Cover selection technique for secure transform domain image steganography

被引:0
作者
Mansi S. Subhedar
机构
[1] TC Engineering, Pillai HOC College of Engineering and Technology, Dist. Raigad, Maharashtra, Rasayani
关键词
Cover selection; Double density dual tree wavelet transform; Image steganography; LU decomposition; Statistical texture analysis; Steganalysis;
D O I
10.1007/s42044-020-00077-9
中图分类号
学科分类号
摘要
In image steganography, an appropriate cover selection offers the least detectable stego image thereby assuring the security of covert communication. In this paper, a new framework is proposed for the optimal choice of cover from the image database based on statistical texture analysis. Texture analysis using a gray level co-occurrence matrix (GLCM) and run-length matrix (RLM) helps to identify the heterogeneity of images. Textural features were extracted and a non-linear support vector machine was employed to classify a suitable cover from image database. This can further be used as a host image to carry the secret message for the image steganography scheme. To justify the validity of the proposed cover selection technique, image steganography algorithm based on double density dual tree DWT (DDDTDWT) and LU decomposition is also proposed in this work. Performance measures like imperceptibility, robustness, and steganalyser’s inability to detect the stego image were employed to check validity of the proposed schemes. Better imperceptibility, strong robustness to stego attacks, and poor detection accuracy by steganalyser confirms the efficacy of proposed cover selection and transform domain image steganography techniques. © The Author(s), under exclusive licence to Springer Nature Switzerland AG part of Springer Nature 2021.
引用
收藏
页码:241 / 252
页数:11
相关论文
共 34 条
[1]  
Li B., He J., Huang J., Shi Y.Q., A survey on image steganography and steganalysis, Int. J. Inf. Hiding Multimed. Signal Process, 2, pp. 142-172, (2011)
[2]  
Subhedar M.S., Mankar V.H., Current status and key issues in image steganography: A survey, Comput. Sci. Rev, 13-14, pp. 95-113, (2014)
[3]  
Ogiela M.R., Koptyra K., False and multi-secret steganography in digital images, Soft. Comput, 19, 11, pp. 3331-3339, (2015)
[4]  
Shirafkan M.H., Akhtarkavan E., Vahidi J., A image steganography scheme based on discrete wavelet transform using lattice vector quantization and reed Solomon encoding, 2 Nd International Conference on Knowledge Based Engineering and Innovation, (2015)
[5]  
Gulve A.K., Joshi M.S., An Image Steganography Method Hiding Secret Data into Coefficients of Integer Wavelet Transform Using Pixel Value Differencing Approach, In: Hindawi Mathematical Problems in Engineering Volume 2015, Article ID 684824
[6]  
Rabie T., Kamel, (2016)
[7]  
Pramanik S., Singh R.P., Ghosh R., Application of bi-orthogonal wavelet transform and genetic algorithm in image steganography, Multimedia Tools and Applications
[8]  
Ayub N., Selwal A., An improved image steganography technique using edge based data hiding in DCT domain, J. Interdiscip. Math, 23, 2, pp. 357-366, (2020)
[9]  
Jamel E.M., Secure Image Steganography Using Biorthogonal Wavelet Transform, J. Eng. Appl. Sci, 14, pp. 9396-9404, (2019)
[10]  
Subhedar M.S., Mankar V.H., Performance Evaluation of Image Steganography Based on Cover Selection and Contourlet Transform, International Conference on Cloud & Ubiquitous Computing & Emerging Technologies (CUBE), (2013)