9/7 IWT Domain Data Hiding in Image using Adaptive and Non Adaptive Methods

Background/Objectives: The advancement of information exchange through internet has made it easy to transfer the exact information faster to the destination. Exchange the information safely to the destination with no alterations, there are many approaches like Cryptography, Steganography and Watermarking. Methods/Statistical Analysis: Steganography is a method of hiding a secret data in other cover medium. Digital Images are popular for cover medium than other because of their frequent use on the internet. In this paper a transform domain steganography with 9/7 Integer Wavelet Transform (IWT) is proposed. A pixel adaptive embedding method using LSB (Least Significant Bit) method is employed to increase the security of the secret data embedded in the a cover medium. Graph Theory is used to select the coefficients randomly for embedding the secret messages. Findings: It is found that the proposed method provides good security and high capacity. This algorithm can be applicable for all kinds of secret communications. Finally Results are compared with 5/3 IWT. Applications/Improvements: This method can be applied for all the secret communication applications especially Defence, Telemedicine, etc. This proposed method developed further in terms of robust against various steganalysis tools.

[1]  Pachiyappan Arulmozhivarman,et al.  High security image steganography using IWT and graph theory , 2013, 2013 IEEE International Conference on Signal and Image Processing Applications.

[2]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[3]  H. H. Zayed,et al.  An adaptive steganographic technique based on integer wavelet transform , 2009, 2009 International Conference on Networking and Media Convergence.

[4]  Shen Wang,et al.  An Integer DCT and Affine Transformation Based Image Steganography Method , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[5]  Cheng-Hsing Yang,et al.  Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.

[6]  K. Thenmozhi,et al.  Pixel scattering matrix formalism for image encryption—A key scheduled substitution and diffusion approach , 2015 .

[7]  Peter Jorgensen,et al.  Applied cryptography: Protocols, algorithm, and source code in C: By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN 0-471-59756-2 , 1996 .

[8]  Wang-Heon Lee,et al.  New Watermarking Technique Using Data Matrix and Encryption Keys , 2012 .

[9]  Xingming Sun,et al.  A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution , 2009 .

[10]  Fei Peng,et al.  Adaptive reversible data hiding scheme based on integer transform , 2012, Signal Process..

[11]  I. Daubechies,et al.  Wavelet Transforms That Map Integers to Integers , 1998 .

[12]  Nor Ashidi Mat Isa,et al.  A Steganography Approach over Video Images to Improve Security , 2015 .

[13]  Rengarajan Amirtharajan,et al.  Horse Riding & Hiding in Image for Data Guarding , 2012 .

[14]  Po-Yueh Chen,et al.  A DWT Based Approach for Image Steganography , 2006 .

[15]  Cheng-Hsing Yang,et al.  A data hiding scheme using the varieties of pixel-value differencing in multimedia images , 2011, J. Syst. Softw..

[16]  Rengarajan Amirtharaj,et al.  Comparative Analysis of (5/3) and Haar IWT Based Steganography , 2014 .

[17]  Rengarajan Amirtharajan,et al.  An intelligent chaotic embedding approach to enhance stego-image quality , 2012, Inf. Sci..

[18]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[19]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[20]  Putra Sumari,et al.  Steganography in digital images: Common approaches and tools , 2013 .

[21]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..