A Robust Image Steganography using DWT Difference Modulation (DWTDM)

Full Text (PDF, 1964KB), PP.27-40

Views: 0 Downloads: 0

Author(s)

Souvik Bhattacharyya 1,* Gautam Sanyal 2

1. University Institute of Technology, The University of Burdwan, West Bengal, India

2. National Institute of Technology, Durgapur, West Bengal, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2012.07.04

Received: 2 Oct. 2011 / Revised: 11 Jan. 2012 / Accepted: 16 Mar. 2012 / Published: 8 Jul. 2012

Index Terms

Networked Control System, MAC protocol, priority, real-time, fairness

Abstract

Maintaining the secrecy of information is of great concern today.Steganography is the art and science that hides the information in an appropriate cover carrier like image, text, audio and video media. Considerable amount of work has been carried out by different researchers on steganography. In this work a new transform domain image stenographic technique DWTDM is presented where secret data is embedded in adjacent DWT coefficient differences. The dynamic range of the DWT difference considered while extraction of data which results an efficient and robust stenographic technique which can avoid various image attacks and works perfectly well for both uncompressed and compressed domain. Experimental results demonstrate the effectiveness and accuracy of the proposed technique in terms of security of hidden data and various image similarity metrics.

Cite This Paper

Souvik Bhattacharyya, Gautam Sanyal, "A Robust Image Steganography using DWT Difference Modulation (DWTDM)", International Journal of Computer Network and Information Security(IJCNIS), vol.4, no.7, pp.27-40, 2012. DOI:10.5815/ijcnis.2012.07.04

Reference

[1]Gustavus J. Simmons, The Prisoners' Problem and the Subliminal Channel, Proceedings of CRYPTO ,83(1984) 51-57.
[2]RJ Anderson, Stretching the Limits of Steganography, Information Hiding, Springer Lecture Notes in Computer Science, 1174 (1996) 39-48.
[3]Scott. Craver, On Public-key Steganography in the Presence of an Active Warden, Proceedings of 2nd International Workshop on Information Hiding., (1998) 355-368.
[4]Ross J. Anderson. and Fabien A.P.Petitcolas,On the limits of steganography, IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Copyright and Privacy Protection,16(1998) 474-481.
[5]N.F.Johnson. and S. Jajodia, Steganography: seeing the unseen, in IEEE Computer, 16(1998) 26-34.
[6]T Mrkel., JHP Eloff and MS Olivier, An Overview of Image Steganography, in Proceedings of the fifth annual Information Security South Africa Conference, (2005).
[7]Souvik Bhattacharyya and Gautam Sanyal, Study of Secure Steganography model, in Proceedings of International Conference on Advanced Computing and Communication Technologies,(2008).
[8]Souvik Bhattacharyya and Gautam Sanyal, Implementation and Design of an Image based Steganographic model, in Proceedings of IEEE International Advance Computing Conference,(2009).
[9]Souvik Bhattacharyya and Gautam Sanyal, An Image based Steganography model for promoting Global Cyber Security, in Proceedings of International Conference on Systemics, Cybernetics and Informatics,(2009).
[10]Souvik Bhattacharyya. and Gautam Sanyal. Hiding data in images using pixel mapping method (PMM). In Proceedings of 9th annual Conference on Security and Management (SAM) under The 2010 World Congress in Computer Science, Computer Engineering, and Applied Computing(World Comp 2010), Las Vegas, USA, July 12-15,2010.
[11]Souvik Bhattacharyya, Lalan Kumar and Gautam Sanyal. A novel approach of data hiding using pixel mapping method (PMM). International Journal of Computer Science and Information Security (IJCSIS), 8, 2010
[12]Derek Upham. Jsteg http://zooid.org/~paul/crypto/jsteg/.
[13]Allan Latham. Jphide, http://linux01.gwdg.de/~alatham/ stego.html.
[14]Andrew Westfeld. F5-a steganographic algorithm: high capacity despite better steganalysis. In Proceedings of the 4th Information Hiding Workshop, volume 2137 of LNCS, pages 289{302. Springer, 2001.
[15]J. Fridrich, M. Goljan, and D. Hogea. Attacking the outguess. In Proceedings of 2002 ACM Workshop on Multimedia and Security, pages 3{6. ACM Press, 2002.
[16]K. Solanki, A. Sarkar, and B. S. Manjunath. Yass: Yet another steganographic scheme that resists blind steganalysis. In Proceedings of the 9th Information Hiding Workshop, volume 4567 of LNCS, pages 16{31. Springer, 2007.
[17]Ajit Danti and Preethi Acharya. Randomized embedding scheme based on dct coefficients for image steganography. IJCA Special Issue on Recent Trends in Image Processing and Pattern Recognition, 2010.
[18]R K Chhotaray K B Shiva Kumar, K B Raja and Sabyasachi Pattanaik. Bit length replacement steganography based on dct coefficients. International Journal of Engineering Science and Technology, 2:3561–3570, 2010.
[19]Chia-Chen Lin. High capacity data hiding scheme for dct-based images. Journal of Information Hiding and Multimedia Signal Processing, 1, 2010.
[20]Ali Al-Ataby and Fawzi Al-Naima. A modified high capacity image steganography technique based on wavelet transform. The International Arab Journal of Information Technology, 7:358–364, 2010.
[21]Bo Yang and Beixing Deng. Steganography in gray images using wavelet. In Proceedings of ISCCSP 2006.
[22]Po-Yueh Chen and Hung-Ju Lin. A dwt based approach for image steganography. International Journal of Applied Science and Engineering, 4:275–290, 2006.
[23]Dr. S.T.Gandhe K.T.Talele and Dr. A.G.Keskar. Steganography security for copyright protection of digital images using dwt. (IJCNS) International Journal of Computer and Network Security, 2:21–26, 2010.
[24]V. Kumar and D. Kumar. Performance evaluation of dwt based image steganography. In Proceedings of Advance Computing Conference (IACC), 2010 IEEE 2nd International, pages 223–228, 2010.
[25]H S Manjunatha Reddy and K B Raja. High capacity and security steganography using discrete wavelet transform. International Journal of Computer Science and Security (IJCSS), 3:462–472.
[26]C. Cachin. An information theoretic model for steganography. Proceedings of 2nd Workshop on Information Hiding. D. Aucsmith (Eds.).Lecture Notes in Computer Sciences, Springer-verlag., 1525, 1998.
[27]IEEE Alan Conrad Bovik Fellow IEEE Hamid Rahim Sheikh Student Member IEEE Zhou Wang, Member and IEEE. Eero P. Simoncelli, Senior Member. Image quality assessment: From error visibility to structural similarity. IEEE TRANSACTIONS ON IMAGE PROCESSING., 3, 2004.
[28]Claude E. Shannon. A mathematical theory of communication. The Bell System Technical Journal., 27:379–423.
[29]Andreas Westfield and Andreas Pfitzmann. Attacks on steganographic systems. In Proceedings of the Third Intl. Workshop on Information Hiding, Springer-Verlag., pages 61–76, 1999.
[30]Patricia R. Pereira. Andr R.S. Maral. A steganographic method for digital images robust to rs steganalysis. Springer Lecture Notes in Computer Science, Vol. 3656., pages 1192–1199, 2005.
[31]Guillermito. Steganography: A few tools to discover hidden data. 2004.
[32]J.Y. Hsiao. C.C. Chang. and C.-S. Chan. Finding optimal least significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition, 36:1583–1595, 2003.
[33]C.K. Chan. and L. M.Cheng. Hiding data in images by simple lsb substitution. Pattern Recognition, 37:469–474, 2004.
[34]Y. K. Lee. and L. H.Chen. High capacity image steganographic model.IEE Proc.-Vision, Image and Signal Processing, 147:288–294, 2000.
[35]C.F. Lin. R.Z. Wang. and J.C. Lin. Image hiding by optimal lsb substitution and genetic algorithm. Pattern Recognition, 34:671–683, 2001.
[36]D.C. Wu. and W.H. Tsai. A steganographic method for images by pixel value differencing. Pattern Recognition Letters, 24:1613–1626, 2003
[37]P Huang. K.C. Chang., C.P Chang. and T.M Tu. A novel image steganography method using tri-way pixel value differencing. Journal of Multimedia, 3, 2008.
[38]Potdar V.and Chang E. Gray level modification steganography for secret communication. In IEEE International Conference on Industria Informatics., pages 355–368, Berlin, Germany, 2004.