HIGHLY EFFICIENT IMAGE STEGANOGRAPHY USING HAAR DWT FOR HIDING MISCELLANEOUS DATA

Protecting private data exchanged over the Internet, and who can access these data has become a growing privacy and confidentiality concern. Digital image steganography helps to conceal private data within a cover image to obtain a new cover, practically indistinguishable from the original, in such a way that unauthorized individuals cannot detect the presence of the concealed data in the new cover. Capacity size of the cover image and imperceptibility are therefore considered critical requirements to assess performance of steganography algorithms. This paper presents a highly efficient steganography algorithm that is capable of hiding a large size of miscellaneous data (such as text files, binary images, colored images or a combination of these data types) in a single cover image using Haar Wavelet transform. Details of the proposed embedding and extraction algorithms for different data types are presented and discussed. The performance of the proposed steganography method is assessed in terms of the capacity of the cover image, imperceptibility and robustness. The obtained experimental results and observations demonstrated that the developed algorithms are highly efficient in terms of the capacity size of the cover image while maintaining a relatively low mean square error (MSE), high peak signal-to-noise ratio (PSNR) and a reasonable robustness against various attacks.

[1]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[2]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[3]  A.I. Hashad,et al.  A robust steganography technique using discrete cosine transform insertion , 2005, 2005 International Conference on Information and Communication Technology.

[4]  He Yi-gang A Steganographic Method Based on Wavelet Contrast and LSB , 2007 .

[5]  Majid A. Al-Taee,et al.  Biometric-Based Security System for Plaintext e-Mail Messages , 2009, 2009 Second International Conference on Developments in eSystems Engineering.

[6]  K B Raja,et al.  HIGH CAPACITY AND SECURITY STEGANOGRAPHY USING DISCRETE WAVELET TRANSFORM , 2009 .

[7]  Sushanta Biswas,et al.  A novel technique for image steganography based on Block-DCT and Huffman Encoding , 2010, ArXiv.

[8]  Fawzi M. Al-Naima,et al.  A modified high capacity image steganography technique based on wavelet transform , 2010, Int. Arab J. Inf. Technol..

[9]  Partha Pratim Sarkar,et al.  A Novel Technique for Image Steganography Based on DWT and Huffman Encoding , 2011 .

[10]  J. Shanbehzadeh,et al.  High Capacity Image Steganography usingWavelet Transform and Genetic Algorithm , 2011 .

[11]  Anas Shahrour,et al.  Biometric based audio ownership verification using discrete wavelet transform and SVD techniques , 2011, Eighth International Multi-Conference on Systems, Signals & Devices.

[12]  Hardikkumar V. Desai Steganography, Cryptography, Watermarking: A Comparative Study , 2012 .

[13]  Nilanjan Dey,et al.  A Novel Approach of Color Image Hiding using RGB Color planes and DWT , 2012, ArXiv.

[14]  M. A. Al-Taee,et al.  Audio-watermarking based ownership verification system using enhanced DWT-SVD technique , 2012, International Multi-Conference on Systems, Sygnals & Devices.

[15]  Nilanjan Dey,et al.  A Session based Multiple Image Hiding Technique using DWT and DCT , 2012, ArXiv.

[16]  Shamim Ahmed Laskar High Capacity data hiding using LSB Steganography and Encryption , 2012 .

[17]  R. Bhavani,et al.  A High Secure and robust Image Steganography using Dual wavelet and blending Model , 2013, J. Comput. Sci..

[18]  S. Jayasudha Integer Wavelet Transform Based Steganographic Method Using Opa Algorithm , 2013 .

[19]  Manju,et al.  Optimized Image Steganography using Discrete Wavelet Transform (DWT) , 2014 .

[20]  I. BADESCU,et al.  Steganography in image using discrete wavelet transformation , 2014 .

[21]  Majid A. Al-Taee,et al.  High-capacity image steganography based on Haar DWT for hiding miscellaneous data , 2015, 2015 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT).

[22]  Nilanjan Dey,et al.  High Payload Watermarking using Residue Number System , 2015 .

[23]  Basim Nasih,et al.  Application of Wavelet Transform and Its Advantages Compared To Fourier Transform , 2016 .

[24]  C. Ern Information hiding techniques for steganography and digital watermarking , 2018 .