Skip to main content

Comprehensive Data Hiding Technique for Discrete Wavelet Transform-Based Image Steganography Using Advance Encryption Standard

  • Conference paper
  • First Online:
Computing and Network Sustainability

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 12))

Abstract

The steganography is the discipline of trouncing data into innocuous media in a manner that reality of the hidden data remains invisible to an antagonist. Varieties of methods have been developed over time in the area of image steganography. Robust steganography technique increases data protection from an adversary even if an attacker clutches the knowledge about the embedding process. Modern information security system combines both cryptography and steganography techniques. This paper proposes an image steganography method, at the initial stage secret image is encrypted using advance encryption standard (AES) and afterwards hide the results of AES into the picture (i.e. cover media or cover image) with the assistance of Haar Discrete Wavelet Transform and alpha blending. These efforts ensure that the proposed data hiding mechanism gives higher imperceptibility and trustworthiness which is the essential requirements of any steganography technique. All practical implementation perform on MATLAB.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Marvel Lisa M, Boncelet Charles G, Retter Charles T (1999) Spread Spectrum Image Steganography. IEEE Trans Image Process 8:1075–1108

    Article  Google Scholar 

  2. Prabakaran G, Bhavani R (2012) A modified secure digital image steganography based on discrete wavelet transform. In: International conference on computing, electronics and electrical technologies. pp 1096–1100

    Google Scholar 

  3. Bassham L (2000) Efficiency testing of ANSI C implementations of round 2 candidate algorithms for the advanced encryption standard. In: The Third AES candidate conference, by the National Institute of Standards and Technology Gaithersburg. 136–148

    Google Scholar 

  4. Manoharan S (2008) An empirical analysis of RS steganalysis. In: The third international conference on internet monitoring and protection. IEEE, pp 172–177

    Google Scholar 

  5. Foster, Wang S, Yang B, Niu X (2010) A secure steganography method based on genetic algorithm. J Inf Hiding Multimed Signal Process. 1:2073-4212

    Google Scholar 

  6. Pratap R (2013) Getting started with MATLAB. Oxford University Press

    Google Scholar 

  7. Sau K, Basak RK, Chanda A (2013) Image compression based on block truncation coding using Clifford Algebra. In: International conference on computational intelligence: modeling techniques and applications (CIMTA). pp 699–706

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vijay Kumar Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Sharma, V.K., Srivastava, D.K. (2017). Comprehensive Data Hiding Technique for Discrete Wavelet Transform-Based Image Steganography Using Advance Encryption Standard. In: Vishwakarma, H., Akashe, S. (eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems, vol 12. Springer, Singapore. https://doi.org/10.1007/978-981-10-3935-5_36

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3935-5_36

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3934-8

  • Online ISBN: 978-981-10-3935-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics