HIGH CAPACITY AND SECURITY STEGANOGRAPHY USING DISCRETE WAVELET TRANSFORM

The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms

[1]  Giuseppe Mastronardi,et al.  Steganography effects in various formats of images. A preliminary study , 2001, Proceedings of the International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications. IDAACS'2001 (Cat. No.01EX510).

[2]  Lisa M. Marvel,et al.  A methodology for data hiding using images , 1998, IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201).

[3]  K. R. Venugopal,et al.  Robust image adaptive steganography using integer wavelets , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).

[4]  Nabeel Tahir INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND SECURITY (IJCSS) , 2011 .

[5]  Aman Jantan,et al.  A new steganography approach for image encryption exchange by using the least significant bit insertion , 2010, ICWET.

[6]  Yuan-Yu Tsai,et al.  A novel data hiding scheme for color images using a BSP tree , 2007, J. Syst. Softw..

[7]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..

[8]  Jessica J. Fridrich,et al.  Influence of embedding strategies on security of steganographic methods in the JPEG domain , 2008, Electronic Imaging.

[10]  Tai-hoon Kim,et al.  Text Steganography: A Novel Approach , 2009 .

[11]  Sushil Jajodia,et al.  Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).

[12]  Gaëtan Le Guelvouit Trellis-coded quantization for public-key steganography , 2008, ArXiv.

[13]  Z. Qiu,et al.  A DWT-based color image steganography scheme , 2002, 6th International Conference on Signal Processing, 2002..

[14]  Ingemar J. Cox,et al.  Steganalysis for LSB Matching in Images with High-frequency Noise , 2007, 2007 IEEE 9th Workshop on Multimedia Signal Processing.

[15]  Wei Kuang Lai,et al.  StegCure: a comprehensive steganographic tool using enhanced LSB scheme , 2008 .

[16]  S. Samavi,et al.  STEGANALYSIS METHOD FOR LSB REPLACEMENT BASED ON LOCAL GRADIENT OF IMAGE HISTOGRAM , 2008 .

[17]  Jessica J. Fridrich,et al.  Higher-order statistical steganalysis of palette images , 2003, IS&T/SPIE Electronic Imaging.

[18]  Manav Rachna,et al.  High Capacity Filter Based Steganography , 2009 .

[19]  Chin-Chen Chang,et al.  LSB-Based Steganography Using Reflected Gray Code , 2008, IEICE Trans. Inf. Syst..