Abstract
The main challenges of image steganography are imperceptibility of the cover image and no recoverability of the secret data. To deal with these challenges, a modified digital image steganography technique based on Discrete Wavelet Transform (DWT) is proposed. In proposed approach, two new concepts are being proposed to minimize the distortion in the cover image. The first one i.e. secret key computation concept is proposed to make it more robust and resistive towards steganalysis. The second one, known as blocking concept, is introduced to ensure least variation in the cover image. The proposed approach is tested over ten different cover images and two secret images. Its performance is compared with the six well-known steganography techniques. The experimental results reveal that the proposed approach performs better than the existing techniques in terms of imperceptibility, security and quality measures. The six image processing attacks are also applied on the stego-image to test the robustness of the proposed approach. The effects of compression, rotation, and application of different wavelets have also been investigated on the proposed approach. The results demonstrate the robustness of the proposed approach under different image processing attacks. Both stego-image and extracted secret images possess better visual quality.
Similar content being viewed by others
References
Abdelwahab AA, Hassan LA (2008) A discrete wavelet transform based technique for image hiding. Proceedings of 25th National Radio Science Conference, Egypt, pp 1–9
Al-Ataby A, Al-Naima F (2010) A modified high capacity image steganography technique based on wavelet transform. Int Arab J Info Technol 7(4):358–364
Al-Shatanawi OM, El-Emam NN (2015) A new image steganography algorithm based on MLSB method with random pixels selection. Int J Netw Sec Appl 7:37–53
Baby D, Thomas J, Augustine G, George E, Michael NR (2015) A novel DWT based image securing method using steganography. Procedia Comput Sci 46:612–618
Bas P, Filler T, Pevny T (2011) Break our steganographic system-the ins and outs of organizing BOSS. Proceeding of International Conference on Information Hiding, Prague, pp 59–70
Cachin C (2004) An information-theoretic model for steganography. Inf Comput 192(1):41–56
Chan CK, Chang LM (2003) Hiding data in image by simple LSB substitution. Pattern Recogn 37:469–474
Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90:727–752
Chen PY, Wu WE (2006) A DWT based approach for image steganography. Int J Appl Sci Eng 4(3):275–290
Chen PY, Wu WE (2009) A modified side match scheme for image steganography. Int J Appl Sci Eng 7(1):53–60
Denemark T, Boroumand M, Fridrich J (2016) Steganalysis features of content-adaptive JPEG steganography. IEEE Trans Info Forens Sec 11(8):1736–1746
El-Emam N, Al-Zubidy R (2013) New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm. J Syst Softw 86:1465–1481
Ghazanfari, K., Ghaemmaghami, S. & Khosravi, S.R. 2011. LSB++: An improvement to LSB+ steganography. Proceedings of IEEE Region Conference TENCON, Pp. 364–368. doi:10.1109/TENCON.2011.6129126
Ghebleh M, Kanso A (2014) A robust chaotic algorithm for digital image steganography. Commun Nonlinear Sci Numer Simul 19:1898–1907
Guo, L., Ni, J., & Shi, Y.-Q. 2012. An efficient JPEG steganographic scheme using uniform embedding. Proceeding of 4th IEEE International Workshop on Information Forensics and Security, Spain, Pp. 169-174
Hemalatha S, Acharya UD, Renuka A, Kamath PR (2013) A secure and high capacity image steganography technique. Sign Image Proc 4:83–89
Hemalatha S, Acharya UD, Renuka A (2015) Wavelet transform based steganography technique to hide audio signals in image. Procedia Comput Sci 47:272–281
Holub, V., & Fridrich, J. 2012. Designing steganographic distortion using directional filters. Proceeding of IEEE International Workshop on Information Hiding and Multimedia Security, 234–239
Holub V, Fridrich J (2013) Digital image steganography using universal distortion. Proceeding of ACM Workshop on Information Hiding and Multimedia Security, France, pp 59–68
Holub V, Fridrich J, Denemark T (2014) Universal distortion design for steganography in an arbitrary domain. EURASIP J Inf Secur 1:1–13
Hussan M, Wahab AWA, Ho ATS, Javed N, Jung K-H (2017) A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Process Image Commun 50:44–57
Ioannidou A, Halkidis ST, Stephanides G (2012) A novel technique for image steganography based on a high payload method and edge detection. Expert Syst Appl 39:11517–11524
Johnson, N.F. & Katzenbbeisser, S. 2000. A survey of steganographic techniques. Information Hiding, Artech House, 43–78
Kumar V, Kumar D (2010a) Performance evaluation of dwt based image steganography. Proceedings of 2nd International Conference on Advance Computing, Patiala, pp 223–228
Kumar V, Kumar D (2010b) In: Das VV, Vijaykumar R (eds) Digital image steganography based on combination of DCT and DWT. Information and Communication Technologies, Kochi
Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. Proceedings of International Conference on Image Processing, Paris, pp 4206–4210
Masaebi S, Moghaddam AME (2012) A new approach for image hiding based on contourlet transform. Int J Electric Comput Eng 2(5):699–708
Muhammad K, Ahmad J, Rho S, Baik SW (2017) Image steganography for authenticity of visual contents in social networks. Multi Tools Appl:1–20
Mythreyi S, Vaidehi V (2007) Gabor transform based image steganography. IETE J Res 53(2):103–112
Narasimmalou T, Joseph AR (2012) Optimized discrete wavelet transform based steganography. Proceedings of IEEE International Conference on Advanced Communication Control and Computing Technologies, Ramanathapuram, pp 88–91
Raftari N, Moghadam AME (2012) Digital image steganography based on assignment algorithm and combination of DCT-IWT. Proceedings of International Conference on Computational Intelligence, Communication Systems and Networks, Phuket, pp 295–300
Sedighi V, Cogranne R, Fridrich J (2016) Content adaptive steganography by minimizing statistical detectability. IEEE Trans Info Forens Sec 11(2):221–234
Shuliang S (2016) Image steganography based on nonsubsampled contourlet transform and hill cipher. Telecommun Sci 32(6):124–128
Singh S, Singh R, Siddiqui TJ (2015) Singular value decomposition based image steganography using integer wavelet transform. Proceedings of International Symposium on Signal Processing and Intelligent Recognition Systems, Trivandrum, pp 593–601
Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: A survey. Comput Sci Rev 13:95–113
Wang M-S, Chen W-C (2009) A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography. Comput Stand Interf 31(4):757–762
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: From error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
Wu H-T, Dugelay J-L, Cheung Y-M (2008) A data map** method for steganography and its application to images. Proceedings of International Workshop on Information Hiding, USA, pp 236–250
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kumar, V., Kumar, D. A modified DWT-based image steganography technique. Multimed Tools Appl 77, 13279–13308 (2018). https://doi.org/10.1007/s11042-017-4947-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4947-8