Steganography using Cuckoo Optimized Wavelet Coefficients

被引:0
作者
Singhal, Anuradha [1 ]
Bedi, Punam [1 ]
机构
[1] Univ Delhi, Dept Comp Sci, Delhi 110007, India
来源
PROCEEDING OF THE THIRD INTERNATIONAL SYMPOSIUM ON WOMEN IN COMPUTING AND INFORMATICS (WCI-2015) | 2015年
关键词
Steganography; Discrete Wavelet Transform; Cuckoo optimization algorithm; Security; TRANSFORM;
D O I
10.1145/2791405.2791500
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret data hiding has become center of information security research with the enormous growth of the internet. Many researchers are actively working towards increasing the capacity of hidden content, i.e., hiding bigger data/message in a cover without being perceivable. This paper proposes to use Cuckoo optimized algorithm for finding best coefficients in the Wavelet Transform domain of an image for embedding secret data to obtain stego image. Huffman encoding is applied on secret data to give encoded bit stream which is embedded in sub bands obtained from wavelet transform of the cover to form stego object. Huffman coding has characteristics of lossless compression which can be used to increase embedding capacity. The algorithm is implemented in Matlab and results are compared with existing LSB steganography and steganography using PSO in wavelet domain in terms of PSNR and SSIM.
引用
收藏
页码:365 / 370
页数:6
相关论文
共 26 条
[11]  
Civicioglu P, 2013, ARTIFICIAL INTELLIGE
[12]   Perturbed quantization steganography [J].
Fridrich, J ;
Goljan, M ;
Soukal, D .
MULTIMEDIA SYSTEMS, 2005, 11 (02) :98-107
[13]  
Ghasemi Elham, 2012, LECT NOTES ELECT ENG
[14]  
Ghasemi Elham, 2011, 2011 INT C COMM SIGN
[15]   A METHOD FOR THE CONSTRUCTION OF MINIMUM-REDUNDANCY CODES [J].
HUFFMAN, DA .
PROCEEDINGS OF THE INSTITUTE OF RADIO ENGINEERS, 1952, 40 (09) :1098-1101
[16]  
LAI B, 2006, LECT NOTES COMPUTER, V4319
[17]   Geometric attack resistant watermarking in wavelet transform domain [J].
Lee, CH ;
Lee, HK .
OPTICS EXPRESS, 2005, 13 (04) :1307-1321
[18]  
Masoumi Majid, 2013, AEU INT J ELECT COMM
[19]  
Miyazaki A., 2002, INT C IM PROC IEEE I, V1, P296
[20]  
Provos N., 2003, IEEE Security & Privacy, V1, P32, DOI 10.1109/MSECP.2003.1203220