scispace - formally typeset
Search or ask a question

A 2-Level DWT Based Approach for the Implementation of

TL;DR: This system proposes an image Steganography based approach that can confirm the reliability of the data that is being transmitted to receiver and presents a novel procedure designed for DWT based Image steganography, where cover image is transformed from spatial domain to frequency domain.
Abstract: Steganography is a way of data hiding within images for protected transmission. In recent years, Steganography is important area of research that involves a number of applications. It is an ability of concealing data in a cover image file without causing statistically important any variations to the cover image. In this image steganography, data as secret in the form of image file is concealed within another image as cover with transformations such as integer wavelet transformation, discrete cosine transform, z transformation, Discrete Wavelet Transform etc. This area of research is important more than ever when reliable and secure information exchange is essential. Secret messages are concealed within the high frequency coefficients obtained from Discrete Wavelet Transform. This system proposes an image Steganography based approach that can confirm the reliability of the data that is being transmitted to receiver. This system presents a novel procedure designed for DWT based Image steganography, where cover image is transformed from spatial domain to frequency domain. In the transform domain approaches, secret messages are implanted in the high frequency coefficients and low frequency sub-band coefficients are preserved unchanged for improving the image quality. This system Implement and compare 2-level DWT (Discrete Wavelet Transform) approach and DCT (Discrete Cosine Transform) approach For the Implementation of Image Steganography.
Citations
More filters
Journal ArticleDOI
TL;DR: A general look at the applications of wavelets in solving problems in science and engineering and particularly in spectrum sensing for CR is taken and wavelet techniques in Spectrum sensing was variously compared with existing wavelet sensing techniques; other spectrum sensing techniques%; and existing wideband sensing techniques.

26 citations

References
More filters
Proceedings Article
01 Jan 2005
TL;DR: This paper intends to give an overview of image steganography, its uses and techniques, and attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which Steganographic techniques are more suitable for which applications.
Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.

538 citations

Journal ArticleDOI
TL;DR: A new steganography technique which embeds the secret messages in frequency domain and keeps the messages away from stealing, destroying from unintended users on the inter- net and hence provide satisfactory security.
Abstract: In this paper we propose a new steganography technique which embeds the secret messages in frequency domain. According to different users' demands on the embedding capa c- ity and image quality, the proposed algorithm is divided into two modes and 5 cases. Unlike the space domain approaches, secret messages are embedded in the high frequency coefficients re- sulted from Discrete Wavelet Transform. Coefficients in the low frequency sub-band are pre- served unaltered to improve the image quality. Some basic mathematical operations are per- formed on the secret messages before embedding. These operations and a well-designed map- ping Table keep the messages away from stealing, destroying from unintended users on the inter- net and hence provide satisfactory security.

253 citations

Journal ArticleDOI
TL;DR: A class of new distortion functions known as uniform embedding distortion function (UED) is presented for both side-informed and non side- informed secure JPEG steganography, which tries to spread the embedding modification uniformly to quantized discrete cosine transform (DCT) coefficients of all possible magnitudes.
Abstract: Steganography is the science and art of covert communication, which aims to hide the secret messages into a cover medium while achieving the least possible statistical detectability. To this end, the framework of minimal distortion embedding is widely adopted in the development of the steganographic system, in which a well designed distortion function is of vital importance. In this paper, a class of new distortion functions known as uniform embedding distortion function (UED) is presented for both side-informed and non side-informed secure JPEG steganography. By incorporating the syndrome trellis coding, the best codeword with minimal distortion for a given message is determined with UED, which, instead of random modification, tries to spread the embedding modification uniformly to quantized discrete cosine transform (DCT) coefficients of all possible magnitudes. In this way, less statistical detectability is achieved, owing to the reduction of the average changes of the first- and second-order statistics for DCT coefficients as a whole. The effectiveness of the proposed scheme is verified with evidence obtained from exhaustive experiments using popular steganalyzers with various feature sets on the BOSSbase database. Compared with prior arts, the proposed scheme gains favorable performance in terms of secure embedding capacity against steganalysis.

245 citations

Journal ArticleDOI
TL;DR: Viewing postprocessing as an inverse problem, this work proposes to solve it by the maximum a posteriori criterion and shows that the proposed method achieves higher PSNR gain than other methods and the processed images possess good visual quality.
Abstract: Transform coding using the discrete cosine transform (DCT) has been widely used in image and video coding standards, but at low bit rates, the coded images suffer from severe visual distortions which prevent further bit reduction. Postprocessing can reduce these distortions and alleviate the conflict between bit rate reduction and quality preservation. Viewing postprocessing as an inverse problem, we propose to solve it by the maximum a posteriori criterion. The distortion caused by coding is modeled as additive, spatially correlated Gaussian noise, while the original image is modeled as a high order Markov random field based on the fields of experts framework. Experimental results show that the proposed method, in most cases, achieves higher PSNR gain than other methods and the processed images possess good visual quality. In addition, we examine the noise model used and its parameter setting. The noise model assumes that the DCT coefficients and their quantization errors are independent. This assumption is no longer valid when the coefficients are truncated. We explain how this problem can be rectified using the current parameter setting.

146 citations

Proceedings ArticleDOI
09 Dec 2008
TL;DR: A new algorithm for RGB image based steganography that introduces the concept of storing variable number of bits in each channel based on the actual color values of that pixel: lower color component stores higher number of bit.
Abstract: In this paper, we present a new algorithm for RGB image based steganography. Our algorithm introduces the concept of storing variable number of bits in each channel (R, G or B) of pixel based on the actual color values of that pixel: lower color component stores higher number of bits. Our algorithm offers very high capacity for cover media compared to other existing algorithms. We present experimental results showing the superiority of our algorithm. We also present comparative results with other similar algorithms in image based steganography.

117 citations