High Security Image Steganography Using IWT and Graph Theory

被引:0
作者
Thanikaiselvan, V [1 ]
Arulmozhivarman, P. [1 ]
机构
[1] VIT Univ, Sch Elect Engn, Vellore 632014, Tamil Nadu, India
来源
2013 IEEE INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING APPLICATIONS (IEEE ICSIPA 2013) | 2013年
关键词
Steganography; IWT (Integer Wavelet Transform); Graph Theory; LSB(Least Significant Bit) substitution; Steganalysis;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Steganography conceals the secret information inside the cover medium. There are two types of steganography techniques available practically. They are spatial domain steganography and Transform domain steganography. The objectives to be considered in the steganography methods are high capacity, imperceptibility and robustness. In this paper, a Color image steganography in transform domain is proposed. Reversible Integer Haar wavelet transform is applied to the R, G and B planes separately and the data is embedded in a random manner. Random selection of wavelet coefficients is based on the graph theory. This proposed system uses three different keys for embedding and extraction of the secret data, where key1(Subband Selection - SB) is used to select the Wavelet subband for embedding, key2(Selection of Co-effecients-SC) is used to select the co-efficients randomly and key3 (Selection of Bit length-SB) is used to select the number of bits to be embedded in the selected co-efficients. This method shows good imperceptibility, High capacity and Robustness.
引用
收藏
页码:337 / 342
页数:6
相关论文
共 20 条
  • [1] Amirtharajan Rengarajan, 2012, Journal of Applied Sciences, V12, P428, DOI 10.3923/jas.2012.428.439
  • [2] An intelligent chaotic embedding approach to enhance stego-image quality
    Amirtharajan, Rengarajan
    Rayappan, John Bosco Balaguru
    [J]. INFORMATION SCIENCES, 2012, 193 : 115 - 124
  • [3] [Anonymous], 2007, Applied Cryptography: Protocols, Algorithms, and Source Code in C
  • [4] Techniques for data hiding
    Bender, W
    Gruhl, D
    Morimoto, N
    Lu, A
    [J]. IBM SYSTEMS JOURNAL, 1996, 35 (3-4) : 313 - 336
  • [5] Hiding data in images by simple LSB substitution
    Chan, CK
    Cheng, LM
    [J]. PATTERN RECOGNITION, 2004, 37 (03) : 469 - 474
  • [6] Digital image steganography: Survey and analysis of current methods
    Cheddad, Abbas
    Condell, Joan
    Curran, Kevin
    Mc Kevitt, Paul
    [J]. SIGNAL PROCESSING, 2010, 90 (03) : 727 - 752
  • [7] A semi-blind digital watermarking scheme based on the triplet of significant wavelet coefficients
    Chu, Hyung-Suk
    Batgerel, Ariunzaya
    An, Chong-Koo
    [J]. Journal of Electrical Engineering and Technology, 2009, 4 (04) : 552 - 558
  • [8] EI Safys RO, 2009, P ICNM 2009, P11
  • [9] Fazli S., 2010, 2010 International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT 2010), P377, DOI 10.1109/ICUMT.2010.5676610
  • [10] Katzenbeisser S, 2000, DIGITAL WATERMARKING, P2