Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain

被引:113
作者
Atawneh, Samer [1 ]
Almomani, Ammar [2 ]
Al Bazar, Hussein [3 ]
Sumari, Putra [4 ]
Gupta, Brij [5 ]
机构
[1] Saudi Elect Univ, Coll Comp & Informat, Riyadh 11673, Saudi Arabia
[2] Al Balqa Appl Univ, Al Huson Univ Coll, POB 50, Irbid, Jordan
[3] Arab Open Univ, Fac Comp Studies, Dammam 32423, Saudi Arabia
[4] Univ Sains Malaysia, Sch Comp Sci, George Town 11800, Malaysia
[5] Natl Inst Technol Kurukshetra, Dept Comp Engn, Kurukshetra, Haryana, India
关键词
Image steganography; Imperceptibility; Embedding payload; Diamond encoding (DE); Discrete wavelet transform (DWT); WATERMARKING; ROBUST;
D O I
10.1007/s11042-016-3930-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a new efficient embedding algorithm in the wavelet domain of digital images based on the diamond encoding (DE) scheme. Current discrete wavelet transform (DWT) steganography adds an unacceptable distortion to the images and is considered as an ineffective in terms of security. Applying the DE scheme to the current DWT steganographic methods solves the problems of these methods, and reduces the distortion added to the images, and thus improves the embedding efficiency. The proposed algorithm first converts the secret image into a sequence of base-5 digits. After that, the cover image is transformed into the DWT domain and segmented into 2 x 1 coefficient pairs. The DE scheme is used then to change at most one coefficient of each coefficient pair to embed the base-5 digits. Experimental results depict that the proposed algorithm is more efficient in embedding compared to other methods in terms of embedding payload and image quality. Moreover, the proposed algorithm is attacked by well-known steganalysis software. Results are showing that the proposed algorithm is secure against the powerful universal steganalyzer "ensemble classifier" and the histogram attack. The results also reveal that the proposed algorithm is robust against different image processing attacks such as compression, added noise, and cropping attacks.
引用
收藏
页码:18451 / 18472
页数:22
相关论文
共 22 条
[1]   A steganography embedding method based on edge identification and XOR coding [J].
Al-Dmour, Hayat ;
Al-Ani, Ahmed .
EXPERT SYSTEMS WITH APPLICATIONS, 2016, 46 :293-306
[2]  
Al-Korbi HA, 2015, IEEE JORD C APPL EL, V1, P1
[3]  
[Anonymous], 2012, IEEE T INF FORENSICS
[4]  
[Anonymous], 2011, INT J COMPUTER SCI C
[5]  
[Anonymous], 2014, INT J ENG TECHNOLOGY
[6]  
Antony Jisna, 2012, J COMPUTER, V52, p975
[7]   Steganography in digital images: Common approaches and tools [J].
Atawneh, Samer ;
Almomani, Ammar ;
Sumari, Putra .
IETE TECHNICAL REVIEW, 2013, 30 (04) :344-358
[8]   A Novel DWT based Image Securing Method using Steganography [J].
Baby, Della ;
Thomas, Jitha ;
Augustine, Gisny ;
George, Elsa ;
Michael, Neenu Rosia .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 :612-618
[9]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[10]  
CHAO RM, 2009, EURASIP J INFORM SEC