Data Hiding In Image By LSBMR Algorithm WithWavelet Transform

Shanthakumari. R*, Arul M**
* Assistant Professor(SLG), Department of Information Technology, Kongu Engineering College, Perundurai, India.
** PG Scholar, Department of Information Techonology, Kongu Engineering College, Perundurai, India.
Periodicity:April - June'2015
DOI : https://doi.org/10.26634/jdp.3.2.3383

Abstract

Image steganography is the art of hiding information into a cover image. Steganography gained importance in the past few years due to the increasing need for providing secrecy in an open environment like the internet. The Least Significant Bit (LSB) substitution is the most commonly used spatial domain technique. In LSB substitution technique the least significant bit of each pixel of the cover is replaced by the secret message bits. In transform domain technique, the transform is applied on cover image and the secrete message bits are hidden inside the coefficients of the transformed cover image. Image steganography based on DWT (Discrete Wavelet Transform), is used to transform original image (cover image) from spatial domain to frequency domain. Two dimensional Discrete Wavelet Transform (2D DWT) is performed on a cover image of size performed on the secret messages before embedding. Then each bit of secret message is embedded using LSBMR algorithm in the selected frequency coefficients from Discrete Wavelet Transform. The experimental results show that the algorithm has a high capacity and a good invisibility. Moreover PSNR of cover image with stego-image shows the better results in comparison with other existing steganography approaches. Furthermore, satisfactory security is maintained since the secret message cannot be extracted without knowing rules.

Keywords

Steganography, Discrete Wavelet Transform, Least Significant Bit.

How to Cite this Article?

Shanthakumari.R and Arul.M.(2015). Data Hiding In Image By LSBMR Algorithm With Wavelet Transform. i-manager's journal on Digital Signal Processing, 3(2), 19-24. https://doi.org/10.26634/jdp.3.2.3383

References

[1]. Akhil Pratap Shing, Agya Mishra (2011). 'Wavelet Based Watermarking on Digital Image', Indian Journal of Computer Science and Engineering, Vol. 3, No. 12 pp. 130-138
[2]. Baisa L. Gunjal, R.R. Manthalkar (2010). 'An Overview of Transform Domain Robust Digital Image Water marking Algorithms', Journal of Emerging Trends in Computing and Information Sciences, Vol. 2, No. 1,pp. 2010-2015
[3]. Jarno Mielikainen (2006). 'LSB Matching Revisited', IEEE Signal Processing Letters, Vol. 13, No. 5,pp. 285
[4]. Leung H Y, ChengL M, Liu F, Fu Q K (2013). 'Adaptive Reversible Data Hiding on Block Median Preservation and Modification of Prediction Errors', The Journal of Systems and Software, Vol-92, No.1,pp. 54-62
[5]. Mabhilash reddy et al. (2013). 'DWT and LSB Algorithm Based Image Hiding in a Video', [IJESAT] International Journal of Engineering Science and Advanced Technology, Vol-3, No.4, pp. 170-175
[6]. Moerland, T.Steganography and Steganalysis, Leiden Institute of Advanced Computing Science, www.liacs.nl/ home/tmoerl/privtech.pdf
[7]. Nikita Kashyap (2012). 'Image Watermarking Using 3- Level Discrete Wavelet Transform (DWT)', I.J.Modern Education and Computer Science, Vol-3,pp. 50-56
[8]. Po-Yueh Chen and Hung-Ju Lin (2006). 'A DWT Based Approach for Image Steganography', International Journal of Applied Science and Engineering, Vol -4, No.3,pp. 275- 290
[9]. Urmila Kumari, Saroj Hiranwal (2013). 'Data Hiding in Gray-Scale Images by LSB Method using IWT with Lifting Scheme', International Journal on Recent and Innovation Trends in Computing and Communication, Vol-1, No.10, pp.782-7
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.