Advertisement

Highly Secure DWT Steganography Scheme for Encrypted Data Hiding

  • Vijay Kumar SharmaEmail author
  • Pratistha Mathur
  • Devesh Kumar Srivastava
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 106)

Abstract

Steganography is an application for concealed writing. Nowadays, development in the field of electronic media demands highly secure data transfer between computers over the globe. There is a pressing demand to send the secret information in the hidden form. Conceal writing is an ultimate feature of steganography which fulfills this demand. In general; a robust steganography scheme should have better visual imperceptibility of the hidden information with sufficient payload. In this paper, a steganography method based on cryptography is proposed. The proposed scheme uses two processes; first, encrypt the secret plaintext (PT) message followed by secret image generation from this encrypted message. Second, hide this secret image into the cover image using Daubechies discrete wavelet transform operation followed by mixing operation. After performing the Daubechies inverse discrete wavelet transform (IDWT) process, we get the stego image. Stego image visual quality is increased by using Daubechies wavelet. The effectiveness of the proposed scheme is shown by experimental results.

Keywords

Wavelet transforms Steganography Cryptography Steganalysis 

References

  1. 1.
    Feng, B., Wei, L., Sun, W.: Secure binary image steganography based on minimizing the distortion on the texture. IEEE Trans. Inf. Forensics Secur. 10(2), 243–255 (2015)CrossRefGoogle Scholar
  2. 2.
    Sharma, V.K., Srivastava, D.K., Mathur, P.: A study of steganography based data hiding techniques. Int. J. Emerg. Res. Manag. Technol. 145–150 (2017)Google Scholar
  3. 3.
    Shejul, A.A., Kulkarni, U.L.: A DWT based approach for steganography using biometrics. In: IEEE International Conference on Data Storage and Data Engineering, pp. 39–43, Feb 2010Google Scholar
  4. 4.
    Swain, G., Lenka, S.K.: Steganography using the twelve square substitution cipher and an index variable. In: 2011 3rd IEEE International Conference on Electronics Computer Technology (ICECT), pp. 84–88 (2011)Google Scholar
  5. 5.
    Sharma, V.K., Srivastava, D.K.: Comprehensive data hiding technique for discrete wavelet transform-based image steganography using advance encryption standard. In: Computing and Network Sustainability, pp. 353–360. Springer (2017)Google Scholar
  6. 6.
    Shrestha, A., Timalsina, A.: Color image steganography technique using Daubechies discrete wavelet transform. In: 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA), pp. 9–15 (2015)Google Scholar
  7. 7.
    Prabakaran. G., Bhavani, R.: A modified secure digital image steganography based on discrete wavelet transform. In: International Conference on Computing, Electronics and Electrical Technologies, pp. 1096–1100, March 2012Google Scholar
  8. 8.
    Archana. S., Antony Judice, A., Kaliyamurthie, K.P.: A novel approach on image steganographic methods for optimum hiding capacity. Int. J. Eng. Comput. Sci. 2, 378–385 (2013)Google Scholar
  9. 9.
    Khalili, M., Asatryan, D.: Colour spaces effects on improved discrete wavelet transform-based digital image watermarking using Arnold transform map. IET Signal Proc. 7, 177–187 (2013)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Wang, R.-Z., Chen, Y.-S.: High payload image steganography using two-way block matching. IEEE Signal Process. Lett. 13(3), 161–164 (2006)CrossRefGoogle Scholar
  11. 11.
    Sehgal, P., Sharma, V.K.: Eliminating cover image requirement in discrete wavelet transform based digital image steganography. Int. J. Comput. Appl. 68(3), 37–42 (2013)Google Scholar
  12. 12.
    Moreno, J., Jaime, B., Saucedo, S.: Towards no-reference of peak signal to noise ratio. Int. J. Adv. Comput. Sci. Appl. 4(1), 123–130 (2013)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Vijay Kumar Sharma
    • 1
    Email author
  • Pratistha Mathur
    • 1
  • Devesh Kumar Srivastava
    • 1
  1. 1.SCIT, Manipal University JaipurJaipurIndia

Personalised recommendations