Open Access Open Access  Restricted Access Subscription Access

A Secure Image Steganography Algorithm Based On Least Significant Bit and Integer Wavelet Transform-Review

Sreelakshmi C. H.

Abstract


The rapid development of data communication requires highly secure exchange of information between source and destination. Steganography is a method in which hiding secret data into a cover object in such a way that it is invisible to human eyes. Thus which prevent the detection of hidden messages and access of any secret data? The cover object may be image, text, audio, or video. My paper is based on  a review on secure steganography algorithm that hides a bit stream of the secret text in to the LSBs( least significant bits) of  the approximation coefficients IWT i.e. integer wavelet transform of gray scale images as well as color images ,thus it form stego images. The embedding, extracting process of the proposed steganography algorithms are performed using an easy to use environment called MATLAB. The challenges to steganography are Invisibility, payload capacity, and security in terms of peak signal to noise ratio (PSNR) and robustness. The difference between the cover images and the stego images is measured by using the mean square error (MSE) and the PSNR value.

 

Keywords: Image processing, integer wavelet transform, image steganography


Full Text:

PDF

References


Thangadurai K., Devi G.S. An analysis of LSB based image steganography techniques. Proc. of International Conference on Computer Communication and Informatics, 2014, 1–4p.

Baby D., Thomas J., Augustine G., et al. A novel DWT based image securing method using steganography. Procedia Computer Science, 2015, 46, 612–618p.

Gulve A.K., Joshi M.S. An image steganography method hiding secret data into coefficients of integer wavelet transform using pixel value differencing approach. Mathematical Problems in Engineering, 2015, 1–11p.

Raftari N., Moghadam A.M.E. Digital image steganography based on integer wavelet transform and assignment algorithm. Proc. of the 6th Asia Modelling Symposium, 2012, 87–92p


Refbacks

  • There are currently no refbacks.