Proceedings ArticleDOI
A DWT Based Approach for Steganography Using Biometrics
Anjali A. Shejul,Umesh Kulkarni +1 more
- pp 39-43
TLDR
By adopting an object oriented steganography mechanism, in the sense that, the authors track skin tone objects in image, they get a higher security and also satisfactory PSNR (Peak-Signal-to-Noise Ratio) is obtained.Abstract:
Steganography is the art of hiding the existence of data in another transmission medium to achieve secret communication. It does not replace cryptography but rather boosts the security using its obscurity features. Steganography method used in this paper is based on biometrics. And the biometric feature used to implement steganography is skin tone region of images [1]. Here secret data is embedded within skin region of image that will provide an excellent secure location for data hiding. For this skin tone detection is performed using HSV (Hue, Saturation and Value) color space. Additionally secret data embedding is performed using frequency domain approach - DWT (Discrete Wavelet Transform), DWT outperforms than DCT (Discrete Cosine Transform). Secret data is hidden in one of the high frequency sub-band of DWT by tracing skin pixels in that sub-band. Different steps of data hiding are applied by cropping an image interactively. Cropping results into an enhanced security than hiding data without cropping i.e. in whole image, so cropped region works as a key at decoding side. This study shows that by adopting an object oriented steganography mechanism, in the sense that, we track skin tone objects in image, we get a higher security. And also satisfactory PSNR (Peak-Signal-to-Noise Ratio) is obtained.read more
Citations
More filters
Journal ArticleDOI
An overview of steganography techniques applied to the protection of biometric data
TL;DR: An overview of steganography techniques applied in the protection of biometric data in fingerprints is presented and the strengths and weaknesses of targeted and blind steganalysis strategies for breaking steganographers techniques are discussed.
Journal ArticleDOI
Cloud image watermarking: high quality data hiding and blind decoding scheme based on block truncation coding
Yung-Yao Chen,Kuan-Yu Chi +1 more
TL;DR: This study presents a novel data hiding method based on the block truncation coding (BTC) image compression technique and proposes a block classification scheme for determining smooth blocks, complex_1 blocks, and complex_2 blocks in an image to improve the quality of images without damaging the secret data.
Journal ArticleDOI
Image Transformation Technique Using Steganography Methods Using LWT Technique
TL;DR: LiftingWavelet Transform technique is used instead of the Discrete Wavelet Transform as it overcome the above mentioned drawback and Arnold transform and rotation is replaced with circular shift method for enhancing security.
Journal ArticleDOI
Efficient image steganography using graph signal processing
TL;DR: A graph wavelet transform-based steganography using graph signal processing (GSP) is presented, which results in better visual quality stego image as well as extracted secret image and simulation results show that the proposed scheme is more robust than other existing Steganography techniques.
Journal ArticleDOI
Blind reliable invisible watermarking method in wavelet domain for face image watermark
TL;DR: It is observed that DWT based watermarking method coupled with weighted binary coding has the best performance without attacks; peak signal to noise ratio value of watermarked image is greater than 50 dB and normalized correlation coefficient value of extracted watermark is 1 at the watermark embedding strength of 1.
References
More filters
Journal ArticleDOI
Hide and seek: an introduction to steganography
Niels Provos,Peter Honeyman +1 more
TL;DR: This article discusses existing steganographic systems and presents recent research in detecting them via statistical steganalysis and discusses the practical application of detection algorithms and the mechanisms for getting around them.
Proceedings ArticleDOI
Reliable detection of LSB steganography in color and grayscale images
TL;DR: A new very accurate and reliable method that can detect LSB embedding in randomly scattered pixels in both 24-bit color images and 8-bit grayscale or color images is described.
Journal ArticleDOI
A steganographic method based upon JPEG and quantization table modification
TL;DR: A novel steganographic method based on joint photographic expert-group (JPEG) that has a larger message capacity than Jpeg-Jsteg, and the quality of the stego-images of the proposed method is acceptable.
Journal ArticleDOI
A DWT Based Approach for Image Steganography
Po-Yueh Chen,Hung-Ju Lin +1 more
TL;DR: A new steganography technique which embeds the secret messages in frequency domain and keeps the messages away from stealing, destroying from unintended users on the inter- net and hence provide satisfactory security.