Hybrid Steganography of Color Images Using Discrete Cosine Transform and Discrete Wavelet Transform

Document Type : Original Article

Authors

1 Dept. of Electrical Engineering and Eng., Faculty of Elect., Eng., zagazig University.

2 Dept. of Electronics and Electrical Communications, Faculty of Engineering, Menoufia University.

Abstract

; "> This paper introduces a hybrid approach for steganography of color images using Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). This approach is used for hiding more than one color image into an uncorrelated color
space “YDbDr” of a color cover image using the DWT and DCT. In this approach, the DCT coefficients of the secret image are weighted by a small factor and then embedded into the DWT of the cover image to keep the effect of steganography invisible, to make it more security by encrypting the secret data before embedding into a cover image. After that, we show the effect of additive white Gaussian noise (AWGN) on the proposed algorithm.

to; -webkit-text-stroke-width: 0px; ">[1] A. Cheddad, J. Condell, Kevin Curran, P. McKevitt.” Digital image
steganography: Survey and analysis of current methods”, science direct, Volume
90, Issue 3, March 2010, Pages 727752.
[2] M. N. Islam, M. F. Islam, K. Shahrabi, “Robust information security system
using steganography, orthogonal code and joint transform correlation” , Optik -
International Journal for Light and Electron Optics, Volume 126, Issue 23,
December 2015, Pages 4026-4031.
[3] S. Pereira, T. Pun,” Robust template matching for affine resistant image
watermarks”, IEEE Transactions on Image Processing ( Volume: 9, Issue: 6, Jun
2000).
[4] SudipGhosh, Sayandip De, Santi Prasad Maity, HafizurRahaman,” A novel
dual purpose spatial domain algorithm for digital image watermarking and
cryptography using Extended Hamming Code”, Electrical Information and
Communication Technology (EICT), 2015 2nd International Conference on, 28
January 2016
[5] Shruti C. Dande , Sushma S. Agrawal , Sunil R. Hirekhan ,“Implementation
of colour image steganography using LSB and edge detection technique: A
LabVIEW approach”, Communication and Signal Processing (ICCSP), 2016
International Conference on, Date Added to IEEE Xplore: 24 November 2016.
[6] P. Malathi, T. Gireeshkumar ,”Relating the Embedding Efficiency of LSB
Steganography Techniques in Spatial and Transform Domains”, Proceedings of
the 6th International Conference on Advances in Computing and
Communications , Volume 93, 2016, Pages 878885
[7] O. J.Sandoval; M. C.Hernandez; M. N.Miyatake; H. P.Meana; K.
Toscano,”MedinaImage-adaptive steganalysis for LSB Matching steganography
“, 2016 39th International Conference on Telecommunications and Signal
Processing (TSP) ,Pages: 478 483 .
[8] Cryptography and Coding: 12th IMA International Conference, IMACC 2009
[9] H.N. Latha, M.V. Palachandra, M. Rao ,” Real Time Implementation and
Performance Evaluation of WCDMA System over AWGN Channel on
TMS320C6713DSK”,Original Research Article Procedia Technology, Volume
4, 2012, Pages 82-86
st: auto; -webkit-text-stroke-width: 0[10] K. S. Seethalakshmi , Usha B A , Sangeetha K N ,” Security enhancement
in image steganography using neural networks and visual cryptography”, 2016
International Conference on Computation System and Information Technology
for Sustainable Solutions (CSITSS) , IEEE Conference Publications,Year: 2016
,Pages: 396 - 403
[11] S. Lahiri; P. Paul; S. Banerjee; S. Mitra; A. Mukhopadhyay; M.
Gangopadhyaya ,” Image steganography on coloured images using edge based
Data Hiding in DCT domain” , 2016 IEEE 7th Annual Information Technology,
Electronics and Mobile Communication Conference (IEMCON) ,Year: 2016 ,
Pages: 1 - 8, DOI: 10.1109/IEMCON.2016.7746270 ,IEEE Conference
Publications
[12] K. Muhammad, M. Sajjad, I. Mehmood, S.Rho, S. W. Baik ,” Image
steganography using uncorrelated color space and its application for security of
visual contents in online social networks” , Future Generation Computer
Systems, In Press, Corrected Proof, Available online 27 November 2016.
[13] Sahar A. El_Rahman , “ A comparative analysis of image steganography
based on DCT algorithm and steganography tool to hide nuclear reactors
confidential information” , Computers and Electrical Engineering ,Available
online 19 September 2016.
[14] H. Dadgostar, F. Afsari “Image steganography based on interval-valued
intuitionistic fuzzy edge detection and modified LSB” , Journal of Information
Security and Applications, Volume 30, October 2016, Pages 94-104
[15] SirajSidhik, S.K. Sudheer, V.P. MahadhevanPillai ,” Performance and
analysis of high capacity Steganography of color images involving Wavelet
Transform”, Optik - International Journal for Light and Electron Optics, Volume
126, Issue 23, December 2015, Pages 3755-3760
[16] D. Baby, J. Thomas, G. Augustine, E. George, N. R. Michael,” A Novel
DWT based Image Securing Method using Steganography”, International
Conference on Information and Communication Technologies (ICICT 2014), (
2015 ).
[17] Rachit Jain, J. B. Sharma,” Symmetric color image encryption algorithm
using fractional DRPM and chaotic baker map “,Recent Trends in Electronics,
Information & Communication Technology (RTEICT), IEEE International
Conference on, 09 January 2017
[18] A. Mehto, N. MehraAdaptive,” Lossless Medical Image Watermarking
Algorithm Based on DCT & DWT” ,Procedia Computer Science, Volume 78,
2016, Pages 88-94
[19] E. H. Houssein, M. A. S. Ali and A. E. Hassanien, "An image steganography
algorithm using Haar Discrete Wavelet Transform with Advanced Encryption
System," /2016 Federated Conference on Computer
[20] AkankshaKaushal, VineetaChaudhary,” Secured Image Steganography
using Different Transform Domain”,International Journal of Computer
Applications (0975 8887) Volume 77No.2, September 2013.
e-width: 0px; "> [21] K. RamamohanRao،P. Yip ,” Discrete Cosine Transform: Algorithms,
Advantages, Applications”COPY RIGHT ©1990 by ACADMIC PRESS ,INC.
[22] B. G. Banik and S. K. Bandyopadhyay, "Implementation of image
steganography algorithm using scrambled image and quantization coefficient
modification in DCT," 2015 IEEE International Conference on Research in
Computational Intelligence and Communication Networks (ICRCICN), Kolkata,
2015, pp. 400-405.
[23] M. R. Asif; Qi Chun; S. Hussain; M. S. FareedMultiple, “ licence plate
detection for Chinese vehicles in dense traffic scenarios”, IET Intelligent
Transport Systems ,IET Journals &Magazines,Year: 2016, Volume: 10, Issue: 8
,Pages: 535 - 544, DOI: 10.1049/iet-its.2016.0008.
[24] Z. Wang, A.C. Bovik, H.R. Sheik, E.P. Simoncell, “Image quality
assessment from error visibility to structural similarity”, IEEE Trans. Image
Process. 13 (4) (2004April) 600612.