Data Hiding Approach Based on Stationary Wavelet Transform

被引:0
作者
Suresh, G. [1 ]
Parthasarathi, K. A. [2 ]
机构
[1] St Peters Univ, Madras, Tamil Nadu, India
[2] Aksheyaa Coll Engn, Madras, Tamil Nadu, India
来源
SECOND INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET 2014) | 2014年
关键词
Encryption; Decryption; Stream Cipher Algorithm; Stationary Wavelet Transform; Data hiding key;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Data hiding is a tremendous and fast growing multidisciplinary field, which conceals the existence of secret data. Security and the privacy of the data over internet and communication technique is a prime concern among content owner. To avoid the unauthorized access of data over communication, a novel and reliable data hiding technique is proposed in this study based on powerful standard stream cipher algorithm and Stationary Wavelet Transform (SWT). At first, the original image is decomposed by SWT and four sub bands are obtained. The obtained sub bands are encrypted by using encryption key, which is generated by stream cipher algorithm. After that the secret data is embedded with encrypted sub-bands by using data hiding key and transmits over transmitter one by one. The secret sub-band is retrieved at the receiver side by using appropriate data hiding key otherwise receiver couldn't access the secret sub-band. Similarly, the original image content is retrieved by appropriate decryption key along with SWT reconstruction.
引用
收藏
页码:384 / 387
页数:4
相关论文
共 11 条
  • [1] Agham V, 2014, PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), P771, DOI 10.1109/ICICICT.2014.6781378
  • [2] Arai K., 2012, Proceedings of the 2012 Ninth International Conference on Information Technology: New Generations (ITNG), P618, DOI 10.1109/ITNG.2012.163
  • [3] Bender W., 1996, IBM SYST J, V35, DOI DOI 10.1147/SJ.353.0313
  • [4] Jose Rintu, INT C MICR COMM REN
  • [5] A reversible data hiding scheme based on block division
    Kuo, Wen-Chung
    Jiang, Dong-Jin
    Huang, Yu-Chih
    [J]. CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2008, : 365 - 369
  • [6] Lee J.H., 2008, OPTICAL ENG, V47
  • [7] LSB matching revisited
    Mielikainen, J
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2006, 13 (05) : 285 - 287
  • [8] Sirsikar Sumedha, 2014, 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies (ICESC), P134, DOI 10.1109/ICESC.2014.28
  • [9] Suresh V., 2013, Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME), P164, DOI 10.1109/ICPRIME.2013.6496466
  • [10] VQ Applications in Steganographic Data Hiding Upon Multimedia Images
    Wang, Wei-Jen
    Huang, Cheng-Ta
    Wang, Shiuh-Jeng
    [J]. IEEE SYSTEMS JOURNAL, 2011, 5 (04): : 528 - 537