Hybrid Steganography of Color Images Using Discrete Cosine Transform and Discrete Wavelet Transform | ||||
Menoufia Journal of Electronic Engineering Research | ||||
Article 10, Volume 27, Issue 1, January 2018, Page 175-196 | ||||
Document Type: Original Article | ||||
DOI: 10.21608/mjeer.2018.64527 | ||||
View on SCiNiTO | ||||
Authors | ||||
A.A. Eyssa1; F. E. Abd El-Samie2; A. E. Abd-Elnaiem1 | ||||
1Dept. of Electrical Engineering and Eng., Faculty of Elect., Eng., zagazig University. | ||||
2Dept. of Electronics and Electrical Communications, Faculty of Engineering, Menoufia University. | ||||
Abstract | ||||
; "> This paper introduces a hybrid approach for steganography of color images using Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). This approach is used for hiding more than one color image into an uncorrelated color space “YDbDr” of a color cover image using the DWT and DCT. In this approach, the DCT coefficients of the secret image are weighted by a small factor and then embedded into the DWT of the cover image to keep the effect of steganography invisible, to make it more security by encrypting the secret data before embedding into a cover image. After that, we show the effect of additive white Gaussian noise (AWGN) on the proposed algorithm. | ||||
References | ||||
to; -webkit-text-stroke-width: 0px; ">[1] A. Cheddad, J. Condell, Kevin Curran, P. McKevitt.” Digital image steganography: Survey and analysis of current methods”, science direct, Volume 90, Issue 3, March 2010, Pages 727–752. [2] M. N. Islam, M. F. Islam, K. Shahrabi, “Robust information security system using steganography, orthogonal code and joint transform correlation” , Optik - International Journal for Light and Electron Optics, Volume 126, Issue 23, December 2015, Pages 4026-4031. [3] S. Pereira, T. Pun,” Robust template matching for affine resistant image watermarks”, IEEE Transactions on Image Processing ( Volume: 9, Issue: 6, Jun 2000). [4] SudipGhosh, Sayandip De, Santi Prasad Maity, HafizurRahaman,” A novel dual purpose spatial domain algorithm for digital image watermarking and cryptography using Extended Hamming Code”, Electrical Information and Communication Technology (EICT), 2015 2nd International Conference on, 28 January 2016 [5] Shruti C. Dande , Sushma S. Agrawal , Sunil R. Hirekhan ,“Implementation of colour image steganography using LSB and edge detection technique: A LabVIEW approach”, Communication and Signal Processing (ICCSP), 2016 International Conference on, Date Added to IEEE Xplore: 24 November 2016. [6] P. Malathi, T. Gireeshkumar ,”Relating the Embedding Efficiency of LSB Steganography Techniques in Spatial and Transform Domains”, Proceedings of the 6th International Conference on Advances in Computing and Communications , Volume 93, 2016, Pages 878–885 [7] O. J.Sandoval; M. C.Hernandez; M. N.Miyatake; H. P.Meana; K. Toscano,”MedinaImage-adaptive steganalysis for LSB Matching steganography “, 2016 39th International Conference on Telecommunications and Signal Processing (TSP) ,Pages: 478 – 483 . [8] Cryptography and Coding: 12th IMA International Conference, IMACC 2009 [9] H.N. Latha, M.V. Palachandra, M. Rao ,” Real Time Implementation and Performance Evaluation of WCDMA System over AWGN Channel on TMS320C6713DSK”,Original Research Article Procedia Technology, Volume 4, 2012, Pages 82-86 st: auto; -webkit-text-stroke-width: 0[10] K. S. Seethalakshmi , Usha B A , Sangeetha K N ,” Security enhancement in image steganography using neural networks and visual cryptography”, 2016 International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS) , IEEE Conference Publications,Year: 2016 ,Pages: 396 - 403 [11] S. Lahiri; P. Paul; S. Banerjee; S. Mitra; A. Mukhopadhyay; M. Gangopadhyaya ,” Image steganography on coloured images using edge based Data Hiding in DCT domain” , 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) ,Year: 2016 , Pages: 1 - 8, DOI: 10.1109/IEMCON.2016.7746270 ,IEEE Conference Publications [12] K. Muhammad, M. Sajjad, I. Mehmood, S.Rho, S. W. Baik ,” Image steganography using uncorrelated color space and its application for security of visual contents in online social networks” , Future Generation Computer Systems, In Press, Corrected Proof, Available online 27 November 2016. [13] Sahar A. El_Rahman , “ A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information” , Computers and Electrical Engineering ,Available online 19 September 2016. [14] H. Dadgostar, F. Afsari “Image steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSB” , Journal of Information Security and Applications, Volume 30, October 2016, Pages 94-104 [15] SirajSidhik, S.K. Sudheer, V.P. MahadhevanPillai ,” Performance and analysis of high capacity Steganography of color images involving Wavelet Transform”, Optik - International Journal for Light and Electron Optics, Volume 126, Issue 23, December 2015, Pages 3755-3760 [16] D. Baby, J. Thomas, G. Augustine, E. George, N. R. Michael,” A Novel DWT based Image Securing Method using Steganography”, International Conference on Information and Communication Technologies (ICICT 2014), ( 2015 ). [17] Rachit Jain, J. B. Sharma,” Symmetric color image encryption algorithm using fractional DRPM and chaotic baker map “,Recent Trends in Electronics, Information & Communication Technology (RTEICT), IEEE International Conference on, 09 January 2017 [18] A. Mehto, N. MehraAdaptive,” Lossless Medical Image Watermarking Algorithm Based on DCT & DWT” ,Procedia Computer Science, Volume 78, 2016, Pages 88-94 [19] E. H. Houssein, M. A. S. Ali and A. E. Hassanien, "An image steganography algorithm using Haar Discrete Wavelet Transform with Advanced Encryption System," /2016 Federated Conference on Computer [20] AkankshaKaushal, VineetaChaudhary,” Secured Image Steganography using Different Transform Domain”,International Journal of Computer Applications (0975 – 8887) Volume 77– No.2, September 2013. e-width: 0px; "> [21] K. RamamohanRao،P. Yip ,” Discrete Cosine Transform: Algorithms, Advantages, Applications”COPY RIGHT ©1990 by ACADMIC PRESS ,INC. [22] B. G. Banik and S. K. Bandyopadhyay, "Implementation of image steganography algorithm using scrambled image and quantization coefficient modification in DCT," 2015 IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), Kolkata, 2015, pp. 400-405. [23] M. R. Asif; Qi Chun; S. Hussain; M. S. FareedMultiple, “ licence plate detection for Chinese vehicles in dense traffic scenarios”, IET Intelligent Transport Systems ,IET Journals &Magazines,Year: 2016, Volume: 10, Issue: 8 ,Pages: 535 - 544, DOI: 10.1049/iet-its.2016.0008. [24] Z. Wang, A.C. Bovik, H.R. Sheik, E.P. Simoncell, “Image quality assessment from error visibility to structural similarity”, IEEE Trans. Image Process. 13 (4) (2004April) 600–612. | ||||
Statistics Article View: 225 |
||||