scispace - formally typeset
Book ChapterDOI

Wavelet Pave the Trio Travel for a Secret Mission – A Stego Vision

TLDR
This paper elucidates the use of Haar Integer Wavelet Transform for Constant and Adaptive number of bit embedding method and finds the method with the highest embedding capacity with high PSNR is adjudged best.
Abstract
Image steganography is a rapidly developing field with immense applications to offer high data security. There are two types’ or rather two domains in which image steganography has been achieved, spatial and frequency domain. Spatial domain steganography focuses on embedding of the payload on the LSB bits of the pixels on the image, while frequency domain steganography focuses on the transformation of the image pixels using various transform algorithms and then embedding data in the transformed pixels. The most commonly used transform mechanism is the IWT (Integer Wavelet Transform) because of the obvious reason that it yields integer coefficients which are very easy to work with. This paper elucidates the use of Haar Integer Wavelet Transform for Constant and Adaptive number of bit embedding method. Both types are analyzed and finally the method with the highest embedding capacity with high PSNR is adjudged best.

read more

Citations
More filters
Journal ArticleDOI

A Graph Theory Practice on Transformed Image: A Random Image Steganography

TL;DR: The proposed method gives high imperceptibility through high PSNR value and high embedding capacity in the cover image due to adaptive embedding scheme and high robustness against blind attack through graph theoretic random selection of coefficients.
References
More filters
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Book

Information Hiding Techniques for Steganography and Digital Watermarking

TL;DR: This first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia and an overview of "steganalysis," methods which can be used to break steganographic communication are discussed.
Journal ArticleDOI

Hiding data in images by simple LSB substitution

TL;DR: By applying an optimal pixel adjustment process to the stego-image obtained by the simple LSB substitution method, the image quality of the stega-image can be greatly improved with low extra computational complexity.
Journal ArticleDOI

Review: Digital image steganography: Survey and analysis of current methods

TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.
Journal ArticleDOI

Hide and seek: an introduction to steganography

TL;DR: This article discusses existing steganographic systems and presents recent research in detecting them via statistical steganalysis and discusses the practical application of detection algorithms and the mechanisms for getting around them.
Related Papers (5)