Processing.

[36]  Wim Sweldens,et al.  The lifting scheme: a construction of second generation wavelets , 1998 .

[37]  Juan M. Gutiérrez Cárdenas Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators , 2014, COMPSAC Workshops.