IMAGE IN IMAGE STEGANOGRAPHY USING WAYELET TRANSFORM

Main Article Content

Sonia A. R. Mohammed Ali

Abstract

This paper describes a stego system in which a gray scale image is embedded in another one.Wavelet transform of both the cover image and the embedded image is used to sort their subbands energies to guarantee that the embedded image will be inserted in the low frequency components of the cover image with little perceptual distortion. Embedding by this way increases the robustness of the system but affects the syster 1 imperceptibility, so a variable scaling factor (a) is used to attenuate the components of the embedded image before adding them to those of the cover image. It is found that the stego image with peak signal-to-noise ratio (PSNR) of about 30 dB has goo 1 imperceptibility.The attacker is proposed to be active, so compression is applied to the stego image. According to this, the scaling factor must be increased to compromise between the quality of the stego and the reconstructed images. This increment reduces the imperceptibility of the stego image and here the trade off between the imperceptibility and the robustness occurs.The attack is proposed to be stego known, so that to increase the security of the system, a stego key is generated from the embedded image itself and is transmitted separately, making the system type secret key steganography.The size of the embedded image obtained in the work is one quarter the size of the cover image that may be considered good comparing with the available systems.

Article Details

How to Cite
“IMAGE IN IMAGE STEGANOGRAPHY USING WAYELET TRANSFORM” (2002) Journal of Engineering, 8(04), pp. 331–346. doi:10.31026/j.eng.2002.04.05.
Section
Articles

How to Cite

“IMAGE IN IMAGE STEGANOGRAPHY USING WAYELET TRANSFORM” (2002) Journal of Engineering, 8(04), pp. 331–346. doi:10.31026/j.eng.2002.04.05.

Publication Dates

References

Christian Cachin (1998), "An Information-Theoretic Model for Steganography", Information Hiding; Second Int. Workshop Proc., Portland, Oregon, USA.

D. Salomon (2000) "Data Compression, the Complete Reference", Springer-Verlag. New York, In:

H. H. Marza (2001), "Text in Image Steganography Techniques", M.Sc. Thesis, Computer Science Dept., College of Science, University of Baghdad, Baghdad, Iraq.

Ingenar J. Cox, Joe Kilian, Tom Leighton and Talal Shamoon (1996), "A Secure, Robust Watermark for Multimedia", Information Hiding; First Int. Workshop Proc., Cambridge, U.K., May 30- June 1.

Jack Brassl and Larry O'Gorman (1996), "Watermarking Document Images with Bounding Bex Expansion", Information Hiding; First Int. Workshop Proc., Cambridge, U.K., May 30- June 1.

L.Z. Avedissian (2000), "Image in Image Steganography", Ph. D. Thesis, Computer Science Dept. College of Science, University of Technology, Baghdad, Iraq.

Neil F. Johnson, Zoran Duric, and Sushil Jajodia (2001), INFORMATION HIDING: Steganography and Watermarking-Attacks and Countermeasure", Kluwer Acadimic Publishers.

N. K. Abdulaziz and K. K. Pang (2000), "Robust Data Hiding for Images", Proc. IEEE, pp. 380 383.

S. Areepongsa, Y. F. Syed, N. Naewkamnerd, and K. R. Rao, "Steganography for a Low Bit Rate Wavelet Based Image", http: // issu. gmu. edu-njohnson/ steganography.

S. Burrus, R. Gopinath, and H. Guo (1998), " Introduction to Wavelets and Wavelet Transform", Upper Saddle, New Jersey: Prentice Hall.

Stefan Katzenbeisser and Fabien A. P. Peticolas (2000), "Information Hiding Techniques for Steganography and digital Watermarking", Artech House.

U. 1. Ibrahim (2001), "Text in Image Steganography", M. Sc., Computer Science Dept., College of Science, University of Technology. Baghdad