Performance Evaluation of Modified Color Image Steganography Using Discrete Wavelet Transform

被引:8
作者
Kumar, Vijay [1 ]
Kumar, Dinesh [2 ]
机构
[1] Thapar Univ, Dept Comp Sci & Engn, Patiala, Punjab, India
[2] Guru Jambheshwar Univ Sci & Technol, Dept Comp Sci & Engn, Hisar, Haryana, India
关键词
Steganography; discrete wavelet transform; transform domain;
D O I
10.1515/jisys-2017-0134
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Steganography is the foremost influential approach to hide data. Images serve as the most appropriate cover media for steganography. This paper intends to do a performance evaluation of color images and its comparison with the recently proposed approaches, using the modified technique already proposed for grayscale images, by the authors. This approach hides large data in color image using the blocking concept. The blocking process is applied on approximation coefficients of secret image and detail coefficients of red, green and blue components of cover image. The blocks of detail coefficients are replaced with approximation coefficients of secret image using root mean square error method. The key is used to store the position of best matching blocks. It is being predicated that the work will be able to hide large data in a single image. The stego image (ST) has better visual quality based on the peak signal to noise ratio values.
引用
收藏
页码:749 / 758
页数:10
相关论文
共 25 条
[1]  
Abdelwahab AA, 2008, P IEEE SWARM INT S, P1
[2]  
[Anonymous], INT J COMPUTER THEOR
[3]  
[Anonymous], 2007, P IEEE COMP SOC 2007
[4]   A Novel DWT based Image Securing Method using Steganography [J].
Baby, Della ;
Thomas, Jitha ;
Augustine, Gisny ;
George, Elsa ;
Michael, Neenu Rosia .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 :612-618
[5]  
Bassil Y., 2012, INT J COMPUTER APPL, V60, P35
[6]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[7]   Digital image steganography: Survey and analysis of current methods [J].
Cheddad, Abbas ;
Condell, Joan ;
Curran, Kevin ;
Mc Kevitt, Paul .
SIGNAL PROCESSING, 2010, 90 (03) :727-752
[8]   High payload steganography mechanism using hybrid edge detector [J].
Chen, Wen-Jan ;
Chang, Chin-Chen ;
Le, T. Hoang Ngan .
EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (04) :3292-3301
[9]   A robust chaotic algorithm for digital image steganography [J].
Ghebleh, M. ;
Kanso, A. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (06) :1898-1907
[10]   MEO based secured, robust, high capacity and perceptual quality image watermarking in DWT-SVD domain [J].
Gunjal, Baisa L. ;
Mali, Suresh N. .
SPRINGERPLUS, 2015, 4 :1-16