Image steganography using redundant discrete wavelet transform and QR factorization

被引:58
作者
Subhedar, Mansi S. [1 ]
Mankar, Vijay H. [2 ]
机构
[1] BD Coll Engn, Dept Elect & Telecommun, Wardha 442102, India
[2] Govt Polytech, Dept Elect & Telecommun, Nagpur 440001, Maharashtra, India
关键词
Image steganography; Statistical texture analysis; Redundant discrete wavelet transform; Singular value decomposition; QR factorization; Steganalysis; SCHEME; VISIBILITY; CAPACITY;
D O I
10.1016/j.compeleceng.2016.04.017
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The paper demonstrates image steganography using redundant discrete wavelet transform (RDWT) and QR factorization. RDWT helps to overcome artefacts due to variation in energy distribution caused by shifts in input signal. Also, when compared with SVD, QR factorization provides less computational complexity and avoids false positive issue; a major flaw in singular value decomposition (SVD) based data hiding methods. In addition, this study also proposes cover selection measure based on statistical texture analysis. Cover selection helps to enhance security of steganographic technique. Suitable cover is decomposed by RDWT and the scrambled secret image is embedded in QR factorised sub-band. Several experiments and comparative studies are performed to show efficacy of proposed method in terms of imperceptibility, capacity and robustness to various signal processing attacks. It is also examined with wavelet based and contourlet based steganalyzer. The average detection accuracy is found to be 52% and 56% respectively indicating poor ability of steganalyzer to identify stego images. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:406 / 422
页数:17
相关论文
共 24 条
[11]  
Lyu S, 2003, LECT NOTES COMPUT SC, V2578, P340
[12]   An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method [J].
Sajasi, Sara ;
Moghadam, Amir-Masoud Eftekhari .
APPLIED SOFT COMPUTING, 2015, 30 :375-389
[13]   Using contourlet transform and cover selection for secure steganography [J].
Sajedi, Hedieh ;
Jamzad, Mansour .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (05) :337-352
[14]   CBS: Contourlet-Based Steganalysis Method [J].
Sajedi, Hedieh ;
Jamzad, Mansour .
JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2010, 61 (03) :367-373
[15]   UCID - An uncompressed colour image database [J].
Schaefer, G ;
Stich, M .
STORAGE AND RETRIEVAL METHODS AND APPLICATIONS FOR MULTIMEDIA 2004, 2004, 5307 :472-480
[16]   Performance and analysis of high capacity Steganography of color images involving Wavelet Transform [J].
Sidhik, Siraj ;
Sudheer, S. K. ;
Pillai, V. P. Mahadhevan .
OPTIK, 2015, 126 (23) :3755-3760
[17]  
Simmons G. J., 1984, Advances in Cryptology, P51, DOI DOI 10.1007/978-1-4684-4730-95
[18]   The undecimated wavelet decomposition and its reconstruction [J].
Starck, Jean-Luc ;
Fadili, Jalal ;
Murtagh, Fionn .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2007, 16 (02) :297-309
[19]   A blind double color image watermarking algorithm based on QR decomposition [J].
Su, Qingtang ;
Niu, Yugang ;
Zou, Hailin ;
Zhao, Yongsheng ;
Yao, Tao .
MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (01) :987-1009
[20]   Color image blind watermarking scheme based on QR decomposition [J].
Su, Qingtang ;
Niu, Yugang ;
Wang, Gang ;
Jia, Shaoli ;
Yue, Jun .
SIGNAL PROCESSING, 2014, 94 :219-235