SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2185
STEGANOGRAPHY BASED ON DISCRETE WAVELET TRANSFORM
Riya Saxena1, Urvashi Swami2, Abhishek Saxena3
1,2Student, Arya Institute of Engineering and Technology, Jaipur, Rajasthan, India
3Assistant Professor, Arya Institute of Engineering and Technology, Jaipur, Rajasthan, India
---------------------------------------------------------------------------***---------------------------------------------------------------------------
Abstract - In this paper, an image steganography
approach is used to enhance the visual quality of image.
Discrete Wavelet Transform (DWT) decompose the
cover image to produce wavelet subbands. DWT is
applied on both the cover image and the alpha blending
operation is done. By using Stego-image Inverse
Discrete Wavelet Transformation (IDWT) we obtained
stago image. For high security we used Arnold
transformation along with a private key.
Key Words: Steganography, Discrete wavelet transform
(DWT), Embedding process, Extraction process.
1. INTRODUCTION
Today, in modern world communication is important as
well as necessary technology. Its purpose is sharing and
transferring of data but at certain levels this technology
is not safe. Steganography was derived from the Greek
word stegano, which means covered or secret, and
graphy (writing or drawing). Earlier, there was a rapid
development of technologies leads to increase interest
in the field of hiding different information in images,
audio etc. Steganography is basically used because
valuable information is transferred from one place to
another insecurely and unreliably. The idea and
practice of hiding information has a long history. The
main focus of Steganography is on making it extremely
difficult to tell whether a secret message exists at all or
not. Steganography has failed, If an unauthorized third
party is able to say with high confidence that a file
contains a secret message. In this paper we see an
overview of image steganography and its uses and
hiding the files (text file, audio file etc.) by using AES
and LSB algorithm Steganography. Steganography is a
process of hiding a secret message in an ordinary
message and the extraction of some secret message,
whenever it is required. There are two categories of
Image steganography: spatial domain and frequency
domain steganography. In spatial domain techniques
we see that secret message is embedded in the image
pixels, while in frequency domain technique the image
is first transformed and then secret message is
embedded in the transformed image. In Frequency
domain techniques the messages is hide in significant
areas of cover image which make them more robust
than spatial domain techniques. Several different
approaches have been proposed for frequency domain
steganography using different transforms. Market et al.
[1] proposed a watermarking technique in which the
secret image is decomposed into wavelet subbands
using DWT.
Figure -1: Image Steganography System
1.1 RELATED WORK
A.Nag, S. Biswas et al. [2], Haar-DWT spatial domain of
original image was transformed to frequency domain.
Gray level and Huffman encoding process is
implemented on the secret image and cover image
using two dimension 'Discrete Wavelet Transform' (2D-
DWT) technique. For preserving the coefficients of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2186
wavelet of an image the quality can be improved using
in the low frequency sub band.
1.2 DISCRETE WAVELET TRANSFORM
Wavelet transform is used for converting the spatial
field in frequency domain. The wavelets are used in the
form of shorthand model lies in a statement. The
wavelet transform is obviously splitting the high from
the low-frequency information based on different
pixels.
The simplest method of wavelet transforms is the Haar
wavelet. Low frequency wavelet was created by taking
the transform of coefficient of the averaging of the
values of two pixel, and it can create the high frequency
by taking half difference of the similar two pixels. In
Figure (1) there are four bands approximate, Vertical,
Horizontal, and diagonal Bands that is represented as
LL, LH, HL and HH respectively. The spatial domain
image is an very important and necessary part of the
low frequency wavelet coefficients, which lies in
approximation band. We see that the spatial domain
image have the edge details of the high frequency
coefficients which Coefficients lies in other bands
known as detail bands. [3] [4].
Figure -2: Components of 1-level 2DWT
1.3 THRESHOLD OF A SUB BAND
For calculating threshold for each high frequency sub-
bands (i.e. LH, HL and HH) we use DWT technique on
cover image that is proposed by Nick Method in [3] as
(1) Where T is the threshold of a sub band, is mean of
particular sub-band, is a constant valued as -0.15 (Ni-
black W., [3]. measured it -0.2), The dimensions of sub
band and wavelet coefficient C is used. In the given
work, we consider slight lesser of than original constant
proposed by Ni-black.
1.4 IMPLEMENTATION OF IMAGE STEGANOGRAPHY
BASED ON DWT
Image steganography based on the phenomenon of
DWT.It uses two processes i.e. encoding and decoding.
In encoding, Arnold transformation is used along with a
private key on a secret image which gives high security
to the algorithm. Stego-image is obtained by using
IDWT.
In decoding, DWT is applied on both stego-image and
cover image. Alpha blending operation is then applied
and IDWT is used to get scrambled secret image.
Finally, original secret image is obtained with the help
of private key.
The discrete wavelet transform (DWT) decomposes the
image into four different bands: LL, HL, LH and HH. For
wavelet analysis, it uses filter banks.
(a) (b)
Figure -3: (a) Lena original image and (b) Lena image
after Wavelet decomposition
1.5 EXPERIMENT AND RESULTS
Here, we present the result of embedding in CVG
images data set for Image steganography which has two
categories. The first size category consists of 512× 512,
The second one is size 1024× 1024. The coefficients of
its Vertical and Diagonal subdivisions are embedding in
horizontal coefficient to embed the secret data by using
haar wavelet algorithm. In our experiment, We choose
6 images with scale of 512× 512, and specific capacity of
hiding 2040 bit per pixel, Then we study their PSNR
and MSE from the RGB perspective. Moreover we take
the same number of random images with bigger scale
(1024× 1024) but with more hidden text with 4096 bpx.
A predefined fact of analyzing and measuring the
quality of image steganographic techniques are as
follows:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2187
1. If the value of PSNR exceeds 36 dB then the visibility
of stego and cover images are the same and cannot be
identified by HVS (Human Visual System).
2. If the value of Mean Square Error (MSE) is less that
means, stego image quality is goodr and large value
denotes stego image that contains distortion.
Moreover, the value of MSE should lie between 0 and 6.
Otherwise the difference between original and stego
images will be perceptible
Fig. 4. 12 CVG images (512× 512) left side, (1024× 1024)
right side
Fig 5. Results on left side images (512× 512)
1.6 SIMULATION RESULTS AND ANALYSIS
The stego-image after embedding and recovered secret
image is shown in Figure 5 and Figure 6.Three different
wavelets are used for embedding. Results are obtained
by using MATLAB R2012a. The value of alpha is taken
as 0.01.
(a) (b) (c)
(d) (e)
Fig 6: (a) Cover image (lena.tif) (b) Secret image
(cameraman.tif) (c) Arnold transformation (d)
Stego image (e) Recovered secret image
1.7 APPLICATIONS OF STEGANO-GRAPHY
a) Secret communication does not use steganography
to advertise and therefore avoids scrutiny of the sender
side, message, and recipient. Without alerting potential
attackers a secret, blue print or other sensitive
information can be transmitted.
b) For sending out trade secrets without anyone at the
company being any the wiser. Steganography can also
be used for corporate espionage.
c)To prevent digital data, copyright protection
mechanism is used usually from being copied. To
protect the copyrighted material which is responsible
for the increasing interest in digital steganography and
data embedding, watermark technique is used.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2188
TYPES OF STEGANOGRAPHY
Fig 7: Types of steganography
1.8 THE PROPOSED METHOD
In this section, the main steps of the 'proposed work’
will be explained. The main purpose of stegnography
based on hide secret gray scale image into a cover gray
scale one. The logistic chaotic map method used to
increase security before the hiding process by the
secret image permutation, the cover image decomposed
by 'wavelet Transform (DWT)' and then embedded the
encryption ''secret image'' in HH band. The block
diagram of the embedding system shown in figure (8)
the encryption of the 'secret image' explained in above
section.
Figure 8: Block diagram of the Embedding Process
1.9 EXTRACTION PROCESS
In figure (9) block diagram for extracting the
encryption secret image shown:
Figure -9: Block Diagram of the Extraction Process
CONCLUSION
In this paper, a novel image steganography approach
based on DWT is proposed. Image steganography which
is based on DWT is done by using performance analysis
using different wavelets. This method is associated to
both colored and gray scale images. The stego- image
looks unaltered. Hence, results in better quality
image.The results show that Arnold Transform based
method has higher PSNR values than other existing
methods. In future this method can be tested by using
other wavelets and different values of alpha.
The Green channel for all 12 images has the highest
PSNR and MSE. The reason of that because all proposed
images are combined of red and blue more than the
green color, Moreover, all values based on PSNR and
MSE was satisfied in terms of the imperfectibility and
cumulative difference.
ACKNOWLEDGEMENT
The authors would like to express the deep sense of
gratitude to Arya Institute of Engineering &
Technology, Jaipur for guiding us from the inception till
the completion of the research work. We sincerely
acknowledge him/her for giving his/her valuable
guidance, support for literature survey, critical reviews
of research work.
FUTURE SCOPE
The future work on this project is to enhance the
compression ratio of the image to the text. In order to
enhance the application, we use different attractive and
useful manner website function. Further we will study
the transformation that will improve its possibility by
changing the way of transformation.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2189
REFERENCES
[1] Hsieh M. S., Tsebg D. C. and Huang Y. H., “Hiding
Digital Watermark Using Multiresolution Wavelet
Transform,” IEEE Transactions on Industrial
Electronics, vol. 48, no. 5, pp. 875-882, 2001.
[2] A.Nag, S. Biswas, D. Sarkar, P.P. Sarkar. "A Novel
Technique for Image Steganography Based on DWT and
Huffman Encoding", International Journal of Computer
Science and Security, Volume (4).
[3] Khurshid K., Siddiqi I., Faure C. and Vincent N.,
“Comparison of Niblack inspired Binarization methods
for ancient documents,” Proceedings of 16th
International Conference on Document Recognition and
Retrieval, pp. 1-9, 2009.
[4] G. O. Young, “Synthetic structure of industrial
plastics (Book style with paper title and editor),” in
Plastics, 2nd ed. vol. 3, J. Peters, Ed. New York:
McGraw-Hill, 1964, pp. 15–64.
[5] W.-K. Chen, Linear Networks and Systems (Book
style).Belmont, CA: Wadsworth, 1993, pp. 123–135.
[6] H. Poor, an Introduction to Signal Detection and
Estimation. New York: Springer-Verlag, 1985, ch. 4.
[7] B. Smith, “An approach to graphs of linear forms
(Unpublished work style),” unpublished.
[8] E. H. Miller, “A note on reflector arrays (Periodical
style—Accepted for publication),” IEEE Trans. Antennas
Propagat., to be published.
[9] J. Wang, “Fundamentals of erbium-doped fiber
amplifiers arrays (Periodical style—Submitted for
publication),” IEEE J. Quantum Electron., submitted for
publication.

More Related Content

What's hot (20)

PDF
E017443136
IOSR Journals
 
PDF
G017444651
IOSR Journals
 
PDF
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
CSCJournals
 
PDF
Vol 1 No 1 - May 2013
ijcsbi
 
PDF
IRJET- An Improved Technique for Hiding Secret Image on Colour Images usi...
IRJET Journal
 
PDF
J017426467
IOSR Journals
 
DOCX
Implementation of digital image watermarking techniques using dwt and dwt svd...
eSAT Journals
 
PDF
1674 1677
Editor IJARCET
 
PDF
50120140506015
IAEME Publication
 
PDF
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
priyanka singh
 
PDF
A comparatively study on visual cryptography
eSAT Publishing House
 
PDF
Wavelet Based Image Watermarking
IJERA Editor
 
PDF
A comparatively study on visual cryptography
eSAT Journals
 
PDF
Digital Media Steganography
IRJET Journal
 
PDF
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
ijma
 
PDF
O017429398
IOSR Journals
 
PDF
I43014752
IJERA Editor
 
PDF
A Secure Color Image Steganography in Transform Domain
ijcisjournal
 
PDF
Ceis 5
Alexander Decker
 
PDF
Analysis of Digital Image Watermarking and its Application
Associate Professor in VSB Coimbatore
 
E017443136
IOSR Journals
 
G017444651
IOSR Journals
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
CSCJournals
 
Vol 1 No 1 - May 2013
ijcsbi
 
IRJET- An Improved Technique for Hiding Secret Image on Colour Images usi...
IRJET Journal
 
J017426467
IOSR Journals
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
eSAT Journals
 
1674 1677
Editor IJARCET
 
50120140506015
IAEME Publication
 
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
priyanka singh
 
A comparatively study on visual cryptography
eSAT Publishing House
 
Wavelet Based Image Watermarking
IJERA Editor
 
A comparatively study on visual cryptography
eSAT Journals
 
Digital Media Steganography
IRJET Journal
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
ijma
 
O017429398
IOSR Journals
 
I43014752
IJERA Editor
 
A Secure Color Image Steganography in Transform Domain
ijcisjournal
 
Analysis of Digital Image Watermarking and its Application
Associate Professor in VSB Coimbatore
 

Similar to IRJET - Steganography based on Discrete Wavelet Transform (20)

PDF
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
CSCJournals
 
PDF
IRJET- Wavelet Transform based Steganography
IRJET Journal
 
PDF
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
Editor IJMTER
 
PDF
F045033440
IJERA Editor
 
PDF
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
ijcisjournal
 
PDF
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
ijcisjournal
 
PDF
ADAPTIVE CONTOURLET TRANSFORM AND WAVELET TRANSFORM BASED IMAGE STEGANOGRAPHY...
International Journal of Technical Research & Application
 
PDF
Iaetsd design of image steganography using haar dwt
Iaetsd Iaetsd
 
PDF
Cv4201644655
IJERA Editor
 
PDF
Image Steganography Using HBC and RDH Technique
Editor IJCATR
 
PDF
I017535359
IOSR Journals
 
PDF
An ideal steganographic scheme in networks using
eSAT Publishing House
 
PDF
An ideal steganographic scheme in networks using twisted payload
eSAT Journals
 
PDF
Significant Data Hiding through Discrete Wavelet Transformation Approach
Eswar Publications
 
PDF
High PSNR Based Image Steganography
rahulmonikasharma
 
PDF
Ijcatr04021016
Editor IJCATR
 
PDF
D010312230
IOSR Journals
 
PDF
Bj31416421
IJERA Editor
 
PDF
Digital image hiding algorithm for secret communication
eSAT Journals
 
PDF
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
IJRES Journal
 
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
CSCJournals
 
IRJET- Wavelet Transform based Steganography
IRJET Journal
 
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
Editor IJMTER
 
F045033440
IJERA Editor
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
ijcisjournal
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
ijcisjournal
 
ADAPTIVE CONTOURLET TRANSFORM AND WAVELET TRANSFORM BASED IMAGE STEGANOGRAPHY...
International Journal of Technical Research & Application
 
Iaetsd design of image steganography using haar dwt
Iaetsd Iaetsd
 
Cv4201644655
IJERA Editor
 
Image Steganography Using HBC and RDH Technique
Editor IJCATR
 
I017535359
IOSR Journals
 
An ideal steganographic scheme in networks using
eSAT Publishing House
 
An ideal steganographic scheme in networks using twisted payload
eSAT Journals
 
Significant Data Hiding through Discrete Wavelet Transformation Approach
Eswar Publications
 
High PSNR Based Image Steganography
rahulmonikasharma
 
Ijcatr04021016
Editor IJCATR
 
D010312230
IOSR Journals
 
Bj31416421
IJERA Editor
 
Digital image hiding algorithm for secret communication
eSAT Journals
 
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
IJRES Journal
 
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
PDF
Kiona – A Smart Society Automation Project
IRJET Journal
 
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
PDF
Breast Cancer Detection using Computer Vision
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Ad

Recently uploaded (20)

PDF
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
PPTX
Hashing Introduction , hash functions and techniques
sailajam21
 
PPTX
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
PDF
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
PPTX
Break Statement in Programming with 6 Real Examples
manojpoojary2004
 
PPTX
site survey architecture student B.arch.
sri02032006
 
PPTX
Destructive Tests corrosion engineer (1).pptx
zeidali3
 
PPTX
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
PPTX
MPMC_Module-2 xxxxxxxxxxxxxxxxxxxxx.pptx
ShivanshVaidya5
 
PPTX
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
PDF
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
PPTX
Thermal runway and thermal stability.pptx
godow93766
 
PPT
Oxygen Co2 Transport in the Lungs(Exchange og gases)
SUNDERLINSHIBUD
 
DOCX
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
PDF
monopile foundation seminar topic for civil engineering students
Ahina5
 
PPTX
Introduction to Design of Machine Elements
PradeepKumarS27
 
DOC
MRRS Strength and Durability of Concrete
CivilMythili
 
DOCX
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
PPTX
EC3551-Transmission lines Demo class .pptx
Mahalakshmiprasannag
 
PPTX
Server Side Web Development Unit 1 of Nodejs.pptx
sneha852132
 
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
Hashing Introduction , hash functions and techniques
sailajam21
 
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
Break Statement in Programming with 6 Real Examples
manojpoojary2004
 
site survey architecture student B.arch.
sri02032006
 
Destructive Tests corrosion engineer (1).pptx
zeidali3
 
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
MPMC_Module-2 xxxxxxxxxxxxxxxxxxxxx.pptx
ShivanshVaidya5
 
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
Thermal runway and thermal stability.pptx
godow93766
 
Oxygen Co2 Transport in the Lungs(Exchange og gases)
SUNDERLINSHIBUD
 
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
monopile foundation seminar topic for civil engineering students
Ahina5
 
Introduction to Design of Machine Elements
PradeepKumarS27
 
MRRS Strength and Durability of Concrete
CivilMythili
 
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
EC3551-Transmission lines Demo class .pptx
Mahalakshmiprasannag
 
Server Side Web Development Unit 1 of Nodejs.pptx
sneha852132
 

IRJET - Steganography based on Discrete Wavelet Transform

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2185 STEGANOGRAPHY BASED ON DISCRETE WAVELET TRANSFORM Riya Saxena1, Urvashi Swami2, Abhishek Saxena3 1,2Student, Arya Institute of Engineering and Technology, Jaipur, Rajasthan, India 3Assistant Professor, Arya Institute of Engineering and Technology, Jaipur, Rajasthan, India ---------------------------------------------------------------------------***--------------------------------------------------------------------------- Abstract - In this paper, an image steganography approach is used to enhance the visual quality of image. Discrete Wavelet Transform (DWT) decompose the cover image to produce wavelet subbands. DWT is applied on both the cover image and the alpha blending operation is done. By using Stego-image Inverse Discrete Wavelet Transformation (IDWT) we obtained stago image. For high security we used Arnold transformation along with a private key. Key Words: Steganography, Discrete wavelet transform (DWT), Embedding process, Extraction process. 1. INTRODUCTION Today, in modern world communication is important as well as necessary technology. Its purpose is sharing and transferring of data but at certain levels this technology is not safe. Steganography was derived from the Greek word stegano, which means covered or secret, and graphy (writing or drawing). Earlier, there was a rapid development of technologies leads to increase interest in the field of hiding different information in images, audio etc. Steganography is basically used because valuable information is transferred from one place to another insecurely and unreliably. The idea and practice of hiding information has a long history. The main focus of Steganography is on making it extremely difficult to tell whether a secret message exists at all or not. Steganography has failed, If an unauthorized third party is able to say with high confidence that a file contains a secret message. In this paper we see an overview of image steganography and its uses and hiding the files (text file, audio file etc.) by using AES and LSB algorithm Steganography. Steganography is a process of hiding a secret message in an ordinary message and the extraction of some secret message, whenever it is required. There are two categories of Image steganography: spatial domain and frequency domain steganography. In spatial domain techniques we see that secret message is embedded in the image pixels, while in frequency domain technique the image is first transformed and then secret message is embedded in the transformed image. In Frequency domain techniques the messages is hide in significant areas of cover image which make them more robust than spatial domain techniques. Several different approaches have been proposed for frequency domain steganography using different transforms. Market et al. [1] proposed a watermarking technique in which the secret image is decomposed into wavelet subbands using DWT. Figure -1: Image Steganography System 1.1 RELATED WORK A.Nag, S. Biswas et al. [2], Haar-DWT spatial domain of original image was transformed to frequency domain. Gray level and Huffman encoding process is implemented on the secret image and cover image using two dimension 'Discrete Wavelet Transform' (2D- DWT) technique. For preserving the coefficients of
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2186 wavelet of an image the quality can be improved using in the low frequency sub band. 1.2 DISCRETE WAVELET TRANSFORM Wavelet transform is used for converting the spatial field in frequency domain. The wavelets are used in the form of shorthand model lies in a statement. The wavelet transform is obviously splitting the high from the low-frequency information based on different pixels. The simplest method of wavelet transforms is the Haar wavelet. Low frequency wavelet was created by taking the transform of coefficient of the averaging of the values of two pixel, and it can create the high frequency by taking half difference of the similar two pixels. In Figure (1) there are four bands approximate, Vertical, Horizontal, and diagonal Bands that is represented as LL, LH, HL and HH respectively. The spatial domain image is an very important and necessary part of the low frequency wavelet coefficients, which lies in approximation band. We see that the spatial domain image have the edge details of the high frequency coefficients which Coefficients lies in other bands known as detail bands. [3] [4]. Figure -2: Components of 1-level 2DWT 1.3 THRESHOLD OF A SUB BAND For calculating threshold for each high frequency sub- bands (i.e. LH, HL and HH) we use DWT technique on cover image that is proposed by Nick Method in [3] as (1) Where T is the threshold of a sub band, is mean of particular sub-band, is a constant valued as -0.15 (Ni- black W., [3]. measured it -0.2), The dimensions of sub band and wavelet coefficient C is used. In the given work, we consider slight lesser of than original constant proposed by Ni-black. 1.4 IMPLEMENTATION OF IMAGE STEGANOGRAPHY BASED ON DWT Image steganography based on the phenomenon of DWT.It uses two processes i.e. encoding and decoding. In encoding, Arnold transformation is used along with a private key on a secret image which gives high security to the algorithm. Stego-image is obtained by using IDWT. In decoding, DWT is applied on both stego-image and cover image. Alpha blending operation is then applied and IDWT is used to get scrambled secret image. Finally, original secret image is obtained with the help of private key. The discrete wavelet transform (DWT) decomposes the image into four different bands: LL, HL, LH and HH. For wavelet analysis, it uses filter banks. (a) (b) Figure -3: (a) Lena original image and (b) Lena image after Wavelet decomposition 1.5 EXPERIMENT AND RESULTS Here, we present the result of embedding in CVG images data set for Image steganography which has two categories. The first size category consists of 512× 512, The second one is size 1024× 1024. The coefficients of its Vertical and Diagonal subdivisions are embedding in horizontal coefficient to embed the secret data by using haar wavelet algorithm. In our experiment, We choose 6 images with scale of 512× 512, and specific capacity of hiding 2040 bit per pixel, Then we study their PSNR and MSE from the RGB perspective. Moreover we take the same number of random images with bigger scale (1024× 1024) but with more hidden text with 4096 bpx. A predefined fact of analyzing and measuring the quality of image steganographic techniques are as follows:
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2187 1. If the value of PSNR exceeds 36 dB then the visibility of stego and cover images are the same and cannot be identified by HVS (Human Visual System). 2. If the value of Mean Square Error (MSE) is less that means, stego image quality is goodr and large value denotes stego image that contains distortion. Moreover, the value of MSE should lie between 0 and 6. Otherwise the difference between original and stego images will be perceptible Fig. 4. 12 CVG images (512× 512) left side, (1024× 1024) right side Fig 5. Results on left side images (512× 512) 1.6 SIMULATION RESULTS AND ANALYSIS The stego-image after embedding and recovered secret image is shown in Figure 5 and Figure 6.Three different wavelets are used for embedding. Results are obtained by using MATLAB R2012a. The value of alpha is taken as 0.01. (a) (b) (c) (d) (e) Fig 6: (a) Cover image (lena.tif) (b) Secret image (cameraman.tif) (c) Arnold transformation (d) Stego image (e) Recovered secret image 1.7 APPLICATIONS OF STEGANO-GRAPHY a) Secret communication does not use steganography to advertise and therefore avoids scrutiny of the sender side, message, and recipient. Without alerting potential attackers a secret, blue print or other sensitive information can be transmitted. b) For sending out trade secrets without anyone at the company being any the wiser. Steganography can also be used for corporate espionage. c)To prevent digital data, copyright protection mechanism is used usually from being copied. To protect the copyrighted material which is responsible for the increasing interest in digital steganography and data embedding, watermark technique is used.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2188 TYPES OF STEGANOGRAPHY Fig 7: Types of steganography 1.8 THE PROPOSED METHOD In this section, the main steps of the 'proposed work’ will be explained. The main purpose of stegnography based on hide secret gray scale image into a cover gray scale one. The logistic chaotic map method used to increase security before the hiding process by the secret image permutation, the cover image decomposed by 'wavelet Transform (DWT)' and then embedded the encryption ''secret image'' in HH band. The block diagram of the embedding system shown in figure (8) the encryption of the 'secret image' explained in above section. Figure 8: Block diagram of the Embedding Process 1.9 EXTRACTION PROCESS In figure (9) block diagram for extracting the encryption secret image shown: Figure -9: Block Diagram of the Extraction Process CONCLUSION In this paper, a novel image steganography approach based on DWT is proposed. Image steganography which is based on DWT is done by using performance analysis using different wavelets. This method is associated to both colored and gray scale images. The stego- image looks unaltered. Hence, results in better quality image.The results show that Arnold Transform based method has higher PSNR values than other existing methods. In future this method can be tested by using other wavelets and different values of alpha. The Green channel for all 12 images has the highest PSNR and MSE. The reason of that because all proposed images are combined of red and blue more than the green color, Moreover, all values based on PSNR and MSE was satisfied in terms of the imperfectibility and cumulative difference. ACKNOWLEDGEMENT The authors would like to express the deep sense of gratitude to Arya Institute of Engineering & Technology, Jaipur for guiding us from the inception till the completion of the research work. We sincerely acknowledge him/her for giving his/her valuable guidance, support for literature survey, critical reviews of research work. FUTURE SCOPE The future work on this project is to enhance the compression ratio of the image to the text. In order to enhance the application, we use different attractive and useful manner website function. Further we will study the transformation that will improve its possibility by changing the way of transformation.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2189 REFERENCES [1] Hsieh M. S., Tsebg D. C. and Huang Y. H., “Hiding Digital Watermark Using Multiresolution Wavelet Transform,” IEEE Transactions on Industrial Electronics, vol. 48, no. 5, pp. 875-882, 2001. [2] A.Nag, S. Biswas, D. Sarkar, P.P. Sarkar. "A Novel Technique for Image Steganography Based on DWT and Huffman Encoding", International Journal of Computer Science and Security, Volume (4). [3] Khurshid K., Siddiqi I., Faure C. and Vincent N., “Comparison of Niblack inspired Binarization methods for ancient documents,” Proceedings of 16th International Conference on Document Recognition and Retrieval, pp. 1-9, 2009. [4] G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J. Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64. [5] W.-K. Chen, Linear Networks and Systems (Book style).Belmont, CA: Wadsworth, 1993, pp. 123–135. [6] H. Poor, an Introduction to Signal Detection and Estimation. New York: Springer-Verlag, 1985, ch. 4. [7] B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished. [8] E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas Propagat., to be published. [9] J. Wang, “Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for publication),” IEEE J. Quantum Electron., submitted for publication.