Image steganography using redundant discrete wavelet transform and QR factorization

被引:58
作者
Subhedar, Mansi S. [1 ]
Mankar, Vijay H. [2 ]
机构
[1] BD Coll Engn, Dept Elect & Telecommun, Wardha 442102, India
[2] Govt Polytech, Dept Elect & Telecommun, Nagpur 440001, Maharashtra, India
关键词
Image steganography; Statistical texture analysis; Redundant discrete wavelet transform; Singular value decomposition; QR factorization; Steganalysis; SCHEME; VISIBILITY; CAPACITY;
D O I
10.1016/j.compeleceng.2016.04.017
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The paper demonstrates image steganography using redundant discrete wavelet transform (RDWT) and QR factorization. RDWT helps to overcome artefacts due to variation in energy distribution caused by shifts in input signal. Also, when compared with SVD, QR factorization provides less computational complexity and avoids false positive issue; a major flaw in singular value decomposition (SVD) based data hiding methods. In addition, this study also proposes cover selection measure based on statistical texture analysis. Cover selection helps to enhance security of steganographic technique. Suitable cover is decomposed by RDWT and the scrambled secret image is embedded in QR factorised sub-band. Several experiments and comparative studies are performed to show efficacy of proposed method in terms of imperceptibility, capacity and robustness to various signal processing attacks. It is also examined with wavelet based and contourlet based steganalyzer. The average detection accuracy is found to be 52% and 56% respectively indicating poor ability of steganalyzer to identify stego images. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:406 / 422
页数:17
相关论文
共 24 条
[1]   Parallel detection algorithm using multiple QR decompositions with permuted channel matrix for SDM/OFDM [J].
Ahn, Chang-Jun .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2008, 57 (04) :2578-2582
[2]  
[Anonymous], P INT C INF COMM TEC
[3]  
Bradley AndrewP., 2003, P 7 INT C DIGITAL IM, P29
[4]   The redundant discrete wavelet transform and additive noise [J].
Fowler, JE .
IEEE SIGNAL PROCESSING LETTERS, 2005, 12 (09) :629-632
[5]   Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition [J].
Guo, Jing-Ming ;
Prasetyo, Heri .
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2014, 68 (09) :816-834
[6]   TEXTURAL FEATURES FOR IMAGE CLASSIFICATION [J].
HARALICK, RM ;
SHANMUGAM, K ;
DINSTEIN, I .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1973, SMC3 (06) :610-621
[7]   A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm [J].
Kanan, Hamidreza Rashidy ;
Nazeri, Bahram .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (14) :6123-6130
[8]   Cover selection for steganographic embedding [J].
Kharrazi, Mehdi ;
Sencar, Husrev T. ;
Memon, Nasir .
2006 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP 2006, PROCEEDINGS, 2006, :117-+
[9]  
Li B, 2011, J. Inf. Hiding Multim. Signal Process., V2, P142
[10]  
Lingling Wu, 2009, 2009 1st International Conference on Information Science and Engineering (ICISE 2009), P1164, DOI 10.1109/ICISE.2009.347