scispace - formally typeset
Open AccessJournal Article

Wavelet Based Non LSB Steganography

TLDR
Wavelet based Non LSB Steganography (WNLS) is proposed, which can’t be detected by existing steganalysis techniques such as chi-square and pair of values techniques, and observes that the PSNR values are better in the case of IWT compare to DWT for all image formats.
Abstract
Steganography is the methods of communicating secrete information hidden in the cover object. The messages hidden in a host data are digital image, video or audio files, etc, and then transmitted secretly to the destination. In this paper we propose Wavelet based Non LSB Steganography (WNLS). The cover image is segmented into 4*4 cells and DWT/IWT is applied on each cell. The 2*2 cell of HH band of DWT/IWT are considered and manipulated with payload bit pairs using identity matrix to generate stego image. The key is used to extract payload bit pairs at the destination. It is observed that the PSNR values are better in the case of IWT compare to DWT for all image formats. The algorithm can’t be detected by existing steganalysis techniques such as chi-square and pair of values techniques. The PSNR values are high in the case of raw images compared to formatted images.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A steganography embedding method based on edge identification and XOR coding

TL;DR: A novel image steganography algorithm that combines the strengths of edge detection and XOR coding, to conceal a secret message either in the spatial domain or an Integer Wavelet Transform (IWT) based transform domain of the cover image is presented.
Journal ArticleDOI

A data hiding scheme based on multidirectional line encoding and integer wavelet transform

TL;DR: The experimental results show that the proposed data hiding method is not only superior in terms of embedding capacity and image quality than previous methods, but also secure to steganalysis and robust to attacks.

Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats

TL;DR: This research clarifies the diverse showing the evaluation factors based on image steganographic algorithms and has more detail knowledge based on Least significant bit LSB within various Images formats.
Proceedings ArticleDOI

Dual transform based steganography using wavelet families and statistical methods

TL;DR: This method concentrated for perfecting the visual effect of the stego image and robustness against the various attacks by using different wavelet families and statistical methods achieved acceptable imperceptibility and certain robustness.
Journal ArticleDOI

A Secure Steganography Method Based on Integer Lifting Wavelet Transform

TL;DR: Experimental results demonstrate that the proposed steganography method in frequency domain has achieved superior performance in terms of high imperceptibility of stego-image and it is secure against statistical attack in comparison with existing methods.
References
More filters
Proceedings ArticleDOI

An adaptive steganographic technique based on integer wavelet transform

TL;DR: This work attempts to hide the very existence of the message and make communication undetectable in an open environment like the internet.
Posted Content

Proposed System for data hiding using Cryptography and Steganography Proposed System for data hiding using Cryptography and Steganography

TL;DR: This project is developing a system where they develop a new technique in which Cryptography and Steganography are used as integrated part along with newly developed enhanced security module.
Journal ArticleDOI

Proposed System for Data Hiding Using Cryptography and Steganography

TL;DR: In this paper, the authors have developed a new technique in which Cryptography and Steganography are used as integrated part along with newly developed enhanced security module, in which AES algorithm to encrypt a message and a part of the message is hidden in DCT of an image; remaining part of message is used to generate two secret keys which make this system highly secured.
Proceedings ArticleDOI

Image Steganography Using Pixel-Value Differencing

TL;DR: The theoretical estimation and experimental results demonstrate that the proposed scheme can provide a superior embedding and the embedded confidential information can be extracted from stego-images without the assistance of original images.
Proceedings ArticleDOI

Bit-4 of frequency domain-DCT steganography technique

TL;DR: A new method of steganography based on embedding message bits in the 4th bit of the coefficients of a transform domain, such as the DCT and Wavelet, of an image, which provides better resistance against steganalysis processes is described.
Related Papers (5)