High Capacity and Robust Speech Data Hiding in Colour Images

被引:0
作者
Kulkarni, Sheetal A. [1 ]
Patil, Shubhangi B. [2 ]
机构
[1] Cummins Coll Engn Women, Instrumentat & Control, Pune, Maharashtra, India
[2] JJ Magdum Coll Engn, Elect Engn, Jaysingpur, Sangli, India
来源
2014 IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN) | 2014年
关键词
Least significant bits (LSB); steganography; secret message; Discrete Wavelet Transform (DWT); stego-image; cover-image; STEGANOGRAPHY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Steganography is a method for hiding information in a host signal. The host signal can be a still image, speech or video and the message signal that is hidden in the host signal can be a text, image or an audio signal. In this method host signal is image and secret message is audio signal. In this paper, a data hiding scheme by Discrete Wavelet Transform with LSB substitution is proposed. By applying Discrete Wavelet Transform on secret message, message data is hidden in the LSB's of the colour image pixels. The worst case mean-square-error and PSNR between the stego-image and the cover-image is derived. Experimental results show that the stego-image is visually indistinguishable from the original cover-image. In this paper male/female speeches are hiding inside digital images. Discrete Wavelet Transform (DWT) is applied on secret speech signal followed by LSB method to obtain the stego-image at transmitter side. At receiver end Inverse Discrete Wavelet transform applied on stego image and secret signal can retrieve by LSB method.
引用
收藏
页码:189 / 193
页数:5
相关论文
共 18 条
[1]  
Aggarwal R. J. K., 2011, IJCA, V20, P14
[2]  
Chan C. K., 2012, J PATTERN RECOGNITIO, V37, P469
[3]   A wavelet domain LSB insertion algorithm for high capacity audio steganography [J].
Cvejic, N ;
Seppänen, T .
PROCEEDINGS OF THE 2002 IEEE 10TH DIGITAL SIGNAL PROCESSING WORKSHOP & 2ND SIGNAL PROCESSING EDUCATION WORKSHOP, 2002, :53-55
[4]  
Dutta Agniswar, 2011, INT C COMM SYST NETW
[5]  
Ker AD, 2004, LECT NOTES COMPUT SC, V3200, P97
[6]   Steganalysis of LSB matching in grayscale images [J].
Ker, AD .
IEEE SIGNAL PROCESSING LETTERS, 2005, 12 (06) :441-444
[7]  
Khalil MI, 2011, J COMPUT SCI TECHNOL, V11, P68
[8]   Secret image sharing with steganography and authentication [J].
Lin, CC ;
Tsai, WH .
JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) :405-414
[9]  
Liu Bede, 2003, IEEE T IMAGE PROCESS, V12
[10]  
Nath Joyshree, 2012, INT J COMPUTER APPL, V46, P1