Abstract
Transform domain Steganography techniques embed secret message in significant areas of cover image. These techniques are generally more robust against common image processing operations. In this paper, we propose an image Steganography method using singular value decomposition (SVD) and integer wavelet transform (IWT). SVD and IWT strengthen the performance of image Steganography and improve the perceptual quality of Stego images. Results have been taken over standard image data sets and compared with discrete cosine transform (DCT) and redundant discrete wavelet transform (RDWT) based image Steganography methods using peak signal to noise ratio (PSNR) correlation coefficients (CC) metrics. Experimental results show that the proposed SVD and IWT based method provides more robustness against image processing and geometric attacks, such as JPEG compression, low-pass filtering, median filtering, and addition of noise, scaling, rotation, and histogram equalization.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Fridrich, J.: Steganography in digital media: principles, algorithms, and applications. Cambridge University Press (2010)
Atawneh, S., Almomani, A., Sumari, P.: Steganography in digital images: common approaches and tools. IETE Technical Review 30(4), 344–358 (2013)
Cheddad, A., Condell, J., Curran, K., Kevitt, M.P.: Digital image Steganography: survey and analysis of current methods. Signal Processing 90(3), 727–752 (2010)
Cox, J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital watermarking and Steganography. Elsevier (2008)
Katzenbeisser, S., Petitcolas, F.A.P.: Information hiding techniques for Steganography and digital watermarking. Artech House Inc., Norwood (2000)
Johnson, N.F., Jajodia, S.: Exploring Steganography: seeing the unseen. IEEE Computer 31(2), 26–34 (1998)
Westfield, A., Pfitzmann, A.: Attacks on steganographic systems. In: Lecture Notes in Computer Science, vol. 1768, pp. 61−75. Springer (2000)
Singh, S., Siddiqui, T.J.: A security enhanced robust steganography algorithm for data hiding. International Journal of Computer Science Issues 9(3), 131–139 (2012)
Singh, S., Siddiqui, T.J.: Robust image data hiding technique for copyright protection. International Journal of Information Security and Privacy 7(2), 44–56 (2013)
Singh, S., Siddiqui, T.J.: Transform domain techniques for image steganography. Information Security in Diverse Computing Environments, 245−259. IGI global (2014)
Devaney, R.: An Introduction to chaotic dynamical systems, 2nd edn. Adddison-Wiesley (1989)
Sun, X.H., Dai, Y.W., Wang, Z.Q.: The generation of chaotic sequence and its application to image encryption. Journal of Nanjing Normal University (Engineering and Technology) 4(1), 56–78 (2004)
Jessa, M.: The period of sequences generated by tent- like maps. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications 49(1), 84–88 (2002)
Kakarala, R., Ogunbona, P.O.: Signal analysis using a multiresolution form of the singular value decomposition. IEEE Transactions on Image Processing 10(5), 724–735 (2001)
Liu, R., Tan, T.: An SVD-based watermarking scheme for protecting rightful ownership. IEEE Transactions on Multimedia 4(1), 121–128 (2002)
Chang, C.C., Tsai, P., Lin, C.C.: SVD-based digital image watermarking scheme. Pattern Recognition Letters 26(10), 1577–1586 (2005)
Wang, M.S., Chen, W.C.: A hybrid DWT-SVD copyright scheme based on K-mean clustering and visual cryptography. Computer Standard and Interfaces 31(4), 750–762 (2009)
Calderbank, A.R., Daubechies, I., Sweldens, W., Yeo, B.L.: Wavelet transforms that map integers to integers. Applied Computation Harmonic Analysis 5(3), 332–369 (1998)
Arsalan, M., Malik, S.A., Khan, A.: Intelligent reversible watermarking in integer wavelet domain for medical images. Journal of System and Software 85(4), 883–894 (2012)
Sweldens, W.: The lifting scheme: a construction of second generation wavelets. SIAM Journal Mathematical Analysis 29(2), 511–546 (1998)
Adams, M.D., Kossentini, F.: Reversible integer-to-integer wavelet transforms for image compression: performance evaluation and analysis. IEEE Transactions on Image Processing 9(6), 1010–1024 (2000)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Singh, S., Singh, R., Siddiqui, T.J. (2016). Singular Value Decomposition Based Image Steganography Using Integer Wavelet Transform. In: Thampi, S., Bandyopadhyay, S., Krishnan, S., Li, KC., Mosin, S., Ma, M. (eds) Advances in Signal Processing and Intelligent Recognition Systems. Advances in Intelligent Systems and Computing, vol 425. Springer, Cham. https://doi.org/10.1007/978-3-319-28658-7_50
Download citation
DOI: https://doi.org/10.1007/978-3-319-28658-7_50
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-28656-3
Online ISBN: 978-3-319-28658-7
eBook Packages: EngineeringEngineering (R0)