Home   >   CSC-OpenAccess Library   >    Manuscript Information
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
N Sathisha, K Suresh Babu, K. B. Raja, K R Venugopal
Pages - 41 - 60     |    Revised - 01-03-2015     |    Published - 31-03-2015
Volume - 9   Issue - 2    |    Publication Date - March / April 2015  Table of Contents
Steganography, DTCWT, LWT, Stego Image, Cover Image, Adaptive Scaling, Entropy.
Steganography is an authenticated technique for maintaining secrecy of embedded data. Steganography provides hardness of detecting the hidden data and has a potential capacity to hide the existence of confidential data. In this paper, we propose a novel steganography using coefficient replacement and adaptive scaling based on Dual Tree Complex Wavelet Transform (DTCWT) technique. The DTCWT and LWT 2 is applied on cover image and payload respectively to convert spatial domain into transform domain. The HH sub band coefficients of cover image are replaced by the LL sub band coefficients of payload to generate intermediate stego object and the adaptive scaling factor is used to scale down intermediate stego object coefficient values to generate final stego object. The adaptive scaling factor is determined based on entropy of cover image. The security and the capacity of the proposed method are high compared to the existing algorithms.
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 SlideShare 
6 PdfSR 
Ajit Danti and G R Manjula, “Secured Data Hiding of Invariant Sized Secrete Image based on Discrete and Hybrid Wavelet Transform,” IEEE International Conference on Computational Intelligence & Computing Research, pp. 1 – 6, 2012.
Arnab Kumar Maji, Rajkumar Pal and Sudipta Roy, “A Novel Steganographic Scheme using Sudoku,” International Conference on Electrical Information and Communication Technology (EICT), 2013 pp. 1 – 6, 2013.
Ashish Soni, Jitendra jain and Rakesh Roshan, “Image Steganography using Discrete Fractional Fourier Transform,” International Conference on Intelligent Systems and Signal Processing, pp. 97 – 100. 2013.
BaolongGuo, Leida Li, Jeng-Shyang Pan, Liu Yang and Xiaoyue Wu, “Robust Image Watermarking Using Mean Quantization in DTCWT Domain,” Eighth International Conference on Intelligent Systems Design and Applications, pp. 19 – 22, 2008.
Chi Yuan Lin, Shu cing Wu and Jyuan Jie Wang, “VQ Image Compression Steganography based on Section based Informed Embedding,” International Symposium on Computer, Consumer and Control, pp. 111 – 114, 2014.
Chiang- lung Liu and Shiang- Rong Liao, “High Performance JPEG Steganography Using Complementary Embedding Stratergy,” Pattern Recognition, Vol. 41, issue 9, Elsevier, pp. 2945-2955, September 2008.
Chin - Chan Chang and Hsien- Wen Tseng, “A Steganographic Method for Digital Images Using Side,” Pattern Recognition Letters, vol 25, issue 12, Elsevier, pp. 1431-1437, September 2004.
Ching-Nung Yang, Tse- Shih Chen, Kun Hsuan and Chung- Chun Wang, “Improvement of Image Sharing with Steganography and Authentication,” Journal of System and Software, Elsevier , Vol 80, issue 7, pp. 1070 - 1076, July 2007.
H S Manjunatha Reddy and K B Raja, “Wavelet Based Non LSB Steganography,” International Journal of Advanced networking and applications, vol 3, issue 3 pp. 1203 – 1209, 2011.
H S Manjunatha Reddy and K B Raja, “Wavelet Based Secure Steganography With Scrambled Payload,” International Journal of Innovative Technology and Exploring Engineering, vol. 1, issue 2, pp.121 - 129, July 2012.
H. S. Manjunatha Reddy and K. B. Raja, “High Capacity and Security Steganography Using Discrete Wavelet Transform,” International Journal of Computer Science and Security, vol. 3, issue 6 , pp. 462-472, 2010.
Hoda Motamedi and Ayyoob Jafari, “A New Image Steganography based on Denoising Methods in Wavelet Domain,” Ninth International Conference on Information Security and Cryptology, pp. 18 – 25, 2012.
Ivan.W.Selesnick, Richard.G.Baraniuk and Nick G. Kingsbury, “The Dual-Tree Complex Wavelet Transform,” Signal Processing Magazine IEEE, Vol. 22, issue 6, pp. 123-151, 2005.
K B Shiva Kumar, K B Raja, R K Chhotray and Sabyasachi Patnaik, “Steganography Based on Payload Transformation,” International Journal of Computer Science Issues, vol 8, Issue 2, pp. 241-246, March 2011.
K B Shiva Kumar, K.B. Raja, R. K. Chhotray and Sabyasachi. Patnaik, “Bit Length Replacement Steganography Based on DCT Coefficients,” International Journal of Engineering Science and Technology, vol. 2(8), pp. 3561-3570, 2010.
K B ShivaKumar, K B Raja and Sabyasachi Patnaik, “Hybrid Domain LSB Steganography,” International Journal of Computer Applications, Vol 19. No.7, pp. 35 - 39, April 2011.
L Jani Anbarasi and S.Kannan, “Secured Secret Color Image with Steganography,” IEEE International Conference on Recent Trends in Information Technology, pp. 44 - 48, 2012.
Md. Rashedul Islam, Ayasha Siddiqa, Md. Palash Uddin, Ashis Kumar and Md. Delowar Hossain, “An Efficient Filtering based Approach Improving LSB Image Steganography using Status Bit along with AES Cryptography,” Third IEEE International Conference on Informatics, Electronics and Vision, pp. 1-6, 2014.
Najeena K S and B M Imran, “An Efficient Steganographic Technique based on Chaotic Maps and Adpative PPM Embedding,” International Conference on Signal Processing, Image Processing & Pattern Recognition, pp. 293 – 297, 2013.
Ran-Zan Wang and Yeh-Shun Chen, “High-Payload Image Steganography using Two-way block Matching,” IEEE Signal Processing Letters, Vol. 13, Issue 3, pp. 161 – 164, 2006.
Rig Das and Themirchon Tuithung, “A Novel Steganography Method for Image Processing Based on Huffman Encoding,” Third National Conference on Emerging Trends and Applications in Computer Science, pp. 14-18, March 2012.
Tasnuva Mahjabin, Syed Monowar Hossain, and Md. Shariful Haque, “A Block Based Data Hiding Method in Images using Pixel Value Differencing and LSB Substitution Method,” Fifteenth International Conference on Computers and Information Technology, pp. 168 – 172. 2012.
V Sathya, K Balasubramaniyam, N Murali, M RajaKumaran and Vigneswari, “Data Hiding in Audio Signal, Video Signal, Text and JPEG Images,” International Conference on Advances in Engineering Science and Management, pp. 741-746, 2012.
Vojtech Holub and Jessica Fridrich, “Designing Steganographic Distortion using Directional filters,” IEEE International Workshop on Information Forensics and Security, pp. 234 – 239, 2012.
W Sweldens, “The Lifting Scheme: A Construction of Second Generation Wavelets,” SIAM Journal in Math. Analysis, vol. 29, no. 2, pp.511 – 546, 1998.
Xinpeng Zhang and Shou Zhang Wang, “Vulnerability of Pixel Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security,” Pattern Recognition Letters, vol 25, issue 3, Elsevier, pp.331-339, February 2004.
Youngran Park, Hyunho Kang, Kazuhiko Yamaguchi and Kingo Kobayashi, “Intergrity Verification of Secret Information in Image Steganography,” The Twenty ninth Symposium on Information Theory and its Applications, pp. 1 – 4, 2006.
Yue Wu, Joseph P Noonan and SOS Agaian, “Shannon Entropy based Randomness Measurement and Test for Image Encryption,” Journal of Information sciences, Elsevier, pp. 1 – 23, 2011.
Zawawi M. N. Mahmood. R, Udzir. N, Ahmad. F and Desa J. M, “Active Warden as the Main Hindrance for Steganography Information Retrieval,” IEEE Information Retrieval and Knowledge Management International Conference, pp. 277-280, 2012.
Mr. N Sathisha
Government S K S J Technological Institute, Bangalore, India. - India
Dr. K Suresh Babu
Department of Electronics and Communication Engg. UVCE, BANGALORE UNIVERSITY, BANGALORE - India
Dr. K. B. Raja
Department of ECE, University Visvesvaraya College of Engineering, Bangalore, India - India
Dr. K R Venugopal
University Visvesvaraya College of Engineering, Bangalore, India - India

View all special issues >>