scispace - formally typeset
Search or ask a question
Author

A. Renuka

Other affiliations: Manipal Institute of Technology
Bio: A. Renuka is an academic researcher from Manipal University. The author has contributed to research in topics: Steganography & Steganography tools. The author has an hindex of 9, co-authored 26 publications receiving 293 citations. Previous affiliations of A. Renuka include Manipal Institute of Technology.

Papers
More filters
Journal ArticleDOI
TL;DR: An image steganography technique is proposed to hide audio signal in image in the transform domain using wavelet transform and it is found that the technique is robust and it can withstand the attacks.

49 citations

Journal ArticleDOI
TL;DR: In this paper, a novel image steganography technique to hide multiple secret images and keys in color cover image using Integer W avelet Transform (IWT) was proposed.
Abstract: Steganography is the science of “invisible” communication. The purpose of Steganography is to maintain secret communication between two parties. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide multiple secret images and keys in color cover image using Integer W avelet Transform (IWT). There is no visual difference between the stego image and the cover image. The extracted secret images are also similar to the original secret images. Very good PSNR (Peak Signal to Noise Ratio) values are obtained for both stego and extracted secret images. The results are compared with the results of other techniques, where single image is hidden and it is found that the proposed technique is simple and gives better PSNR values than others

48 citations

Journal ArticleDOI
TL;DR: In this article, a novel image steganography technique was proposed to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and IWT.
Abstract: Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover image. The extracted image is also similar to the secret image. This is proved by the high PSNR (Peak Signal to Noise Ratio), value for both stego and extracted secret image. The results are compared with the results of similar techniques and it is found that the proposed technique is simple and gives better PSNR values than others.

35 citations

Journal ArticleDOI
TL;DR: An Image matching technique based on Cumulative Distribution Function, which provides a considerable reduction in the retrieval time and the two novel approaches called bit plane histogram and hierarchical bit plane Histogram are discussed.
Abstract: We propose an Image matching technique based on Cumulative Distribution Function, which provides a considerable reduction in the retrieval time. The two novel approaches called bit plane histogram and hierarchical bit plane histogram are discussed. Next, the image matching technique based on Cumulative Distribution Function is explained and a comparison of the various techniques is brought out. The CDF of the query and the images in the database are approximated by piecewise linear models with two parameters, slope and intercept at various grayscale intervals. The contiguous set of lines approximating the CDFs enables us to compare the query image and the images in the database with corresponding estimated slopes and intercepts. As the dynamic range of CDF is from 0 to 1, images of different sizes can be compared. Approximation of CDFs with lines further reduces the dimension of the image features and thus improves the speed of matching.

34 citations

Posted Content
TL;DR: In this article, the authors compared color image steganography in RGB and YCbCr domain and showed that hiding secret information in this format is not secure since RGB is the common method of representation.
Abstract: Steganography is one of the methods used for secret communication. Steganography attempts to hide the existence of the information. The object used to hide the secret information is called as cover object. Images are the most popular cover objects used for steganography. Different techniques have to be used for color image steganography and grey scale image steganography since they are stored in different ways. Color image are normally stored with 24 bit depth and grey scale images are stored with 8 bit depth. Color images can hold large amount of secret information since they have three color components. Different color spaces namely RGB (Red Green Blue), HSV (Hue, Saturation, Value), YUV, YIQ, YCbCr (Luminance, Chrominance) etc. are used to represent color images. Color image steganography can be done in any color space domain. In this paper color image steganography in RGB and YCbCr domain are compared. The secret information considered is grey scale image. Since RGB is the common method of representation, hiding secret information in this format is not secure.

18 citations


Cited by
More filters
01 Jul 1987

277 citations

Journal ArticleDOI
TL;DR: The results after being investigated show a significant improvement in terms of their evaluation measures as compared to LBP, LTP, local tetra patterns (LTrP) and LDP with and without Gabor transform.

168 citations

Journal ArticleDOI
TL;DR: Results are showing that the proposed algorithm is secure against the powerful universal steganalyzer “ensemble classifier” and the histogram attack, and robust against different image processing attacks such as compression, added noise, and cropping attacks.
Abstract: This paper presents a new efficient embedding algorithm in the wavelet domain of digital images based on the diamond encoding (DE) scheme. Current discrete wavelet transform (DWT) steganography adds an unacceptable distortion to the images and is considered as an ineffective in terms of security. Applying the DE scheme to the current DWT steganographic methods solves the problems of these methods, and reduces the distortion added to the images, and thus improves the embedding efficiency. The proposed algorithm first converts the secret image into a sequence of base-5 digits. After that, the cover image is transformed into the DWT domain and segmented into 2 × 1 coefficient pairs. The DE scheme is used then to change at most one coefficient of each coefficient pair to embed the base-5 digits. Experimental results depict that the proposed algorithm is more efficient in embedding compared to other methods in terms of embedding payload and image quality. Moreover, the proposed algorithm is attacked by well-known steganalysis software. Results are showing that the proposed algorithm is secure against the powerful universal steganalyzer “ensemble classifier” and the histogram attack. The results also reveal that the proposed algorithm is robust against different image processing attacks such as compression, added noise, and cropping attacks.

119 citations

Journal ArticleDOI
TL;DR: A new algorithm for medical image retrieval which shows a significant improvement in terms of their evaluation measures as compared to LBP and LBP with Gabor transform is presented.
Abstract: A new algorithm for medical image retrieval is presented in the paper. An 8-bit grayscale image is divided into eight binary bit-planes, and then binary wavelet transform (BWT) which is similar to the lifting scheme in real wavelet transform (RWT) is performed on each bitplane to extract the multi-resolution binary images. The local binary pattern (LBP) features are extracted from the resultant BWT sub-bands. Three experiments have been carried out for proving the effectiveness of the proposed algorithm. Out of which two are meant for medical image retrieval and one for face retrieval. It is further mentioned that the database considered for three experiments are OASIS magnetic resonance imaging (MRI) database, NEMA computer tomography (CT) database and PolyU-NIRFD face database. The results after investigation shows a significant improvement in terms of their evaluation measures as compared to LBP and LBP with Gabor transform.

112 citations

Journal ArticleDOI
TL;DR: This paper is an attempt to analyse the various techniques used in steganography and to identify areas in which this technique can be applied, so that the human race can be benefited at large.
Abstract: The art of information hiding has received much attention in the recent years as security of information has become a big concern in this internet era. As sharing of sensitive information via a common communication channel has become inevitable, Steganography – the art and science of hiding information has gained much attention. We are also surrounded by a world of secret communication, where people of all types are transmitting information as innocent as an encrypted credit card number to an online-store and as insidious as a terrorist plot to hijackers. Steganography derives from the Greek word steganos, meaning covered or secret, and graphy (writing or drawing) [1]. Steganography is a technology where modern data compression, information theory, spread spectrum, and cryptography technologies are brought together to satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various techniques used in steganography and to identify areas in which this technique can be applied, so that the human race can be benefited at large.

102 citations