Abstract
The steganography is the discipline of trouncing data into innocuous media in a manner that reality of the hidden data remains invisible to an antagonist. Varieties of methods have been developed over time in the area of image steganography. Robust steganography technique increases data protection from an adversary even if an attacker clutches the knowledge about the embedding process. Modern information security system combines both cryptography and steganography techniques. This paper proposes an image steganography method, at the initial stage secret image is encrypted using advance encryption standard (AES) and afterwards hide the results of AES into the picture (i.e. cover media or cover image) with the assistance of Haar Discrete Wavelet Transform and alpha blending. These efforts ensure that the proposed data hiding mechanism gives higher imperceptibility and trustworthiness which is the essential requirements of any steganography technique. All practical implementation perform on MATLAB.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Marvel Lisa M, Boncelet Charles G, Retter Charles T (1999) Spread Spectrum Image Steganography. IEEE Trans Image Process 8:1075–1108
Prabakaran G, Bhavani R (2012) A modified secure digital image steganography based on discrete wavelet transform. In: International conference on computing, electronics and electrical technologies. pp 1096–1100
Bassham L (2000) Efficiency testing of ANSI C implementations of round 2 candidate algorithms for the advanced encryption standard. In: The Third AES candidate conference, by the National Institute of Standards and Technology Gaithersburg. 136–148
Manoharan S (2008) An empirical analysis of RS steganalysis. In: The third international conference on internet monitoring and protection. IEEE, pp 172–177
Foster, Wang S, Yang B, Niu X (2010) A secure steganography method based on genetic algorithm. J Inf Hiding Multimed Signal Process. 1:2073-4212
Pratap R (2013) Getting started with MATLAB. Oxford University Press
Sau K, Basak RK, Chanda A (2013) Image compression based on block truncation coding using Clifford Algebra. In: International conference on computational intelligence: modeling techniques and applications (CIMTA). pp 699–706
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharma, V.K., Srivastava, D.K. (2017). Comprehensive Data Hiding Technique for Discrete Wavelet Transform-Based Image Steganography Using Advance Encryption Standard. In: Vishwakarma, H., Akashe, S. (eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems, vol 12. Springer, Singapore. https://doi.org/10.1007/978-981-10-3935-5_36
Download citation
DOI: https://doi.org/10.1007/978-981-10-3935-5_36
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3934-8
Online ISBN: 978-981-10-3935-5
eBook Packages: EngineeringEngineering (R0)