Comparison Study of Steganographic Technique using Integer Wavelet Transform Domain and Discrete Wavelet Transform Domain
Abstract
Now a days data transfer over internet is the main problem. Information security is one of the possible areas of research in present days. The data needs to be kept secure. So that it could be accessed by only authorized user. So that the data needs to be sent in a secure way which the receiver should be able to understand the message. In information hiding, cryptography and steganography are the most widely used areas that come to mind for sending sensitive and private information in a secured manner. The limitation of cryptography is that other person came to know that the probability of message being decoded by other structure of the hidden message. To overcome this limitations we use a technique is called steganography. Steganography means secret writing. It means hiding secret information in specific carrier data. The steganography plays an important role to hide data in such media which is audio, video, text, image etc. This paper implements image steganography with an objective of improve security and allocating maximum amount of data to be hidden inside. To achieve this initially cover image is transformed from spatial domain to frequency domain using 2D wavelet transformed image allowing embedding inside high frequency region which maintains image quality. In this paper we applying 2D HAAR technique in cover image for decomposition and Huffman encoding technique for embedding the secret message and use a encryption key for better security. In existing paper there are used dwt technique but there are some problem. So in this paper we use IWT for hiding secret data using some algorithm and calculate the signal to noise ratio and mean square error.
How to cite this article:
Biswal SK. Comparison Study of Steganographic Technique using Integer Wavelet Transform Domain and Discrete Wavelet Transform Domain. J Engr Desg Anal 2020; 3(2): 13-18.
References
Gupta, Heena, Mahajan P. Improvisation of security in image steganography using DWT, Huffman encoding & RC4 based LSB embedding. Computing for Sustainable Global Development (INDIACom), 3rd Internationa
Conference. IEEE 2016; 523-529.
Reddy, Chaudhary R, Ramani RA. The Process of Encoding and Decoding of Image Steganography using LSB Algorithm. International Journal of Computer Science Engineering & Technology 2012; 2(11).
Baby, Della, Thomas J. A novel DWT based image securing method using steganography. Computer Science 2015; 46: 612-618.
Cheddad, Abbas, Condell J et al. Digital image steganography: Survey and analysis of current methods. Signal 2010; 90(3): 727-752.
Houssein, Essam H, Mona AS et al. An image steganography algorithm using Haar Discrete Wavelet Transform with Advanced Encryption System. Computer Science and Information Systems 2016; 641-644.
Abuadbba, Alsharif, Khalil I. Wavelet based steganographic technique to protect household confidential information and seal the transmitted smart grid readings. Information Systems 2015; 53: 224-236.
Salman, Galih A, Kanigoro B. Application Hiding Messages in JPEG Images with the Method of Bit-Plane Complexity Segmentation on Android-Based Mobile Devices. Engineering 2012; 50: 314-324.
Sharma, Vipul, Kumar S. A new approach to hide text in images using steganography. International Journal of Advanced Research in Computer Science and Software Engineering 2013; 3(4).
Reddy V, Lokeswara, Subramanyam A et al. Implementation of LSB steganography and its evaluation for various file formats. Int J Advanced Networking and Applications 2011; 2(5): 868-872.
Sharma N, Bhatia JS, Gupta N. An encrypto-stego technique based secure data transmission system. PEC, Chandigarh. 2009.
Joseph A, Sundaram V. Cryptography and Steganography A survey. 2011.
Siper, Alan, Farley R et al. The rise of steganography. Proceedings of Student/Faculty Research Day, CSIS, Pace University, 2005.
Zaidan BB, Zaidan AA, Al-Frajat AK et al. On the differences between hiding information and cryptography techniques: An overview. Journal of Applied Sciences 2010; 10(15): 1650-1655.
Bloisi, Domenico D, Luca I. Image based steganography and cryptography. VISAPP 2007; 1: 127-134.
Kawaguchi, Eiji, Richard O. Principles and applications of BPCS steganography. Multimedia Systems and Applications 3528: 464-474.
Published
Issue
Section
Copyright (c) 2021 Journal of Engineering Design and Analysis
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
We, the undersigned, give an undertaking to the following effect with regard to our article entitled
“_______________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________________” submitted for publication in (Journal title)________________________________________________ _______________________________________________________Vol.________, Year _________:-
1. The article mentioned above has not been published or submitted to or accepted for publication in any form, in any other journal.
2. We also vouchsafe that the authorship of this article will not be contested by anyone whose name(s) is/are not listed by us here.
3. I/We declare that I/We contributed significantly towards the research study i.e., (a) conception, design and/or analysis and interpretation of data and to (b) drafting the article or revising it critically for important intellectual content and on (c) final approval of the version to be published.
4. I/We hereby acknowledge ADRs conflict of interest policy requirement to scrupulously avoid direct and indirect conflicts of interest and, accordingly, hereby agree to promptly inform the editor or editor's designee of any business, commercial, or other proprietary support, relationships, or interests that I/We may have which relate directly or indirectly to the subject of the work.
5. I/We also agree to the authorship of the article in the following sequence:-
Authors' Names (in sequence) Signature of Authors
1. _____________________________________ _____________________________________
2. _____________________________________ _____________________________________
3. _____________________________________ _____________________________________
4. _____________________________________ _____________________________________
5. _____________________________________ _____________________________________
6. _____________________________________ _____________________________________
7. _____________________________________ _____________________________________
8. _____________________________________ _____________________________________
Important
(I). All the authors are required to sign independently in this form in the sequence given above. In case an author has left the institution/ country and whose whereabouts are not known, the senior author may sign on his/ her behalf taking the responsibility.
(ii). No addition/ deletion/ or any change in the sequence of the authorship will be permissible at a later stage, without valid reasons and permission of the Editor.
(iii). If the authorship is contested at any stage, the article will be either returned or will not be
processed for publication till the issue is solved.