Data Hiding in Images in Discrete Wavelet Domain Using PMM
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33093
Data Hiding in Images in Discrete Wavelet Domain Using PMM

Authors: Souvik Bhattacharyya, Gautam Sanyal

Abstract:

Over last two decades, due to hostilities of environment over the internet the concerns about confidentiality of information have increased at phenomenal rate. Therefore to safeguard the information from attacks, number of data/information hiding methods have evolved mostly in spatial and transformation domain.In spatial domain data hiding techniques,the information is embedded directly on the image plane itself. In transform domain data hiding techniques the image is first changed from spatial domain to some other domain and then the secret information is embedded so that the secret information remains more secure from any attack. Information hiding algorithms in time domain or spatial domain have high capacity and relatively lower robustness. In contrast, the algorithms in transform domain, such as DCT, DWT have certain robustness against some multimedia processing.In this work the authors propose a novel steganographic method for hiding information in the transform domain of the gray scale image.The proposed approach works by converting the gray level image in transform domain using discrete integer wavelet technique through lifting scheme.This approach performs a 2-D lifting wavelet decomposition through Haar lifted wavelet of the cover image and computes the approximation coefficients matrix CA and detail coefficients matrices CH, CV, and CD.Next step is to apply the PMM technique in those coefficients to form the stego image. The aim of this paper is to propose a high-capacity image steganography technique that uses pixel mapping method in integer wavelet domain with acceptable levels of imperceptibility and distortion in the cover image and high level of overall security. This solution is independent of the nature of the data to be hidden and produces a stego image with minimum degradation.

Keywords: Cover Image, Pixel Mapping Method (PMM), StegoImage, Integer Wavelet Tranform.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1072790

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2851

References:


[1] Ali Al-Ataby and Fawzi Al-Naima. A modified high capacity image steganography technique based on wavelet transform. The International Arab Journal of Information Technology, 7:358-364, 2010.
[2] Ahmad T. Al-Taani. and Abdullah M. AL-Issa. A novel steganographic method for gray-level images. International Journal of Computer, Information, and Systems Science, and Engineering, 3, 2009.
[3] Ross J. Anderson. and Fabien A.P.Petitcolas. On the limits of steganography. IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Copyright and Privacy Protection, 16:474-481, 1998.
[4] Souvik Bhattacharyya. and Gautam Sanyal. Study of secure steganography model. In Proceedings of International Conference on AdvancedComputing and Communication Technologies (ICACCT-2008), Panipath,India, 2008.
[5] Souvik Bhattacharyya. and Gautam Sanyal. An image based steganography model for promoting global cyber security. In Proceedings of International Conference on Systemics, Cybernetics and Informatics, Hyderabad,India, 2009.
[6] Souvik Bhattacharyya. and Gautam Sanyal. Implementation and design of an image based steganographic model. In Proceedings of IEEE International Advance Computing Conference, Patiala ,India, 2009.
[7] Souvik Bhattacharyya. and Gautam Sanyal. Hiding data in images using pixel mapping method (pmm). In Proceedings of 9th annual Conference on Security and Management (SAM) under The 2010 World Congress in Computer Science,Computer Engineering, and Applied Computing(WorldComp 2010), LasVegas,USA, July 12-15,2010.
[8] Geert Uytterhoeven Dirk Roose Adhemar Bultheel. Integer wavelet transforms using the lifting scheme. In CSCC Proceedings, 1999.
[9] J.Y. Hsiao. C.C. Chang. and C.-S. Chan. Finding optimal leastsignificant- bit substitution in image hiding by dynamic programming strategy. Pattern Recognition, 36:1583-1595, 2003.
[10] C.K. Chan. and L. M.Cheng. Hiding data in images by simple lsb substitution. Pattern Recognition, 37:469-474, 2004.
[11] Po-Yueh Chen and Hung-Ju Lin. A dwt based approach for image steganography. International Journal of Applied Science and Engineering, 4:275-290, 2006.
[12] Ajit Danti and Preethi Acharya. Randomized embedding scheme based on dct coefficients for image steganography. IJCA Special Issue on Recent Trends in Image Processing and Pattern Recognition, 2010.
[13] G. Doerr and J.L. Dugelay. A guide tour of video watermarking. Signal Processing: Image Communication, 18:263-282, 2003.
[14] G. Doerr and J.L. Dugelay. Security pitfalls of frameby-frame approaches to video watermarking. IEEE Transactions on Signal Processing, Supplement on Secure Media, 52:2955-2964, 2004.
[15] Potdar V.and Chang E. Gray level modification steganography for secret communication. In IEEE International Conference on Industria lInformatics., pages 355-368, Berlin, Germany, 2004.
[16] K. Gopalan. Audio steganography using bit modification. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, (ICASSP -03), volume 2, pages 421-424, 6-10 April 2003.
[17] N.F. Maxemchuk J.T. Brassil, S. Low and L. O.Gorman. Electronic marking and identification techniques to discourage document copying. IEEE Journal on Selected Areas in Communications, 13:1495-1504, 1995.
[18] R K Chhotaray K B Shiva Kumar, K B Raja and Sabyasachi Pattanaik. Bit length replacement steganography based on dct coefficients. International Journal of Engineering Science and Technology, 2:3561-3570, 2010.
[19] D. Kahn. The Codebreakers - the comprehensive history of secret communication from ancient times to the Internet. Scribner, 1996.
[20] P Huang. K.C. Chang., C.P Chang. and T.M Tu. A novel image steganography method using tri-way pixel value differencing. Journal of Multimedia, 3, 2008.
[21] Kran Bailey Kevin Curran. An evaluation of image based steganography methods. International Journal of Digital Evidence,Fall 2003, 2003.
[22] Dr.S.T.Gandhe K.T.Talele and Dr.A.G.Keskar. Steganography security for copyright protection of digital images using dwt. (IJCNS) International Journal of Computer and Network Security, 2:21-26, 2010.
[23] V. Kumar and D. Kumar. Performance evaluation of dwt based image steganography. In Proceedings of Advance Computing Conference (IACC), 2010 IEEE 2nd International, pages 223-228, 2010.
[24] Jr. L. M. Marvel, C. G. Boncelet and C. T. Retter. Spread spectrum image steganography. IEEE Trans. on Image Processing, 8:1075-1083, 1999.
[25] Y. K. Lee. and L. H.Chen. High capacity image steganographic model. IEE Proc.-Vision, Image and Signal Processing, 147:288-294, 2000.
[26] W. Sweldens. The lifting scheme. A construction of second generation wavelets. SIAM J. Math. Anal., 29:511-546, 1997.
[27] Chia-Chen Lin. High capacity data hiding scheme for dct-based images. Journal of Information Hiding and Multimedia Signal Processing, 1, 2010.
[28] G. Davida M. Chapman and M. Rennhard. A practical and effective approach to large-scale automated linguistic steganography. In Proceedings of the Information Security Conference, pages 156-165, October 2001.
[29] N.F.Johnson. and S. Jajodia. Steganography: seeing the unseen. IEEE Computer, 16:26-34, 1998.
[30] W. Sweldens R. Calderbank, I. Daubechies and B.L. Yeo. Wavelet transforms that map integers to integers. Appl. Comput. Harmon. Anal., 5:332-369, 1998.
[31] Nasir Memon R. Chandramouli. Analysis of lsb based image steganography techniques. In Proceedings of IEEE ICIP, 2001.
[32] H S Manjunatha Reddy and K B Raja. High capacity and security steganography using discrete wavelet transform. International Journal of Computer Science and Security (IJCSS), 3:462-472.
[33] C.F. Lin. R.Z. Wang. and J.C. Lin. Image hiding by optimal lsb substitution and genetic algorithm. Pattern Recognition, 34:671-683, 2001.
[34] Gustavus J. Simmons. The prisoners- problem and the subliminal channel. Proceedings of CRYPTO., 83:51-67, 1984.
[35] Avinash Prasad Kshitij. Souvik Bhattacharyya. and Gautam Sanyal. A novel approach to develop a secure image based steganographic model using integer wavelet transform. In Proceedings of International Conference on Recent Trends in Information, Telecommunication and Computing (Indexed by IEEE Computer Society), Cochin ,India, 2010.
[36] S.P.Mohanty. Digital Watermarking: A Tutorial. 1999.
[37] JHP Eloff. T Mrkel. and MS Olivier. An overview of image steganography. In Proceedings of the fifth annual Information Security South Africa Conference., 2005.
[38] N. Morimoto W. Bender, D. Gruhl and A. Lu. Techniques for data hiding. IBM Systems Journal, 35:313-316, 1996.
[39] D.C. Wu. and W.H. Tsai. A steganographic method for images by pixelvalue differencing. Pattern Recognition Letters, 24:1613-1626, 2003.
[40] Bo Yang and Beixing Deng. Steganography in gray images using wavelet. In Proceedings of ISCCSP 2006.