DWT Difference Modulation Based Novel Steganographic Algorithm

被引:5
作者
Mukherjee, Imon [1 ]
Datta, Biswajita [1 ]
Banerjee, Reeturaj [2 ]
Das, Srijan [3 ]
机构
[1] St Thomas Coll Engn & Technol, Dept Comp Sci & Engn, Kolkata 700023, India
[2] TA Pai Management Inst, Manipal 576104, India
[3] Natl Inst Technol, Dept Comp Sci & Engn, Rourkela 769008, India
来源
INFORMATION SYSTEMS SECURITY, (ICISS 2015) | 2015年 / 9478卷
关键词
Data hiding; Discrete wavelet transformation; Frequency domain; Seed matrix; Steganography;
D O I
10.1007/978-3-319-26961-0_36
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Data security means protecting data, such as a database, file, from destructive forces and the unwanted actions of unauthorized users. Since the use of internet is getting popular day by day, data security for efficient and reliable communication has become an important issue. This is the first step towards the introduction of modern day cryptography, steganography and watermarking. Discrete Wavelet Transform Difference Modulation (DWTDM) can be used to embed data by adjusting the pixel values and thus the data can be hidden and the human eye will not be able to notice the hidden text in the cover image. This paper explains the DWTDM with some modified strategies in order to minimize the distortion of the stego image from the cover image. We also show that our work withstand the statistical attacks as well as the benchmark like stirmark.
引用
收藏
页码:573 / 582
页数:10
相关论文
共 13 条
[1]  
Bhattacharyya S., 2012, International Journal of Computer Network and Information Security, V4, P27, DOI [DOI 10.5815/IJCNIS.2012.07.04, DOI 10.5815/IJCNIS2012.07.04]
[2]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[3]  
Chen P.Y., 2006, INT J APPL SCI ENG, V4, P275, DOI DOI 10.6703/IJASE/2006.4(3).275
[4]   AN INTRODUCTION TO THE ISING-MODEL [J].
CIPRA, BA .
AMERICAN MATHEMATICAL MONTHLY, 1987, 94 (10) :937-959
[5]  
Mahjabin T, 2012, INT CONF COMPUT INFO, P168, DOI 10.1109/ICCITechn.2012.6509770
[6]  
Masud Karim S. M., 2011, 2011 14th International Conference on Computer and Information Technology (ICCIT), P286, DOI 10.1109/ICCITechn.2011.6164800
[7]  
Paul G., 2012, INT C INF SYST SEC, P134, DOI 10.1007/978-3-642-35130-3_10
[8]  
Reddy V. Lokeswara, 2011, International Journal of Advanced Networking and Applications, V2, P868
[9]  
Verma Avushi, 2013, INT J COMPUT SCI BUS, V1
[10]  
[No title captured]