SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images

被引:53
作者
Arunkumar, S. [1 ]
Subramaniyaswamy, V [1 ]
Vijayakumar, V. [2 ]
Chilamkurti, Naveen [3 ]
Logesh, R. [1 ]
机构
[1] SASTRA Deemed Univ, Sch Comp, Thanjavur, India
[2] Vellore Inst Technol, Sch Comp Sci & Engn, Chennai, Tamil Nadu, India
[3] La Trobe Univ, Dept Comp Sci & Comp Engn, Melbourne, Vic, Australia
关键词
Image Steganography; Logistic chaotic map; Singular value decomposition; Discrete cosine transform; Redundant integer wavelet transform; Medical image; WAVELET TRANSFORM; WATERMARKING;
D O I
10.1016/j.measurement.2019.02.069
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The advances in computer technologies and the Internet have made rapid strides and breakthroughs in the field of data communication, which nowadays, is easily accessed. Unfortunately, this easy access offers almost endless opportunities for pirating copyrighted and confidential medical imagery. Many methods are proposed in the literature, however, most of them lack in robustness and perceptibility, and are prone to attacks. Hence, this study proposes a robust image steganographic approach that combines Redundant Integer Wavelet Transform (RIWT), Discrete Wavelet Transforms (DCT) and Singular Value Decomposition (SVD) and the logistic chaotic map. RIWT being a shift invariant, reversibility and robustness were achieved in this proposed technique. Better level of imperceptibility was achieved using SVD and DCT, with embedding carried out on singular values. Extra security was provided using the logistic chaotic map for encryption of secret medical images, which also enhanced the robustness of the technique. The effectiveness of our proposed scheme was compared with similar schemes available in the literature using common parameters such as imperceptibility, robustness and resistance to several geometric transformation attacks. This technique proved superior to other existing methods. The UCID benchmarking database was used during validation. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页码:426 / 437
页数:12
相关论文
共 42 条
[1]   A technique for digital steganography using chaotic maps [J].
Anees, Amir ;
Siddiqui, Adil Masood ;
Ahmed, Jameel ;
Hussain, Iqtadar .
NONLINEAR DYNAMICS, 2014, 75 (04) :807-816
[2]   RIWT and QR factorization based hybrid robust image steganography using block selection algorithm for IoT devices [J].
Arunkumar, S. ;
Vairavasundaram, Subramaniyaswamy ;
Ravichandran, K. S. ;
Ravi, Logesh .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 36 (05) :4265-4276
[3]  
Arunkumar S., 2018, BIOMED RES-TOKYO, V29, P394
[4]   A Novel DWT based Image Securing Method using Steganography [J].
Baby, Della ;
Thomas, Jitha ;
Augustine, Gisny ;
George, Elsa ;
Michael, Neenu Rosia .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 :612-618
[5]  
Behnke O, 2013, DATA ANALYSIS IN HIGH ENERGY PHYSICS: A PRACTICAL GUIDE TO STATISTICAL METHODS, P1, DOI 10.1002/9783527653416
[6]   Sharing secrets in stego images with authentication [J].
Chang, Chin-Chen ;
Hsieh, Yi-Pei ;
Lin, Chia-Hsuan .
PATTERN RECOGNITION, 2008, 41 (10) :3130-3137
[7]   Digital image steganography: Survey and analysis of current methods [J].
Cheddad, Abbas ;
Condell, Joan ;
Curran, Kevin ;
Mc Kevitt, Paul .
SIGNAL PROCESSING, 2010, 90 (03) :727-752
[8]   Improving the embedding efficiency of weight matrix-based steganography for grayscale images [J].
Fan, Li ;
Gao, Tiegang ;
Cao, Yanjun .
COMPUTERS & ELECTRICAL ENGINEERING, 2013, 39 (03) :873-881
[9]  
Judge J.C., STEGANOGRAPHY PRESEN, P200
[10]   Steganographic method based on interpolation and LSB substitution of digital images [J].
Jung, Ki-Hyun ;
Yoo, Kee-Young .
MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (06) :2143-2155