Short Paper Proc. of Int. Colloquiums on Computer Electronics Electrical Mechanical and Civil 2011
Performance Analysis of DWT and IWT on Non LSB Steganography H S Manjunatha Reddy1, Khasim T2, K B Raja2, 1
Global Academy of Technology/Department of ECE, Bangalore, India manjunathareddyhs@rediffmail.com 2 University Visvesvaraya College of Engineering/Department of ECE, Bangalore University, Bangalore, India, raja_kb@yahoo.com after a suitable transform domain leads to spatial domain and frequency domain steganography.
Abstract- Steganography is the art and science of writing hidden information for secure Communication. In this paper we propose Performance Analysis of DWT and IWT on Non LSB Steganography (PADIS). The cover image is segmented into 4*4 cells and DWT/IWT is applied on each cell. The 2*2 cell of HH band of DWT/IWT are considered and manipulated with payload bit pairs using identity matrix to generate stego image. The key is used to extract payload bit pairs at the destination. It is observed that the PSNR values are better in the case of IWT compare to DWT for all image formats. The PSNR values are high in the case of raw images compared to formatted images.
II. RELATED WORKS A J Mozo et al., [4] proposed Video Steganography using Flash Video. The software implementation in the field of video steganography is presented. A C++ program was implemented which could embed any type of the data in the Flash Video and could extract the same hidden data. Neha agarwal and Marios Savvides [5] proposed biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image using steganography, Encryption and Matching. Hiding biometric data in DCT coefficients of cover image which can be exploited for hiding any kind of information image and biometric data like fingerprints and iris codes. MinWen Chao et al., [6] proposed A High capacity 3D Steganography algorithm. The scheme is based on a novel multilayered embedding scheme to hide secret messages in the vertices of 3D polygon models. Mamta Juneja and Parvinder Singh Sandhu [7] proposed a Robust Image Steganography Technique based on LSB insertion and encryption. Wu Ling and Wang Li-Na [8] proposed a Steganography algorithm based on Cyclic Redundancy Check (CRC). This method does not require matrix multiplication hence embedding/extracting codes perform better than matrices embedding schemes. Shiva Kumar et al., [9] proposed Cover Image Modulation Approach to Steganography in which cover image is segmented into 2*2 matrices and adjacent pixel intensity differences are computed to the threshold value to consider matrix for payload embedding.
Index Terms- Steganography, Cover Image, Payload, Stego image, DWT, IWT
I. INTRODUCTION The use of modern communication demands security in computer networks because of an increased use of internet. The confidentiality and integrity of the data being transferred is to be protected against hackers. Security of information is one of the most important factors of information technology and communication. The steganography is a technique of hiding the secret messages in some medium such as text files, images, audio file, video files etc, so that it cannot be detected and doesn’t have any suspicion about the transmission of hidden or secret information. The word steganography [1] is derived from the Greek word steganos which means covered and graphy means writing. Steganography [2] is a method of hiding data in the Least Significant Bits (LSB) of a cover file. The steganography technique has to satisfy three requirements viz., (i) Capability is the amount of payload embedded into the cover image. (ii) Imperceptibility is the stego image must be similar to the cover image. (iii) Security is the hidden payload in the cover image should not be disturbed by the noise in the communication channel and also not to reveal to hackers. There must be tradeoff between three parameters to have better steganographic technique. Choosing the hiding medium as the criteria, the steganographic techniques [3] are classified as (i) Text- or linguistic based Steganography uses written natural language to conceal secret information. (ii) Audio Steganography embeds the message into a cover audio file as noise at a frequency out of human hearing range by LSB manipulation, phase coding and echo hiding. (iii) Image Steganography hide the secret message in the images which is nearly impossible to differentiate by human eyes. Based on the data hidden in the pixels directly or in the coefficients obtained Š 2011 ACEEE DOI: 02.CEMC.2011.01. 590
III. PROBLEM STATEMENT The payload is embedded into the cover image using nonLSB technique. Cover Image is segmented and DWT/IWT is applied to generate 2*2 cells. The payload bit pairs are manipulated with 2*2 cells of DWT/IWT to generate stego object. IV. PROPOSED MODEL In this section definitions of evaluation parameters and proposed embedding and retrieval system are described. A. Evaluation Parameters (i) Mean Square Error (MSE): It is defined as the square of error between cover image and stego image. The distortion 42