Comparison Study of Steganographic Technique using Integer Wavelet Transform Domain and Discrete Wavelet Transform Domain

Authors

Abstract

Now a days data transfer over internet is the main problem. Information security is one of the possible areas of research in present days. The data needs to be kept secure. So that it could be accessed by only authorized user. So that the data needs to be sent in a secure way which the receiver should be able to understand the message. In information hiding, cryptography and steganography are the most widely used areas that come to mind for sending sensitive and private information in a secured manner. The limitation of cryptography is that other person came to know that the probability of message being decoded by other structure of the hidden message. To overcome this limitations we use a technique is called steganography. Steganography means secret writing. It means hiding secret information in specific carrier data. The steganography plays an important role to hide data in such media which is audio, video, text, image etc. This paper implements image steganography with an objective of improve security and allocating maximum amount of data to be hidden inside. To achieve this initially cover image is transformed from spatial domain to frequency domain using 2D wavelet transformed image allowing embedding inside high frequency region which maintains image quality. In this paper we applying 2D HAAR technique in cover image for decomposition and Huffman encoding technique for embedding the secret message and use a encryption key for better security. In existing paper there are used dwt technique but there are some problem. So in this paper we use IWT for hiding secret data using some algorithm and calculate the signal to noise ratio and mean square error.

How to cite this article:
Biswal SK. Comparison Study of Steganographic Technique using Integer Wavelet Transform Domain and Discrete Wavelet Transform Domain. J Engr Desg Anal 2020; 3(2): 13-18.

References

Gupta, Heena, Mahajan P. Improvisation of security in image steganography using DWT, Huffman encoding & RC4 based LSB embedding. Computing for Sustainable Global Development (INDIACom), 3rd Internationa

Conference. IEEE 2016; 523-529.

Reddy, Chaudhary R, Ramani RA. The Process of Encoding and Decoding of Image Steganography using LSB Algorithm. International Journal of Computer Science Engineering & Technology 2012; 2(11).

Baby, Della, Thomas J. A novel DWT based image securing method using steganography. Computer Science 2015; 46: 612-618.

Cheddad, Abbas, Condell J et al. Digital image steganography: Survey and analysis of current methods. Signal 2010; 90(3): 727-752.

Houssein, Essam H, Mona AS et al. An image steganography algorithm using Haar Discrete Wavelet Transform with Advanced Encryption System. Computer Science and Information Systems 2016; 641-644.

Abuadbba, Alsharif, Khalil I. Wavelet based steganographic technique to protect household confidential information and seal the transmitted smart grid readings. Information Systems 2015; 53: 224-236.

Salman, Galih A, Kanigoro B. Application Hiding Messages in JPEG Images with the Method of Bit-Plane Complexity Segmentation on Android-Based Mobile Devices. Engineering 2012; 50: 314-324.

Sharma, Vipul, Kumar S. A new approach to hide text in images using steganography. International Journal of Advanced Research in Computer Science and Software Engineering 2013; 3(4).

Reddy V, Lokeswara, Subramanyam A et al. Implementation of LSB steganography and its evaluation for various file formats. Int J Advanced Networking and Applications 2011; 2(5): 868-872.

Sharma N, Bhatia JS, Gupta N. An encrypto-stego technique based secure data transmission system. PEC, Chandigarh. 2009.

Joseph A, Sundaram V. Cryptography and Steganography A survey. 2011.

Siper, Alan, Farley R et al. The rise of steganography. Proceedings of Student/Faculty Research Day, CSIS, Pace University, 2005.

Zaidan BB, Zaidan AA, Al-Frajat AK et al. On the differences between hiding information and cryptography techniques: An overview. Journal of Applied Sciences 2010; 10(15): 1650-1655.

Bloisi, Domenico D, Luca I. Image based steganography and cryptography. VISAPP 2007; 1: 127-134.

Kawaguchi, Eiji, Richard O. Principles and applications of BPCS steganography. Multimedia Systems and Applications 3528: 464-474.

Published

2021-04-28