A new high capacity steganography based on bit-inverting method in DWT domain
Steganography is a technique which embeds the secret messages in the cover image and transmitted in such a way that the existence of information is undetectable. In this paper, we present a new technique that consists of two encoding algorithm such as Huffman encoding and bit inverting algorithm. In this technique, we proposed a modified secure and high capacity based steganography scheme of hiding a secret message such as text or image into a cover image. Our simulation results show that the algorithm has a good perceptual invisibility and high capacity in addition to be secure.
Keywords: Bus Inverting, Discrete Wavelet Transform (DWT), Huffman Coding, Steganography, Wavelet.
K. Lee and H. Chen, A High Capacity Image Steganographic Model, In IEEE Proceedings on Vision Image and Signal Processing, China, 147:3, (2000), 288-294.
P. V. Nadiya, B. M. Imran, Image steganography in DWT domain using double-stegging with RSA encryption, Signal Processing Image Processing & Pattern Recognition (ICSIPR), International Conference on, DOI: 10.1109/ICSIPR.2013.6497941, (7-8 Feb. 2013), 283-287. http://dx.doi.org/10.1109/ICSIPR.2013.6497941.
G. Prabakaran and R. Bhavani, A Modified Secure Digital Image Steganography Based on Discrete Wavelet Transform, International Conference on Computing Electronics and Electrical Technologies (ICEET), DOI:10.1109/ICCEET.2012.6203811, (2012), 1096 - 1100. http://dx.doi.org/10.1109/ICCEET.2012.6203811.
H. Reddy and K. Raja, High Capacity and Security Steganography Using Discrete Wavelet transform, International Journal of Computer Science and Security (IJCSS), 3: 6, (2008), 462-472.
A. Nag, S. Biswas, D. Sarkar and P. Sarkar, Novel Technique for Image Steganography Based on DWT and Huffman Encoding, International Journal of Computer Science and Security (IJCSS), 4:6, (2008).
P. C. Mandal, Modern Steganographic technique: A Survey, International Journal of Computer Science & Engineering Technology (IJCSET), 3: 9, (Sep 2012), 444-448.
A. Abdelwahab and L. A. Hassaan, A Discrete Wavelet Transform Based Technique for Image Data Hiding, 25th National Radio Science Conference, DOI: 10.1109/NRSC.2008.4542319, (March 18‐20, (2008), 1–9. http://dx.doi.org/10.1109/NRSC.2008.4542319 .
B. Banik and Prof. Samir K. Bandyopadhyay, A DWT Method for Image Steganography, International Journal of Advanced Research in Computer Science and Software Engineering, 3:6, (June 2013), 983-989.
S. Liu, H. Yao, W. Gao, Steganalysis of Data hiding Techniques in Wavelet Domain, Proc. of Int, Conf. on Information Technology: coding and computing, (2004), 751-754.
M. Misiti, Y. Misiti, G. Oppenheim and J. Poggi, Wavelet Toolbox for Use with MATLAB, User Guide Math Works Inc., (2000).
A. Al-Ataby and F. AL-Naima, A Modified High Capacity Image Steganography Technique Based on Wavelet Transform, The Arab journal of Information Technology, 7: 4, (2010), 358-364.
G. Satyavathy and M. Punithavalli, LSB, 3D-DCT and Huffman Encoding based Steganography in Safe Message Routing and Delivery for Structured Peer-to-Peer Systems, IJCA Special Issue on Artificial Intelligence Techniques, (2011), 1-5.
M. Sharma, Compression Using Huffman Coding, IJCSNS International Journal of Computer Science and Network Security, 10:5, (May 2010), 133-141.
R. B. Lin and C. M. Tsai, Weight-based Bus-Invert Coding for Low-Power Applications, Processing of the 7th Asia and South Pacific Design Automation Conference and 15th International Conference on VLSI Design, DOI:10.1109/ASPDAC.2002.994897, (Jan. 2002), pp. 121-125. http://dx.doi.org/10.1109/ASPDAC.2002.994897.
A. Chawla and P. Shukla, A Modified Secure Digital Image Steganography Based on DWT Using Matrix Rotation Method, International Journal of Computer Science and Communication Engineering, 2:2, (2013), 20-25.
H. Motamedi, A. Jafari, A New Steganography Based on Denoising Methods in Wavelet Domain, International ISC Conference on Information Security and Cryptology, 9th, DOI: 10.1109/ISCISC.2012.6408185, (2012), 18-25. http://dx.doi.org/10.1109/ISCISC.2012.6408185.