ArticlePDF Available

An Image Steganography Method Hiding Secret Data into Coefficients of Integer Wavelet Transform Using Pixel Value Differencing Approach

Authors:
  • Government College of Engineering, Aurangabad

Abstract and Figures

The image steganography systems use either the spatial domain or the frequency domain to hide the secret information. The proposed technique uses spatial domain technique to hide secret information in the frequency domain. The cover image is transformed using integer wavelet transform to obtain four subbands: LL, LH, HL, and HH. Then, the PVD approach is used to hide the secret information in the wavelet coefficients of all the four subbands. For improving the security of the hidden information, the proposed method first modifies the difference between two wavelet coefficients of a pair and then uses the modified difference to hide the information. This makes extraction of secret data from the stego image difficult even if the steganography method fails. The result shows that the proposed technique outperforms other PVD based techniques in terms of security of secret information and hiding capacity of cover image.
This content is subject to copyright. Terms and conditions apply.
Research Article
An Image Steganography Method Hiding Secret
Data into Coefficients of Integer Wavelet Transform
Using Pixel Value Differencing Approach
Avinash K. Gulve1and Madhuri S. Joshi2
1Government College of Engineering, Aurangabad, Maharashtra 431 005, India
2Jawaharlal Nehru College of Engineering, Aurangabad, Maharashtra 431 005, India
Correspondence should be addressed to Avinash K. Gulve; akgulve@geca.ac.in
Received  November ; Accepted  December 
Academic Editor: Gen Qi Xu
Copyright ©  A. K. Gulve and M. S. Joshi. is is an open access article distributed under the Creative Commons Attribution
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly
cited.
e image steganography systems use either the spatial domain or the frequency domain to hide the secret information. e
proposed technique uses spatial domain technique to hide secret information in the frequency domain. e cover image is
transformed using integer wavelet transform to obtain four subbands: LL, LH, HL, and HH. en, the PVD approach is used to hide
the secret information in the wavelet coecients of all the four subbands. For improving the security of the hidden information,
the proposed method rst modies the dierence between two wavelet coecients of a pair and then uses the modied dierence
to hide the information. is makes extraction of secret data from the stego image dicult even if the steganography method fails.
e result shows that the proposed technique outperforms other PVD based techniques in terms of security of secret information
and hiding capacity of cover image.
1. Introduction
Now a day, it is easy to share the information which is in
the form of text, image, audio, or video using the Internet
as the communication channel. Since Internet is an open
channelofcommunication,thereisalwaysathreatofstealing
the information. erefore, it is becoming more important
toadoptsecuritymeasuressothattheinformationcanbe
protected from being stolen by malicious user. e security
measures include cryptography, steganography, and coding.
Steganography involves hiding secret information in a multi-
media object such as image, audio, or video in such a way that
its existence in these documents cannot be noticed. Digital
images are preferred for hiding the secret information. It is
relatively easy to place information in digital images because
of the availability of sucient redundant area where valuable
information could be placed in an imperceptive way. It is
possible to use images, either in the spatial domain or in the
frequency domain, to hide secret information. In the spatial
domain, the pixel values are used for hiding the secret
information and, in the frequency domain, the wavelet
coecients are used for hiding the secret information.
e organization of the paper is as follows. A review of
necessary background of IWT and PVD based steganography
is presented in this section. In Section ,theproposed
method is discussed. In Section , the results are discussed
while the paper is concluded in Section .
In the PVD method, as suggested by Wu et al. [,], a
gray-valued cover image is partitioned into nonoverlapping
blocks composed with two consecutive pixels, 𝑖and 𝑖+1.For
each block, dierence value 𝑖is calculated by subtracting
𝑖from 𝑖+1. Since the pixel value ranges from  to , the
dierence value also ranges from  to . erefore, |𝑖|
ranges from  to . e block is in smooth area if the
dierence value |𝑖|is small; otherwise, it is in sharply edged
area. A range table is designed with contiguous ranges (𝑘
where =1,2,3,...,)andthetablerangeisfromto.
e lower and upper boundaries of 𝑘are denoted by 𝑘and
𝑘,respectively.Hence,𝑘∈[𝑘,𝑘].ewidth𝑘of 𝑘is
calculated as 𝑘=𝑘−𝑘+.iswidth𝑘is used to estimate
Hindawi Publishing Corporation
Mathematical Problems in Engineering
Volume 2015, Article ID 684824, 11 pages
http://dx.doi.org/10.1155/2015/684824
Mathematical Problems in Engineering
thenumberofbits𝑖(where 𝑖=log2𝑘)ofsecretmessage
that can be hidden using the dierence of two consecutive
pixels. Aer hiding 𝑖bits using the dierence 𝑖,newvalues
are assigned to 𝑖and 𝑖+1.enewdierence󸀠
𝑖is calculated
by subtracting 𝑖from 𝑖+1.enewdierence󸀠
𝑖stands for
the secret data hidden in the pair. During extraction, the stego
image is partitioned into nonoverlapping blocks composed
with two consecutive pixels, 𝑖and 𝑖+1.en,thedierence
value 󸀠
𝑖foreachpairoftwoconsecutivepixels𝑖and 𝑖+1 is
calculated. Next, |󸀠
𝑖|is used to locate the suitable range 𝑘.
e decimal equivalent of the secret information hidden in
the block is given by |󸀠
𝑖|−𝑘which is then transformed into
abinarysequencewith𝑖bits.
In order to improve the capacity of hiding secret data
and to provide an imperceptible stego image quality, a novel
steganographic method based on least-signicant-bit (LSB)
replacement and pixel-value dierencing (PVD) method is
presented by Wu et al. []. e range table is divided into
lower level (smooth area) and higher level (edged area). In
the smooth area,  bits of the secret data is hidden by LSB
method while, in the higher level, secret data is hidden using
the PVD method.
To improve the hiding capacity of the cover image and
quality of the stego image, another enhanced method is
introduced based on the PVD method by Chang et al. [,,].
In this method, data is hidden in vertical and diagonal edges
along with the horizontal edges. e cover image is divided
into the blocks of  × pixels. Considering and to be the
pixel locations, each  × block includes four pixels (𝑥,𝑦),
(𝑥+1,𝑦),(𝑥,𝑦+1),and(𝑥+1,𝑦+1).Pixel(𝑥,𝑦) is grouped with
the remaining three pixels in the block to form three pixel
pairs. ese three pairs are named 0,1,and2where
0=(
(𝑥,𝑦),(𝑥+1,𝑦)),1=(
(𝑥,𝑦),(𝑥,𝑦+1)),and2=
((𝑥,𝑦),(𝑥+1,𝑦+1)), respectively. Aer embedding the secret
information in each pair using PVD approach, values of two
pixels in each pair get modied. us, the original dierence
value 𝑖is modied to a new dierence value 󸀠
𝑖.enew
pixel values in each pair are dierent from their original ones.
at is, three dierent values are obtained for the pixel (𝑥,𝑦).
However, pixel (𝑥,𝑦) can have only one value. erefore,
one of the 󸀠
𝑖is selected as the reference pair to oset the
remaining two pixel values. at is, two pixel values of the
reference pair are used to adjust the pixel values of other
two pairs and construct a new  × block. e embedded
secret data is unaected because new dierence values, 󸀠
𝑖,
are unaltered. During extraction, the dierence value 󸀠
𝑖is
used to extract the hidden information. |󸀠
𝑖|is used to locate
the suitable range 𝑘. e decimal equivalent of the secret
information hidden in the pair is given by |󸀠
𝑖|−𝑘which is
then transformed into a binary sequence with 𝑖bits.
Gulve and Joshi []haveproposedasteganography
method to improve the security of the secret information
using ve-pixel pair dierencing approach. e cover image is
partitioned into blocks of  ×pixelstoformvepixelpairs.
e secret data is embedded in the pairs using the dierence
value of pixels in that pair. Instead of hiding bits in the
pair using the dierence value, bits ≤are hidden in the
pair where is the average of bits that can be hidden in each
pairoftheblock.us,incaseoffailureofthesteganography
system, it becomes dicult to estimate exact number of bits
hidden in each pair of the block. Another level of security
for the secret information is introduced by converting the
secret information in its gray code form. For each pair in the
block, the method converts bits of secret information in the
gray code form and then embeds these bits in that pair. us,
the security of the secret information is improved without
involving the overhead of encryption and decryption. Gulve
and Joshi [] have proposed a steganography method to
improve the security of the secret data embedded in the
image. e cover image is divided in the blocks of  ×
pixels to form ve pairs. e location of the common pixel is
decided using the image data. For this reason, data of last few
rowsareused.Sincethecommonpixelischangedrandomly
basedontheimagedata,itisdiculttoextractthesecretdata
from stego image even if the steganography method fails.
Integer wavelet transform maps an integer data set into
another integer data set. Calderbank et al. [] have explained
the working of integer wavelet transform. Haar wavelet
transform, in its unnormalized version involving pair wise
averages and dierences, is written as
1,𝑛 =0,2𝑛 +0,2𝑛+1
21,𝑛 =0,2𝑛+1 −0,2𝑛.()
Its inverse is given by
0,2𝑛 =1,𝑛 +1,𝑛
20,2𝑛+1 =1,𝑛 1,𝑛
2.()
Because of division by two, this is not integer transform.
e integer version can be built by omitting division by two
in 1,𝑛 andcalculatingthesuminsteadoftheaverage.isis
called transform []. Consider the following example:
1,𝑛 =0,2𝑛 +0,2𝑛+1
2
1,𝑛 =0,2𝑛+1 −0,2𝑛.()
It is possible to dene 1,𝑛 as above because the sum and
dierenceoftwointegersareeitherevenorodd.us,itis
safe to omit last bit of sum since it is similar to last bit of
dierence. e transform []isinvertibleanditisgivenby
0,2𝑛 =1,𝑛 −1,𝑛
2
0,2𝑛+1 =1,𝑛 +1,𝑛 +1
2.()
A dierent way of writing Haar transform using “liing
steps leads to natural generalizations. It is possible to write
Haar and transform using liing schemes [].
First, compute the dierence and, then, use the dierence
in second step to compute the average:
1,𝑛 =0,2𝑛+1 −0,2𝑛 1,𝑛 =0,2𝑛 +1,𝑛
2.()
e inverse transform can be calculated in two steps.
First, recover the even samples from the average and dier-
ence, and recover the odd samples from even and dierence
[]. It is given by the following equations:
0,2𝑛 =1,𝑛 1,𝑛
20,2𝑛+1 =1,𝑛 +0,2𝑛.()
Mathematical Problems in Engineering
It is possible to write integer transform by truncating the
division:
1,𝑛 =0,2𝑛+1 −0,2𝑛 1,𝑛 =0,2𝑛 +1,𝑛
2. ()
Liingcanbeusedtocomputetheinversetransform.e
equations follow from reversing the order and changing the
sign of the forward transform []:
0,2𝑛 =1,𝑛 −1,𝑛
2
0,2𝑛+1 =1,𝑛 +0,2𝑛.()
Ramalingam et al. []haveelaboratedtheprocessof
separating four subbands using Haar IWT. e rst stage
IWT is given by
H=𝑜−𝑒,
L=𝑒+H
2, ()
where 𝑜represents pixels in odd column and 𝑒represents
pixels in even column. In the next stage, the IWT coecients
are calculated using high pass and low pass lter banks. is
process creates four subbands: low-low (LL), low-high (LH),
high-low (HL), and high-high (HH). e second stage IWT
is given by
LH =Lodd Leven,
LL =Leven +LH
2,
HH =Hodd Heven,
HH =Heven +HL
2,
()
where Hodd represents H band’s odd row, Lodd represents L
band’s odd row, Heven represents H band’s even row, and Leven
represents L bands even row [].
Ghasemietal.[,] have proposed a novel steganogra-
phy scheme based on integer wavelet transform and genetic
algorithm. e scheme embeds data in integer wavelet
transform coecients by using a mapping function based
on genetic algorithm. e methods use wavelet transform
coecients to embed secret data into the four subbands
of two-dimensional wavelet transform. Genetic algorithm is
used to nd the mapping function. A chromosome is encoded
as an array of  genes containing permutations  to 
thatpointtopixelnumbersineachblock.OPAPisusedto
minimize the error between cover and stego image.
Xuan et al. []havesuggestedalosslessdatahiding
method for digital images using integer wavelet transform
and threshold embedding technique. CDF (.) integer
wavelet transform is used to obtain the wavelet coecients.
Histogram modication is applied to prevent possible under-
ow/overow of pixel values. A predened threshold value
isusedtoembeddatainthewaveletcoecients.
El Safy et al. [] have suggested an adaptive stegano-
graphic model which combines adaptive hiding capacity
function that hides secret data in the integer wavelet coef-
cients of the cover image with the optimum pixel adjust-
ment (OPA) algorithm. Histogram modication is applied
to prevent possible underow/overow of pixel values. e
cover image is divided into  ×nonoverlappingblocks.
Each block is transformed using D Haar integer wavelet
transformtoobtainfoursubbands:LLI,LHI,HLI,and
HHI. Hiding capacity of each coecient is determined and
the data is embedded in the coecients. A pseudorandom
number generation function is used to select the wavelet
coecients for increasing the security of the hidden data.
e OPA algorithm is applied aer embedding secret message
to minimize the embedding error. e extraction procedure
is a blind process since it requires only the secret key from
the receiver. e secret key is used to identify the wavelet
coecients. Secret message bits are extracted from each
selected wavelet coecient.
Archana et al. [] have proposed a method for hiding
secret information in the discrete wavelet transform coe-
cients using GA and OPAP algorithm to provide optimum
hidingcapacity.efoursubbandsLL,HL,LH,andHHare
used for hiding the data. Hiding capacity function is modied
by using dierent ranges for k for the LH, HL, and HH
subbandswhereitsvaluesrangefromto.elengthLof
message bits to be hidden in wavelet coecient is determined
by using hiding capacity function.
Al-Asmari et al. []haveproposedamethodusingdis-
crete wavelet transform and pixel value dierencing approach
tohidetheinformation.Usingthediscretewavelettransform,
thecoverimageisdecomposedtoobtainthefoursubbands
(LL, HL, LH, and HH). en, the LSB method is used to
hide secret information in the LL subband by hiding two bits
of secret information in each coecient. e PVD approach
is used to hide the information in the remaining three
subbands. For hiding the information, two consecutive pixels
in the vertical direction are grouped to form a pair. e
method gives high performance in terms of capacity, human
visual quality, and PSNR.
2. Proposed Method
e proposed method hides secret information in the gray
scale images. It uses spatial domain technique to hide secret
information in the frequency domain. In the frequency
domain, the image is decomposed into four subbands using
integer wavelet transform and then the spatial domain
techniqueisusedtohidesecretinformationinthewavelet
coecients of the four subbands.
e cover image is transformed using D Haar integer
wavelet transform to obtain four subbands: LL, LH, HL, and
HH. e proposed method embeds data in the coecients of
four subbands by using the pixel value dierencing approach.
2.1. Preprocessing. e gray scale image is read as a D array
of size [,]. Histogram modication []isappliedto
prevent the possible overow/underow of pixel values. is
problem occurs when the pixel values of the cover image are
closetoor,becausetheymayexceedorfallbelow
Mathematical Problems in Engineering
LL HL
LH HH
F : Arrangements of wavelet coecients.
F : e image lena.ti aer performing Harr transform.
during inverse integer wavelet transform. e problem can be
solved by mapping the lowest  gray scale levels to the value
 and the highest  gray scale levels to the value . If the
pixel values exceed the boundaries during the inverse wavelet
transform, the image is not suitable for hiding secret data.
e image is transformed using D Haar wavelet transform
to obtain four subbands: LL, LH, HL, and HH of size [/,
/] each. All the four subbands are used to hide the secret
information. e D array of size [,] is again constructed
by arranging the four subbands as shown in Figure .
Figure  shows the arrangement of four subbands of the
image lena.ti aer transforming it using D Harr integer
wavelet transform.
A D array obtained by arranging the wavelet coecients
of four subbands is shown as follows:
112230150−45−120 80
130159172−37 −89 −72
⋅⋅⋅
⋅⋅⋅
−30−59−72−37 −89 −72. ()
e dierence operation in Haar transform may cause some
of the wavelet coecients in HL, LH, and HH subbands to
have negative values.
Sincesomeofthewaveletcoecientshavenegative
values, the D array shown in () cannot be used for hid-
ing secret information using the pixel value dierencing
approach. Hence, absolute values are used for the coecient
with negative values to create a new D array with positive
elements as follows:
1122301504512080
13015917237 89 72
⋅⋅⋅
⋅⋅⋅
30 59 72 ⋅37 89 72. ()
Aer hiding the secret information in the D array shown
in (), inverse wavelet transform is performed to obtain
the stego image. To obtain good quality of stego image, the
original sign of each wavelet coecient, as shown in (),is
required. Hence, the D array shown in () is used to create
asignmatrixofthesize[,]havingelementswithvalues
or. e sign matrix so created is shown as follows:
1 1 1 −1−1 1
1 1 1 −1−1−1
⋅⋅⋅⋅⋅⋅
⋅⋅⋅⋅⋅⋅
−1−1−1−1−1−1. ()
e wavelet coecients having positive values are repre-
sented by  whereas wavelet coecients having negative
values are represented by inthesignmatrix.
2.2. Embedding Process. For hiding the data in the D array,
themethodsuggestedbyGulve[,]isused.Inthemethod
proposed by Chang [], a block of  ×pixelsisusedtoform
pairs which are then used to hide the secret information. e
proposed method uses the block of  × wavelet coecients.
e introduction of  wavelet coecients in the  ×block
forms two extra pairs. For a  × image, it is possible to
form  pairs using the approach suggested by Chang []
whereas, using the proposed approach,  pairs can be
formed.Agreaternumberofpairsprovideextraspacefor
hiding the secret information. us, the proposed method
improves the hiding capacity of the cover image.
e dierence between two wavelet coecients in the pair
is used to hide the secret information. If the dierence value
is directly used to hide the information, it is easy to retrieve
the embedded information in case the steganography system
fails. To enhance the security of the secret information, the
proposed algorithm modies the dierence between the two
wavelet coecients in the pair and this modied dierence
is used to hide the secret information. is imposes extra
layer of security making harder extraction of original secret
information from stego image using the dierence values
directly [,].
e arrangement of wavelet coecients into nonover-
lapping blocks of  × wavelet coecients is shown in
Figure .AsshowninFigure ,each× block includes six
wavelet coecients (𝑥,𝑦),(𝑥,𝑦+1),(𝑥,𝑦+2),(𝑥+1,𝑦),(𝑥+1,𝑦+1),
and (𝑥+1,𝑦+2),whereand are the locations of wavelet
coecients. Five pairs are formed by grouping the common
wavelet coecient PX1with the remaining ve wavelet
Mathematical Problems in Engineering
PX0
PX3
PX1
PX4
PX2
PX5
P(x,y) P(x,y+1) P(x,y+2)
P(x+1,y) P(x+1,y+1) P(x +1,y+2)
F : Pixel block.
coecients PX0,PX
2,PX
3,PX
4,andPX
5.evepairs𝑖
where =0,1,2,3,4are as shown below:
0=(𝑥,𝑦+1),(𝑥,𝑦),
1=(𝑥,𝑦+1),(𝑥,𝑦+2),
2=(𝑥,𝑦+1),(𝑥+1,𝑦),
3=(𝑥,𝑦+1),(𝑥+1,𝑦+1),
4=(𝑥,𝑦+1),(𝑥+1,𝑦+2).
()
e dierence value 𝑖is calculated for each pair 𝑖by
subtracting the common wavelet coecient PX1from the
other wavelet coecient in that pair. is dierence value is
used to identify the corresponding range 𝑘,𝑖 from the range
table .erangetableisdesignedwithranges[07],[815],
[1631],[3263],[64127],and[128255].ewidth𝑘,𝑖
of range 𝑘,𝑖 is used to determine the number of bits 𝑖(𝑖=
log2𝑘,𝑖) that can be hidden in each pair where =0,1,2,3,4.
is 𝑖is then used to calculate the average value ()of
number of bits possible to be hidden in each pair of the block.
e average value isusedtocalculatethereviseddierence
𝑖as 𝑖is remainder (𝑖/2𝑁)sothat𝑖≤2𝑁where 𝑖is
the original dierence. e oset dierence OD𝑖is calculated
as |𝑖|−|𝑖|foreachpairintheblock.ereviseddierence
|𝑖|is then used to determine the number of bits 𝑖for each
pair in the block. us, if the original dierence value |𝑖|
allows bits to be hidden in the pair; then the proposed
approach hides bits ≤in that pair [,].
Aer embedding 𝑖bits of the message in the pair, new
dierence 󸀠
𝑖is calculated as OD𝑖+𝑘,𝑖 +where 𝑘,𝑖 represents
lower boundary of the range 𝑘,𝑖 in the range table and
represents the decimal equivalent of 𝑖message bits hidden in
that pair.
Embedding 𝑖bits in the pair modies the values of
both the wavelet coecients in the pair. e new values
of wavelet coecients in each pair are dierent from their
original values. Since new value is assigned to common
wavelet coecient PX1in each pair, ve dierent values are
obtained for the common wavelet coecient PX1.However,
the common wavelet coecient PX1can have only one value
in each bock. is requires values of other ve wavelet
coecients PX0,PX
2,PX
3,PX
4,andPX
5to be adjusted such
that the new dierence 󸀠
𝑖remains unchanged. erefore,
the pair, having new values of wavelet coecients close to
their original values, is selected as the reference pair. To nd
the reference pair, the dierence between 𝑖and 󸀠
𝑖is
calculated. Small value of ||indicates that the new dierence
value 󸀠
𝑖is close to the original dierence value 𝑖.us,
for the pair with minimum ||,thenewvaluesofwavelet
coecients are close to their original values. So the pair with
minimum ||is selected as the reference pair. e values of
the two wavelet coecients in the reference pair are used to
adjust the values of wavelet coecients in other pairs and
construct a new 2×3block. e embedded secret information
in newly constructed block is unaected because dierence
values for the pairs are unaltered [,].
During the extraction process, average value ()is
calculated using the same process adopted during embedding
of the secret message. e average value is used to calculate
the revised dierence 󸀠
𝑖as 󸀠
𝑖is remainder (𝑖/2𝑁). Suit-
able range 𝑘,𝑖 is identied using this revised dierence. e
secret message is extracted in the decimal form by subtracting
𝑘from |󸀠
𝑖|. Secret message is then converted into a binary
stream with 𝑖(𝑖=log
2𝑘,𝑖)bits[,].
e process of hiding secret information in the cover
image is described below [,].
() Create the D array as shown in () by preprocessing
the gray scale cover image.
() Partition the array into nonoverlapping blocks of 2×3
wavelet coecients and group wavelet coecient PX1
with the remaining wavelet coecients in the block to
form ve pairs.
() Calculate the dierence values 𝑖for the ve pairs in
each block: 0=(𝑥,𝑦) −(𝑥,𝑦+1),
1=(𝑥,𝑦+2) −(𝑥,𝑦+1),
2=(𝑥+1,𝑦) −(𝑥,𝑦+1),
3=(𝑥+1,𝑦+1) −(𝑥,𝑦+1),
4=(𝑥+1,𝑦+2) −(𝑥,𝑦+1).
()
() Use |𝑖|where =0,1,2,3,4to locate suitable range
𝑘in the designed range table. Use this range to
calculatenumberofbits𝑖that can be hidden in each
pair 𝑖. en, calculate the average bits using
avg =4
𝑖=0 𝑖
5. ()
() Calculate the revised dierence |𝑖|where =
0,1,2,3,4as 𝑖is remainder (𝑖/2avg )sothat𝑖<=
2avg.
() Calculate the dierence OD𝑖as OD𝑖=|𝑖||𝑖|for
each pair.
() Use |𝑖|where =0,1,2,3,4to locate suitable range
𝑘in the designed range table.
Mathematical Problems in Engineering
() Compute the number of bits 𝑖that can be embedded
in each pair using the corresponding range given by
𝑘.evalue𝑖can be estimated from the width 𝑘
of 𝑘,whichisgivenby𝑖=log
2𝑘where width 𝑘=
𝑘−𝑘+1and 𝑘and 𝑘are upper and lower boundaries
of the range 𝑘.
() Read 𝑖bits from the binary secret data.
() Calculate the new dierence value 󸀠
𝑖given by
󸀠
𝑖=OD𝑖+𝑘,𝑖 +𝑖,if 𝑖≥0,
󸀠
𝑖=−OD𝑖+𝑘,𝑖 +𝑖, if 𝑖<0. ()
() Modify the values of wavelet coecients in the pair
𝑖using
󸀠
𝑛,󸀠
𝑛+1=𝑛−2,𝑛+1 +2, ()
where 𝑛and 𝑛+1 represent two wavelet coecients
in the pair 𝑖and is obtained by subtracting 𝑖
from 󸀠
𝑖.
() Select the pair with minimum ||as the optimal
reference pair and use this pair to adjust the values of
wavelet coecients of the other four pairs. e value
of the common wavelet coecient is given by 󸀠
𝑛of
the reference pair. Modify value of another wavelet
coecient 󸀠
𝑛+1 of remaining four pairs such that
the new dierence 󸀠
𝑖will remain unchanged. us,
newvaluesareassignedtoremainingfourwavelet
coecients in the block.
() Check the new values of wavelet coecients for fall-
o boundaries; that is, check whether all the values
are within the range from  to . If not, modify the
values preserving the dierence between the values of
two wavelet coecients of each pair in the block.
(a) Find out the smallest of all the wavelet coe-
cients. If the smallest is less than  then add
|smallest|in all the wavelet coecients in that
block.
(b) Find out the largest of all the wavelet coe-
cients. If the largest is greater than , subtract
largest  from all the wavelet coecients in
that block.
(c) If fall-o boundary problems still exist, the
cover image is not suitable for hiding secret
information.
() Now, reconstruct the block from all pairs with modi-
ed values of wavelet coecients.
() Repeat steps (2)through () until the secret informa-
tion is embedded in the cover image.
2.3. Postprocessing. Aer the embedding process is over,
original signs are assigned to the elements of D array using
the sign matrix created during preprocessing phase. is is
accomplished by one to one comparison of elements of D
array with the elements of D sign matrix. e D array is
then split to obtain the four subbands. Using inverse D Haar
integer wavelet transform, the four subbands are combined to
obtain the stego image of size [,].Allthepixelvaluesof
the stego image in the range from  to  indicate that secret
data is safely hidden and can be extracted accurately.
2.4. Extraction Process. e extraction process is blind. It
does not require the existence of cover image for extracting
hidden secret data from the stego image. e stego image is
preprocessed to obtain the D array as shown in ().e
process of extraction of secret information from the stego
image is described below [,].
() Create the D array as shown in () by preprocessing
the gray scale stego image.
() Partition the array into nonoverlapping blocks of  ×
wavelet coecients and group wavelet coecient PX1
with the remaining wavelet coecients in the block to
form ve pairs. Keep the partition order the same as
that of the embedding.
() Calculate the dierence values 𝑖for the ve pairs in
each block: 0=(𝑥,𝑦) −(𝑥,𝑦+1),
1=(𝑥,𝑦+2) −(𝑥,𝑦+1),
2=(𝑥+1,𝑦) −(𝑥,𝑦+1),
3=(𝑥+1,𝑦+1) −(𝑥,𝑦+1),
4=(𝑥+1,𝑦+2) −(𝑥,𝑦+1).
()
() Use |𝑖|where =0,1,2,3,4to locate suitable range
𝑘in the designed range table. Use this range to
calculate number of bits, 𝑖, which is hidden in each
pair 𝑖. en, calculate the average bits using ().
() Calculate revised dierence |󸀠
𝑖|where
=0,1,2,3,4as 󸀠
𝑖is remainder (𝑖/2avg )
() Use |󸀠
𝑖|where =0,1,2,3,4to locate suitable 𝑘in
the designed range table.
() Aer 𝑘is located, 𝑘is subtracted from |󸀠
𝑖|and
󸀠
𝑖is obtained in decimal form. A binary sequence is
generated from 󸀠
𝑖with 𝑖bits where 𝑖=log
2𝑘.
Repeat steps (2)through () until embedded message is
extracted.
3. Results
A set of gray scale TIFF images is used for the experimenta-
tion.issetconsistsofstandardimagesaswellasimages
taken from the camera. e standard images are obtained
from the “the USC-SIPI image database (http://sipi.usc
.edu/database/)”. e images taken from Canon A camera
Mathematical Problems in Engineering
T : Comparison of hiding capacity (in bytes).
Cover image PVD method []TPVDmethod[]Gulvesmethod[]Proposedmethod
Capacity PSNR Capacity PSNR Capacity PSNR Capacity PSNR
Lena  .  .  .  .
Baboon  .  .  .  .
Peppers  .  .  .  .
Cover image
Lena.ti
(a)
Stego-image
Lenna.ti
(b)
Baboon.ti
Cover image
(c)
Baboon.ti
Stego-image
(d)
F : Cover and stego images.
in JPG format are converted into gray scale ti format. e
textlesareusedassecretdata.Sincetheproposedalgo-
rithm use PVD approach to hide information in wavelet
coecients, the data hiding capacity and PSNR values of
the proposed method are compared with PVD method [],
TPVD []method,andGulvesmethod[]. e comparison
is shown in Table . e proposed method provides increased
hiding capacity and improved PSNR values as compared
to PVD and TPVD method. Although the PSNR is less as
compared to Gulve’s [] method, there is an improvement in
the security of secret data.
e average payload of the proposed system is . bpp.
e performance of the proposed method is analyzed using
PSNR, Universal Quality Index (), and Structural Similarity
Index Measure (SSIM). and SSIM are full reference image
quality assessment models and require the cover image to
be available [,]. Tab l e  shows the PSNR values, MSE,
Universal Quality Index (), and Structural Similarity Index
Mathematical Problems in Engineering
0
500
1000
1500
2000
2500
3000
050 100 150 200 250
Cover image
Lenna.ti
(a)
0
500
1000
1500
2000
2500
3000
0 50 100 150 200 250
Stego image
Lenna.ti
(b)
0
500
1000
1500
2000
2500
3000
0 50 100 150 200 250
Cover image
Baboon.ti
(c)
0
500
1000
1500
2000
2500
3000
0 50 100 150 200 250
Stego image
Baboon.ti
(d)
F : Histograms of cover and stego images.
Measure (SSIM) for dierent images obtained using proposed
method.ePSNRvaluesareabovethethresholdofdB
[] even aer using more than % of the hiding capacity of
the cover image. Also Universal Quality Index ()values[]
and Structural Similarity Index Measure (SSIM) values []
are close to , which proves that the stego images are visually
indistinguishable from original cover images.
Figure  shows the cover image and the corresponding
stegoimagesobtainedusingtheproposedmethod.Asthe
gures show, distortions resulted from embedding are imper-
ceptible to human vision.
Figure  showsthehistogramofthecoverandstegoimage
obtained using the proposed method. From the gure, it can
be observed that the shape of the histogram is preserved.
e cover image data is subtracted from stego image
and plotted as histogram. Figure  shows the pixel dierence
histogram. From the gure, it can be observed that there are
more numbers of bins which are close to  as compared to
bins which are away from . Also the step pattern is not
observed in the gure. is conrms that the method is
robust against histogram analysis attack.
Histogram of cover image is represented as [0,1,...,
255]whereas histogram of stego image is represented as
[󸀠
0,󸀠
1,...,󸀠
255].echangeinhistogram[]ismeasured
by =255
𝑚=1 󸀠
𝑚−𝑚.()
e proposed method can hide at least  bits in each
pair considering the smallest width of the subrange to be .
Figure  shows the comparison of the value of of the 
bit LSB replacement method and the proposed method with
dierent size of secret data embedded in the cover image,
Lena.ti. It can be observed that dierence in histogram for
theproposedmethodislessthanthatofbitLSBmethod.
Mathematical Problems in Engineering
0 5 10 15 20
0
0.5
1
1.5
2
2.5
3
Dierence values
Occurrence frequency
−20 −15 −10 −5
×104
Cover image
Lenna.ti
(a)
0 10 20 30
0
0.5
1
1.5
2
2.5
3
3.5
Dierence values
Occurrence frequency
−30 −20 −10
×104
Cover image
Baboon.ti
(b)
F : Dierence histogram.
T : Hiding capacity, PSNR, MSE, and index.
Cover
image
Resolutionofcover
image
Hiding
capacity
(Kb)
%of
hiding
capacity
Message
le size
(Kb)
PSNR MSE SSIM
Baboon  × . . . . . . .
Lena  × . . . . . . .
Elaine  × . . . . . . .
Baboon  × . . . . . . .
Lena  × . . . . . . .
Tan k  × . . . . . . .
Peppers  × . . . . . . .
Barbara × . . . . . . .
Boat  × . . . . . . .
Grass  × . .  . . . .
e output images are tested under the steganalysis
[]. It is observed from Figure  that the dierence between
𝑀and −𝑀 and 𝑀and −𝑀 is very small. e rules 𝑀
−𝑀 and 𝑀≅−𝑀 are satised for the output images. is
proves that the proposed method is secure against attack.
4. Conclusion
In steganography, hiding capacity of cover image, quality of
stego image, and security of secret data are three important
factors. ere is always a trade-o between data hiding
capacity of cover image and security of secret data. e
proposed algorithm provides improvements in the data
hiding capacity as well as security of the secret data as
compared to PVD [] and TPVD [] methods. Although
Gulve’s [] method provides better PSNR values as compared
to proposed method, the proposed method improves security
of secret information. e secret information is securely
hidden in the coecients of integer wavelet transform. For
the implementation purpose, the four subbands obtained
aer decomposing the cover image by integer wavelet trans-
form are arranged as shown in Figure .Butitispossibleto
arrange the four subbands in ! =  dierent ways thereby
improving the security of the steganography system since
the exact arrangement of four subbands will be known to
sender and receiver only. e algorithm revises the original
dierence between two wavelet coecients in the pair and
this revised dierence is used for hiding the data in that pair.
is makes estimation of exact number of bits hidden in the
pair dicult. Image steganography techniques hiding textual
information require % accuracy for successful retrieval of
hidden information from stego image. If the steganography
method fails, correct estimation of number of bits hidden for
some of the pairs will be a challenge for the invader. us,
 Mathematical Problems in Engineering
0
5000
10000
15000
20000
25000
30000
35000
40000
45000
10 20 30 40 50 60 70 80
Histogram dierence
Size of hidden message (KB)
LSB
Proposed
F : Histograms comparison of  bit LSB substitution and
proposed method (Lena.ti).
0
0.1
0.2
0.3
0.4
10 20 30 40 50 60 70 79
Ratio of R, S
Message size (KB)
RMSM
R−M S−M
F : diagram.
one more level of security is imposed to secure the secret
information.
e PSNR values produced by the algorithm are close to
. which are well above the threshold of  dB aer using
full hiding capacity of the cover image. is proves that the
stego images are of good quality. Results also show that the
dierence between cover image and stego image cannot be
noticed by human visual system (HVS).
Considering the fact that there is currently no steganogra-
phy system that can resist all the steganalysis attacks, the best
way to provide security to the secret data and to eliminate the
attack of comparing the original image with the stego image
is to freshly create an image and destroy it aer generating the
stego image.
Conflict of Interests
e authors declare that there is no conict of interests
regarding the publication of this paper.
References
[] D.-C. Wu and W.-H. Tsai, “A steganographic method for images
by pixel-value dierencing,Pattern Recognition Letters,vol.,
no. -, pp. –, .
[]H.C.Wu,N.I.Wu,C.S.Tsai,andM.-S.Hwang,“Image
steganographic scheme based on pixel-value dierencing and
LSB replacement methods,IEE Proceedings—Vision, Image and
Signal Processing,vol.,no.,pp.,.
[] K.-C. Chang, P. S. Huang, T.-M. Tu, and C.-P. Chang, “Adaptive
image steganographic scheme based on tri-way pixel-value dif-
ferencing,” in Proceedings of the IEEE International Conference
on Systems, Man, and Cybernetics (SMC ’07),pp.,
Montreal, Canada, October .
[] A.K.GulveandM.S.Joshi,“Animagesteganographyalgorithm
with ve pixel pair dierencing and gray code conversion,
International Journal of Image, Graphics and Signal Processing,
vol. , no. , pp. –, .
[] K.-C. Chang, C.-P. Chang, P. S. Huang, and T.-M. Tu, “A novel
image steganographic method using tri-way pixel-value dier-
encing,Journal of Multimedia,vol.,no.,pp.,.
[] K.C.Chang,P.S.Huang,T.M.Tu,andC.P.Chang,“Image
steganographic scheme using tri-way pixel-value dierencing
and adaptive rules,” in Proceedings of the IEEE International
Conference on Intelligent Information Hiding and Multimedia
Signal Processing,pp.,Kaohsiung,Taiwan,.
[] A. K. Gulve and M. S. Joshi, “A secured image steganography
algorithm with ve pixel pair dierencing by selecting the
common pixel randomly,” in Proceedings of the 3rd International
Conference on Computational Intelligence and Information Tech-
nology (CIIT ’13), pp. –, Elseveir, Mumbai, India, .
[] A. R. Calderbank, I. Daubechies, W. Sweldens, and B.-L. Yeo,
“Wavelet transforms that map integers to integers,Applied and
Computational Harmonic Analysis,vol.,no.,pp.,
.
[] B. Ramalingam, R. Amirtharajan, and J. B. B. Rayappan, “Stego
on FPGA: an IWT approach,e Scientic World Journal,vol.
,ArticleID,pages,.
[] E. Ghasemi, J. Shanbehzadeh, and B. ZahirAzami, “A stegano-
graphic method based on Integer Wavelet Transform and
Genetic Algorithm,” in Proceedings of the International Confer-
ence on Communications and Signal Processing (ICCSP ’11),pp.
–, Calicut, India, February .
[] E. Ghasemi, J. Shanbehzadeh, and N. Fassihi, “High capacity
image steganography using wavelet transform and genetic
algorithm,” in Proceedings of the International Multi Conference
of Engineers and Computer Scientists (IMECS ’11), pp. –,
Hong Kong, March .
[]G.Xuan,Y.Q.Shi,C.Yang,Y.Zheng,D.Zou,andP.Chai,
“Lossless data hiding using integer wavelet transform and
threshold embedding technique,” in Proceedings of the IEEE
International Conference on Multimedia and Expo (ICME ’05),
pp. –, IEEE, Amsterdam, e Netherlands, July .
Mathematical Problems in Engineering 
[] R. O. El Safy, H. H. Zayed, and A. El Dessouki, “An adaptive
steganographic technique based on integer wavelet transform,
in Proceedings of the International Conference on Networking
and Media Convergence (ICNM ’09),pp.,Cairo,Egypt,
March .
[] S. Archana, A. Judice, and K. P. Kaliyamurthie, “A novel
approach on image steganographic methods for optimum hid-
ing capacity,International Journal of Engineering and Computer
Science,vol.,no.,pp.,.
[] A.K.Al-Asmari,M.A.Al-Qodah,andA.S.Salama,“Wavelet-
pixel value dierencing technique for digital images data hid-
ing,” in Proceedings of the IEEE International Conference on
System Engineering and Technology (ICSET ’11),pp.,June
.
[] Z. Wang and A. C. Bovik, “A universal image quality index,
IEEE Signal Processing Letters,vol.,no.,pp.,.
[] Z.Wang,A.C.Bovik,H.R.Sheikh,andE.P.Simoncelli,“Image
quality assessment: from error visibility to structural similarity,”
IEEE Transactions on Image Processing,vol.,no.,pp.
, .
[] N. I. Wu and M. S. Hwang, “Data hiding: current status and key
issues,International Journal of Network Security,vol.,no.,
pp. –, .
[] X. Zhang and S. Wang, “Ecient data hiding with histogram-
preserving property,Telecommunication Systems,vol.,no.,
pp.,.
[] J.Fridrich, M. Goljan, and R. Du, “Detecting LSB steganography
in color and gray-scale images,IEEE Multimedia Magazine,vol.
, no. , pp. –, .
... The schemes developed in the transform domain [8][9][10] remain more protected against statistical analysis than the spatial domain. Transform domain based steganography can be employed with discrete fourier transform (DFT) [11], discrete cosine transform (DCT) [12], discrete wavelet transform (DWT) [13,14], and integer wavelet transform (IWT) [15,16]. The drawback of the methods developed in DFT was the unavailability of timing information; it offered only frequency information. ...
... Steganography in IWT [15,[18][19][20] domain is an efficient approach that provides requisite security. Gulve et al. [15] established a PVD based technique in the IWT domain that hides secret messages in all four subbands. ...
... Steganography in IWT [15,[18][19][20] domain is an efficient approach that provides requisite security. Gulve et al. [15] established a PVD based technique in the IWT domain that hides secret messages in all four subbands. This scheme attained a low payload. ...
Article
Full-text available
An integer wavelet transform (IWT) based image steganography technique is proposed to prevail the embedding capacity constraints in this domain. Quotient value differencing (QVD) and 2-least significant bit (2-LSB) techniques are employed in the high frequency subbands. It divides the bit region of each coefficient of high-frequency subbands into two halves and two techniques are used concurrently in each half of the bitplane. The high-frequency subbands are divided into non-overlapping 3 ××\times 3 blocks and confidential messages are concealed in eight directions within each block. The low-frequency subband is fragmented into non-overlapping 2 ××\times 2 blocks. Since the human eye cannot tolerate more changes in low-frequency coefficients, one-fourth of the approximation subband (LL) is used to hide confidential messages. The method attains an average embedding capacity (AEC) of 3.14 bpp. To increase the safety of the technique, the confidential messages are hidden in a non-sequential way. The work resists the steganalysis test of StegExpose and outperforms the tests of the standard tool StirMark benchmark 4.0.
... Watermarking, steganography, and cryptography are currently among the most popular security strategies [3,4]. The purpose of watermarking is to safeguard the copyright of digital material owners [4], whereas steganography refers to the ability to transmit unseen secret data by embedding it in a multimedia carrier, and the goal of steganography is to conceal the existence of embedded data [5]. ...
... Technical steganography in images may be categorised based on the domain in which it is used, whether spatial or frequency [3,12,13]. Pixel values are employed to obscure secret information in the spatial domain, whereas in the frequency domain, message encapsulation is performed within the altered image. Several transforms, such as the Fourier and Wavelet transforms [3,14], may also be added. ...
... Pixel values are employed to obscure secret information in the spatial domain, whereas in the frequency domain, message encapsulation is performed within the altered image. Several transforms, such as the Fourier and Wavelet transforms [3,14], may also be added. Steganography thus offers a robust and excellent tool for secure communication, particularly when used with encryption [8], and steganography is now frequently utilised with text, image, sound, and video data depending on the cover file. ...
Article
Full-text available
Data security can involve embedding hidden images, text, audio, or video files within other media to prevent hackers from stealing encrypted data. Existing mechanisms suffer from a high risk of security breaches or large computational costs, however. The method proposed in this work incorporates low-complexity encryption and steganography mechanisms to enhance security during transmission while lowering computational complexity. In message encryption, it is recommended that text file data slicing in binary representation, to achieve different lengths of string, be conducted before text file data masking based on the lightweight Lucas series and mod function to ensure the retrieval of text messages is impossible. The steganography algorithm starts by generating a random key stream using a hybrid of two low-complexity chaotic maps, the Tent map and the Ikeda map. By finding a position vector parallel to the input image vector, these keys are used based on the previously generated position vector to randomly select input image data and create four vectors that can be later used as input for the Lah transform. In this paper, we present an approach for hiding encrypted text files using LSB colour image steganography by applying a low-complexity XOR operation to the most significant bits in 24-bit colour cover images. It is necessary to perform inverse Lah transformation to recover the image pixels and ensure that invisible data cannot be retrieved in a particular sequence. Evaluation of the quality of the resulting stego-images and comparison with other ways of performing encryption and message concealment shows that the stego-image has a higher PSNR, a lower MSE, and an SSIM value close to one, illustrating the suitability of the proposed method. It is also considered lightweight in terms of having lower computational overhead.
... The Haar DWT may be represented as simple pair wise averages and differences if s0, 2n and s0, 2n + 1 were the sequential pixel values of the cover picture [14]. ...
... 1. While not all spatial domain concepts can or should be implemented in the transform domain, there are transform domain approaches that apply ideas comparable to spatial domain methods [3,14,52]. Some spatial domain concepts need small transform domain adjustments, which designers must make based on the intended transform domain. 2. One of the most effective spatial domain concepts is embedding in the image's edges. ...
Article
Full-text available
Steganography is the art and a science of obscuring the presence of communication by hiding content in electronic media and so obscuring the presence of communication from the adversary’s perspective. The goal of spatial adaptive approaches is to incorporate additional information in the image’s edge regions. The portions of the picture with the most changes are prioritized for embedding in these approaches. In contrast, wavelet-based approaches insert in high-frequency sub-bands to resemble the human visual system. The concept described in this study is a hybrid of these two concepts. On the contrary, the coefficients of the wavelet transform’s high-frequency sub-bands are more suited for embedding, since they have bigger coefficients surrounding them and reflect the image’s edge regions. Based on a local neighborhood analysis, an edge intensity criterion is employed to identify the suitable embedding coefficients in this technique. The receiver may also recognize these coefficients and fully extract the encoded data. In the suggested technique, the picture is first blocked, and then each block is given a wavelet transform. Several coefficients are discovered for each high-frequency sub-band, depending on the duration of the data, and then, using a genetic algorithm and the coefficients are chosen from the detected coefficients using a genetic approach to ensure that the resulting stego picture has the maximum PSNR value. The results of the implementation reveal that in the suggested strategy, employing the Integer Wavelet Transform is far more effective than using the Discrete Wavelet Transform. The suggested approach is safe against steganalysis assaults such as PDH analysis, RS, and universal steganalysers, and the quality of the stego picture is better than previous methods like SPAM (Steganography by Printed Arrays by Microbes) and SRM (Spatial Rich Model).
... Gulve and Joshi presented a technique for data hiding that uses a spatial domain approach to hide personal information in the frequency domain. The image is divided into four subbands using the integer wavelet transform: LL, LH, HL, and HH [14]. Then, the pixel value differencing algorithm is used to hide the secret information in each of the four subbands' wavelet coefficients. ...
Article
Full-text available
How to guarantee the confidentiality of sensitive data communicated over the Internet and restrict access to designated information is today’s key security and protection concern in telemedicine. In this work, we suggest a reliable and blind medical image watermarking method that combines integer wavelet transform (IWT) and singular value decomposition to keep such information private. A major drawback of current IWT-based watermarking systems is their low embedding capacity. This paper suggests an IWT-based secure large capacity watermarking solution to overcome this specific drawback. The proposed technique effectively preserves a considerable quality of watermarked images, and the watermark is resistant to the most frequently used attacks in watermarking, according to experiment results on imperceptibility and robustness.
... While Section 5 will give the findings and viewpoints, Section 4 will concentrate on the experiment and numerical evaluation of the suggested approach. [25] introduced a technique for data concealment that used a spatial domain methodology to conceal sensitive data in the frequency domain. Using the integer wavelet transform, the picture is split into four subbands: LL, LH, HL, and HH. ...
Article
Full-text available
Maintaining the secrecy of sensitive data transferred over the Internet while restricting access to approved information is a significant security and protection challenge in telemedicine today. In this work, we present a trustworthy and blind watermarking approach for medical photographs using the Integer Wavelet Transform (IWT) and Singular Value Decomposition (SVD) to preserve the privacy of such information. The embedding capacity of contemporary integer wavelet transform (IWT) based watermarking systems may be constrained. To overcome this specific issue, the study offers an IWT-based secure big capacity watermarking method. According to experiment results on imperceptibility and resilience, the suggested technique efficiently preserves a significant amount of quality in watermarked images, and the watermark is resistant to the most common attacks in watermarking.
... Reference [8] calculated the coefficient capacity of each IWT coefficient in order to perform more embedding in more significant coefficients. The central idea behind the method proposed in [14] was to apply the concept of Pixel Value Differencing (PVD) to the IWT domain. The embedding method was designed so that 2 × 3 blocks were created, with each block containing 5 pairs of coefficients and additional data embedded in pairs with a larger difference. ...
Article
Full-text available
Although wavelet-based steganography techniques are widely used due to their advantages, complete embedding data extraction remains one of the most significant challenges in this field. The Integer Wavelet Transform (IWT) can reduce extraction errors by mapping the image to integers, but it does not fully eliminate them. The proposed method resolves these errors entirely by using an iterative embedding procedure. After determining the image blocks and performing the IWT, this method embeds data in high-frequency sub-bands coefficient pairs. Additionally, it modifies the coefficient pair values such that the XOR of two coefficient LSBs equals two bits of data. The genetic algorithm is used to generate new coefficient values in order to minimize the differences between the stego and cover images. The sender repeats the embedding operation on each block until all extraction errors have been eliminated. If this procedure is unsuccessful in a block, the sender signs it as empty block. The results of the implementation suggest that with each iteration, the errors typically diminish to zero in most of the blocks. Further examination of the test results shows an enhancement in the PSNR and SSIM metrics when contrasted with existing methods. Moreover, the test results also expose the inability of attacks to uncover this method. Key merits of the proposed method include its superior stego image quality, substantial security against attacks, no requirement for lengthy keys, and a zero extraction error rate. These features render this method highly viable for practical applications.
Article
Information hiding is a crucial technology in the field of information security. Embedding capacity and stego-image quality are two key performance metrics in information hiding. In recent years, many information-hiding methods have been proposed to enhance embedding capacity and stego-image quality. However, through the study of these methods, we found that there is still room for improvement in terms of performance. This paper proposes a high-capacity information-hiding method based on a chunking matrix (CM). CM divides a 256×256 matrix into blocks, where each block contains k×k corresponding secret numbers. A pair of pixels is extracted from the original image and used as the coordinates for the matrix. In the search domain at that coordinate position, the corresponding secret number is found, and the matrix coordinates of the secret information are used as the pixel value for the stego-image. This paper evaluates the security and effectiveness of CM through measures such as embedding capacity, peak signal-to-noise ratio (PSNR), and bit-plane analysis. CM achieves a maximum embedding capacity of 4.806 bits per pixel (bpp) and maintains a PSNR value of more than 30 dB. Furthermore, the bit-plane analysis fails to detect the presence of the information hidden using CM method.
Chapter
Image-based watermarking has become essential in the digital authentication system. This work uses coefficient value differencing and histogram shifting techniques for watermark embedding on the coefficients of integer wavelet transform to take advantages of both spatial and transform techniques. After some necessary preprocessing, the cover image is applied 3/1 integer wavelet transform (IWT) to get four sub-bands. Thereafter, SHA256 algorithm is executed on the watermark image to generate hash code for authentication. The watermark and the hash code are embedded in the HH and HH of the LH sub-band, respectively, using coefficient value differencing and histogram shifting techniques. In the authentication phase, the stego-image is processed to extract the watermark and SHA256 code, followed by computation of SHA256 code from extracted watermark. These two SHA256 codes are compared to establish authentication. The experimental results on standard dataset show average “mean square error” (MSE), “peak signal to noise ratio” (PSNR), and “structural similarity index measure” (SSIM) between the cover and stego-image to be around 0.10, 60 dB, and 0.999, respectively. The robustness of the system is verified with well know active attacks by computing normalized cross-correlation (NCC).
Article
Full-text available
To achieve fast and secure information steganography in underwater acoustic channel scenarios, this paper proposes a PSO (Particle Swarm Optimization) and IWT (integer wavelet transform) based image steganography algorithm for underwater acoustic communication. Firstly, the underwater image to be embedded is interleaved and packed to generate the secret information code-stream to improve the detection and recovery performance of transmission errors. Secondly, the cover image is divided into non-overlapping blocks and IWT is applied to each block, which can save PSO search space and improve the optimal solution performance. Thirdly, the embedding position matrix of the high frequency sub-band coefficients is chaotic scrambled, and PSO is used to select the optimal key to obtain the optimal matching position for the secret information to produce the best stego-image quality. Finally, transmission error detection and recovery measures are applied to the extracted secret information to improve the reconstruction quality in underwater acoustic channel scenarios. Experimental results show that the proposed algorithm outperforms existing approaches in terms of information embedding capacity and steganographic visual quality, meeting the requirements of safety and real-time performance of underwater communication. Moreover, it also has the ability of error detection and recovery for harsh underwater acoustic channel.
Article
Steganography is the art of concealing information in a cover media in such a way that the presence of the information is unknown. Digital image steganography accomplishes the potential for protected communication that is crucial in most of the applications nowadays. Steganography has several beneficial applications. It has been driven to the frontrunner of present security systems by the amazing development in computational power, the rise in security consciousness. The main challenge in proposing a steganographic technique is to maintain a suitable balance among higher embedding capacity, imperceptibility, and security that separate it from correlated systems like cryptography and watermarking. This article offers an extensive state-of-the-art review and analysis of some recent steganographic techniques. Furthermore, we have discussed popular steganography tools in detail. Challenges in the recent deep learning based steganographic techniques have been addressed. To explore the domain, the article concludes with mentioning some future research directions.
Article
Full-text available
Steganography gained importance in the past few years due to the increasing need for providing secrecy in an open environment like the internet.Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet Steganography is used to conceal the information so that no one can sense its existence.In most algorithm used to secure information both steganography and cryptography are used together to secure a part of information. Steganography has many technical challenges such as high hiding capacity and imperceptibility. In this paper,we try to optimize these two main requriments by proposing a novel technique for hiding data in digital images by combining the use of adaptive hiding capacity function that hides secret data in the integer wavelet coefficients of the cover image with the optimum pixel adjustment (OPA) algorithm.The coefficients used are selected according to a pseudorandom function generator to increase the security of the hidden data.The OPA algorithm is applied after embedding secret message to minimize the embedding error.The proposed system showed high hiding rates with reasonable imperceptibility compared to other steganographic system. Keywords-Steganography,adaptive algorithm,spatial domain, discretewavelet transform,optimum pixel adjustment algorithm.
Article
Full-text available
Steganography involves hiding information in another media. PVD based steganography techniques uses the difference between the pixel values of a pair directly to hide the information. The proposed steganography system modifies the difference value before being used for hiding the information. This makes extraction of hidden data harder in case the steganography system fails. The algorithm divides the cover image in the block of 2 x 3 pixels and calculates average (N) of the bits that can be hidden in five pairs of that block. Thus if the difference value allows M-bits to be hidden in the pair, then only N-bits are hidden in that pair when M >N otherwise M (if M≤N) bits are hidden in that pair. Second level of security is added by converting the secret information into gray code before embedding it in the cover image. The algorithm provides good hiding capacity and improved quality of stego image with two levels of security for the secret information.
Article
Full-text available
A reconfigurable hardware architecture for the implementation of integer wavelet transform (IWT) based adaptive random image steganography algorithm is proposed. The Haar-IWT was used to separate the subbands namely, LL, LH, HL, and HH, from 8 × 8 pixel blocks and the encrypted secret data is hidden in the LH, HL, and HH blocks using Moore and Hilbert space filling curve (SFC) scan patterns. Either Moore or Hilbert SFC was chosen for hiding the encrypted data in LH, HL, and HH coefficients, whichever produces the lowest mean square error (MSE) and the highest peak signal-to-noise ratio (PSNR). The fixated random walk's verdict of all blocks is registered which is nothing but the furtive key. Our system took 1.6 µs for embedding the data in coefficient blocks and consumed 34% of the logic elements, 22% of the dedicated logic register, and 2% of the embedded multiplier on Cyclone II field programmable gate array (FPGA).
Conference Paper
Full-text available
This paper presents a new lossless data hiding method for digital images using integer wavelet transform and threshold embedding technique. Data are embedded into the least significant bit-plane (LSB) of high frequency CDF (2, 2) integer wavelet coefficients whose magnitudes are smaller than a certain predefined threshold. Histogram modification is applied as a preprocessing to prevent overflow/underflow. Experimental results show that this scheme outperforms the prior arts in terms of a larger payload (at the same PSNR) or a higher PSNR (at the same payload)
Article
Objective methods for assessing perceptual image quality have traditionally attempted to quantify the visibility of errors between a distorted image and a reference image using a variety of known properties of the human visual system. Under the assumption that human visual perception is highly adapted for extracting structural information from a scene, we introduce an alternative framework for quality assessment based on the degradation of structural information. As a specific example of this concept, we develop a Structural Similarity Index and demonstrate its promise through a set of intuitive examples, as well as comparison to both subjective ratings and state-of-the-art objective methods on a database of images compressed with JPEG and JPEG2000. A MatLab implementation of the proposed algorithm is available online at http://www.cns.nyu.edu/~lcv/ssim/.
Conference Paper
This paper presents a new technique which uses pixel value differencing (PVD) method and least significant replacement method to hide data in the four first order levels decomposed by discrete wavelet transform (DWT). The simulation results show that the proposed technique gives high performance in terms of capacity, human visual quality and PSNR better than PVD+3LSB method, the Overlapping PVD method and Semi-hexagonal PVD method (SH-PVD).
Conference Paper
Steganography can be defined as a method of hiding data within a cover media so that other individuals fail to realize their existence. Steganographic systems play a vital role in covertly transmission of information even in the presence of an arbiter The message can be hidden in images, audio files or in text. Although the embedded message changes the characteristics and nature of the document in which it is hidden, it is required that these changes are difficult to be identified. The difference in the pixel values can be used for hiding the information. To enlarge the capacity of the hidden secret information and to provide an imperceptible stego-image for human vision, a novel steganographic approach using five pixel pair differencing (FPPD) is proposed in this paper. Experimental results shows that the proposed algorithm provides increased capacity of message hiding along with better quality of stego images.
Article
Objective methods for assessing perceptual image quality traditionally attempted to quantify the visibility of errors (differences) between a distorted image and a reference image using a variety of known properties of the human visual system. Under the assumption that human visual perception is highly adapted for extracting structural information from a scene, we introduce an alternative complementary framework for quality assessment based on the degradation of structural information. As a specific example of this concept, we develop a Structural Similarity Index and demonstrate its promise through a set of intuitive examples, as well as comparison to both subjective ratings and state-of-the-art objective methods on a database of images compressed with JPEG and JPEG2000.
Conference Paper
Steganography gained importance in the past few years due to the increasing need for providing secrecy in an open environment like the internet. With almost anyone can observe the communicated data all around, steganography attempts to hide the very existence of the message and make communication undetectable. Many techniques are used to secure information such as cryptography that aims to scramble the information sent and make it unreadable while steganography is used to conceal the information so that no one can sense its existence. In most algorithms used to secure information both steganography and cryptography are used together to secure a part of information. Steganography has many technical challenges such as high hiding capacity and imperceptibility. In this paper, we try to optimize these two main requirements by proposing a novel technique for hiding data in digital images by combining the use of adaptive hiding capacity function that hides secret data in the integer wavelet coefficients of the cover image with the optimum pixel adjustment (OPA) algorithm. The coefficients used are selected according to a pseudorandom function generator to increase the security of the hidden data. The OPA algorithm is applied after embedding secret message to minimize the embedding error. The proposed system showed high hiding rates with reasonable imperceptibility compared to other steganographic systems.
Conference Paper
To increase the capacity of the hidden secret information and to provide a stego-image imperceptible for human vision, a novel steganographic approach based on tri-way pixel-value differencing (TPVD) is presented in this paper. This approach uses three different directional edges effectively to design the tri-way differencing scheme and to remove the capacity limitation of the original PVD method using only one direction. In addition, we propose an optimal selection approach for the reference point and adaptive rules to reduce distortion brought from setting larger embedding capacity. The theoretical estimation and experimental results demonstrate that our scheme can provide a superior embedding capacity. Besides, the embedded confidential information can be extracted from stego-images without the assistance of original images.