This document presents a novel image steganography technique based on discrete wavelet transform (DWT) and Huffman encoding. The technique embeds a secret image into a cover image in the frequency domain after applying DWT. It first Huffman encodes the secret image, then embeds the encoded bits in the high frequency DWT coefficients of the cover image. Experimental results show the technique achieves a high embedding capacity while maintaining a good peak signal-to-noise ratio between the cover and stego images, providing both invisibility and security as the secret image cannot be extracted without the Huffman table. Compared to an existing DWT-based method, the proposed technique provides better image quality for the same embedding capacity.
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
The need for keeping safe secrecy of secret and sensitive data has been ever increasing with the new
developments in digital system. In this paper, we present an increased way for getting embedding encrypted
secret facts in gray scale images to give high level safety of facts for news over unsecured narrow channels
Cryptography and Steganography are two closely related techniques are used in proposed system. Cryptography
gets into making one of religion the secret note into a non-recognizable chipper. Steganography is then sent in
name for using Double-Stegging to fix this encrypted data into a cover thing by which something is done and
keeps secret its existence.
A Hybrid Approach for Ensuring Security in Data Communication cscpconf
For a very long time, various forms of steganographic and cryptographic techniques have been used to ensure security in data communication. Whereas steganography is the art of hiding the fact that any communication is taking place, cryptography on the other hand ensures data security by changing the very form of the data being communicated by using a symmetric or an asymmetric key. But, both the methods are susceptible to being weakened by a challenger. In
steganography, there is always a possibility of detection of the presence of a message by the opponent and most of the cryptographic techniques are vulnerable to disclosure of the key. This paper proposes a hybrid approach where in image steganography and cryptography are combined to protect the sensitive data thereby ensuring improved security in data
communication. To find the impact of the same, a simulator was designed in MATLAB and corresponding time complexities were recorded. The simulation results depict that this hybrid
technique although increases the time complexity but ensures an enhanced security in data communication.
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...gerogepatton
In this paper, an efficiently DWT-based watermarking technique is proposed to embed signatures in images to attest the owner identification and discourage the unauthorized copying. This paper deals with a fuzzy inference filter to choose the larger entropy of coefficients to embed watermarks. Unlike most previous watermarking frameworks which embedded watermarks in the larger coefficients of inner coarser subbands, the proposed technique is based on utilizing a context model and fuzzy inference filter by embedding watermarks in the larger-entropy coefficients of coarser DWT subbands. The proposed approaches allow us to embed adaptive casting degree of watermarks for transparency and robustness to the general image-processing attacks such as smoothing, sharpening, and JPEG compression. The approach has no need the original host image to extract watermarks. Our schemes have been shown to provide very good results in both image transparency and robustness.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
The need for keeping safe secrecy of secret and sensitive data has been ever increasing with the new
developments in digital system. In this paper, we present an increased way for getting embedding encrypted
secret facts in gray scale images to give high level safety of facts for news over unsecured narrow channels
Cryptography and Steganography are two closely related techniques are used in proposed system. Cryptography
gets into making one of religion the secret note into a non-recognizable chipper. Steganography is then sent in
name for using Double-Stegging to fix this encrypted data into a cover thing by which something is done and
keeps secret its existence.
A Hybrid Approach for Ensuring Security in Data Communication cscpconf
For a very long time, various forms of steganographic and cryptographic techniques have been used to ensure security in data communication. Whereas steganography is the art of hiding the fact that any communication is taking place, cryptography on the other hand ensures data security by changing the very form of the data being communicated by using a symmetric or an asymmetric key. But, both the methods are susceptible to being weakened by a challenger. In
steganography, there is always a possibility of detection of the presence of a message by the opponent and most of the cryptographic techniques are vulnerable to disclosure of the key. This paper proposes a hybrid approach where in image steganography and cryptography are combined to protect the sensitive data thereby ensuring improved security in data
communication. To find the impact of the same, a simulator was designed in MATLAB and corresponding time complexities were recorded. The simulation results depict that this hybrid
technique although increases the time complexity but ensures an enhanced security in data communication.
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...gerogepatton
In this paper, an efficiently DWT-based watermarking technique is proposed to embed signatures in images to attest the owner identification and discourage the unauthorized copying. This paper deals with a fuzzy inference filter to choose the larger entropy of coefficients to embed watermarks. Unlike most previous watermarking frameworks which embedded watermarks in the larger coefficients of inner coarser subbands, the proposed technique is based on utilizing a context model and fuzzy inference filter by embedding watermarks in the larger-entropy coefficients of coarser DWT subbands. The proposed approaches allow us to embed adaptive casting degree of watermarks for transparency and robustness to the general image-processing attacks such as smoothing, sharpening, and JPEG compression. The approach has no need the original host image to extract watermarks. Our schemes have been shown to provide very good results in both image transparency and robustness.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An ideal steganographic scheme in networks using twisted payloadeSAT Journals
Abstract With the rapid development of network technology, information security has become a mounting problem. Steganography involves hiding information in a cover media, in such a way that the cover media is not supposed to have any confidential message for its unintentional addressee In this paper, an ideal steganographic scheme in networks is proposed using twisted payload. The confidential image values are twisted by using scrambling techiques.The Discrete Wavelet Transform (DWT) is applied on cover image and Integer Wavelet Transform (IWT) is applied to the scrambled confidential image. Merge operation is done on both images and Inverse DWT is computed on the same to get the stego image. The information hiding algorithm is the reverse process of the extracting algorithm. After this an ideal steganographic scheme is applied which generates a stego image which is immune against conventional attack and performs good perceptibility compared to other steganographic approaches. Index Terms: Network security, Steganography, Discrete Wavelet Transform, Integer Wavelet Transform, Modified Arnold Transform, Merge Operation, Quality Measures
A novel secure image steganography method based on chaos theory in spatial do...ijsptm
This paper presents a novel approach of building a secure data hiding technique in digital images. The
image steganography technique takes the advantage of limited power of human visual system (HVS). It uses
image as cover media for embedding secret message. The most important requirement for a steganographic
algorithm is to be imperceptible while maximizing the size of the payload. In this paper a method is
proposed to encrypt the secret bits of the message based on chaos theory before embedding into the cover
image. A 3-3-2 LSB insertion method has been used for image steganography. Experimental results show a
substantial improvement in the Peak Signal to Noise Ratio (PSNR) and Image Fidelity (IF) value of the
proposed technique over the base technique of 3-3-2 LSB insertion.
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
This paper presents a novel 2-3-3 LSB insertion method. The image steganography takes the advantage of human eye limitation. It uses color image as cover media for embedding secret message.The important quality of a steganographic system is to be less distortive while increasing the size of the secret message. In this paper a method is proposed to embed a color secret image into a color cover image. A 2-3-3 LSB insertion method has been used for image steganography. Experimental results show an improvement in the Mean squared error (MSE) and Peak Signal to Noise Ratio (PSNR) values of the proposed technique over the base technique of hash based 3-3-2 LSB insertion.
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTCSCJournals
Steganography is an authenticated technique for maintaining secrecy of embedded data. Steganography provides hardness of detecting the hidden data and has a potential capacity to hide the existence of confidential data. In this paper, we propose a novel steganography using coefficient replacement and adaptive scaling based on Dual Tree Complex Wavelet Transform (DTCWT) technique. The DTCWT and LWT 2 is applied on cover image and payload respectively to convert spatial domain into transform domain. The HH sub band coefficients of cover image are replaced by the LL sub band coefficients of payload to generate intermediate stego object and the adaptive scaling factor is used to scale down intermediate stego object coefficient values to generate final stego object. The adaptive scaling factor is determined based on entropy of cover image. The security and the capacity of the proposed method are high compared to the existing algorithms.
Implementation of Image Steganography Using 2-Level DWT Technique .............................................1
Aayushi Verma, Rajshree Nolkha, Aishwarya Singh and Garima Jaiswal
Efficient Neighbor Routing in Wireless Mesh Networks.......................................................................1
V. Lakshmi Praba and A. Mercy Rani
Content Based Messaging Model for Library Information System........................................................1
Surbhi Agarwal, Chandrika Chanda and Senthil Murugan B.
Building an Internal Cloud for IT Support Organisations: A Preview .....................................................1
S. M. M. M Kalyan Kumar and Dr S. C. Pradhan
Use of Intelligent Business, a Method for Complete Fulfillment of E-government ................................1
M. Nili Ahmadabadi, Masoud Najafi and Peyman Gholami
Comparison of Swarm Intelligence Techniques ...................................................................................1
Prof. S. A. Thakare
An Efficient Rough Set Approach in Querying Covering Based Relational Databases.............................1
P. Prabhavathy and Dr. B. K. Tripathy
An improved security and message capacity using AES and Huffman coding on ima...TELKOMNIKA JOURNAL
Information security is very important and has been widely implemented. Cryptography and steganography are two common methods that can be implemented to secure and conceal the information. In this research, the proposed AES algorithm for cryptography and DWT for steganography. However, in case of implementing DWT as steganography, there is a weakness which is a lower capacity. Based on DWT’s problem, proposed Huffman Coding to reduce the total of the message’s bit and increase the capacity. In the implementation, a message will be processed by using AES and compressed by using Huffman Coding then conceal in a cover using DWT. After doing several experiments using a 128x128 pixel message image and a 512x512 pixel of the cover image, achieved the average of MSE is 1.5676 and the average of PSNR result is above 40 db which is 46.1878.
In this paper steganography is used to hide the data inside the images. Steganography is the science that involves
communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. The main goal of
steganography is to ensure that the transmitted message is completely masked, thereby ensuring that the message is accessible
only to the intended receiver and not to any intruders or unauthorized parties. This work focuses on the image steganography with
an image compression using least significant bit with Discrete Wavelet Transform (DWT) on FPGA Spartan III Evaluation
Development Kit (EDK). Current trends support digital image files as the cover file to hide another digital file with secret
message or data. At receiver side, using Inverse Discrete Wavelet transform, both original image as well as hidden data can be
successfully extracted.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a linear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An ideal steganographic scheme in networks using twisted payloadeSAT Journals
Abstract With the rapid development of network technology, information security has become a mounting problem. Steganography involves hiding information in a cover media, in such a way that the cover media is not supposed to have any confidential message for its unintentional addressee In this paper, an ideal steganographic scheme in networks is proposed using twisted payload. The confidential image values are twisted by using scrambling techiques.The Discrete Wavelet Transform (DWT) is applied on cover image and Integer Wavelet Transform (IWT) is applied to the scrambled confidential image. Merge operation is done on both images and Inverse DWT is computed on the same to get the stego image. The information hiding algorithm is the reverse process of the extracting algorithm. After this an ideal steganographic scheme is applied which generates a stego image which is immune against conventional attack and performs good perceptibility compared to other steganographic approaches. Index Terms: Network security, Steganography, Discrete Wavelet Transform, Integer Wavelet Transform, Modified Arnold Transform, Merge Operation, Quality Measures
A novel secure image steganography method based on chaos theory in spatial do...ijsptm
This paper presents a novel approach of building a secure data hiding technique in digital images. The
image steganography technique takes the advantage of limited power of human visual system (HVS). It uses
image as cover media for embedding secret message. The most important requirement for a steganographic
algorithm is to be imperceptible while maximizing the size of the payload. In this paper a method is
proposed to encrypt the secret bits of the message based on chaos theory before embedding into the cover
image. A 3-3-2 LSB insertion method has been used for image steganography. Experimental results show a
substantial improvement in the Peak Signal to Noise Ratio (PSNR) and Image Fidelity (IF) value of the
proposed technique over the base technique of 3-3-2 LSB insertion.
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
This paper presents a novel 2-3-3 LSB insertion method. The image steganography takes the advantage of human eye limitation. It uses color image as cover media for embedding secret message.The important quality of a steganographic system is to be less distortive while increasing the size of the secret message. In this paper a method is proposed to embed a color secret image into a color cover image. A 2-3-3 LSB insertion method has been used for image steganography. Experimental results show an improvement in the Mean squared error (MSE) and Peak Signal to Noise Ratio (PSNR) values of the proposed technique over the base technique of hash based 3-3-2 LSB insertion.
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTCSCJournals
Steganography is an authenticated technique for maintaining secrecy of embedded data. Steganography provides hardness of detecting the hidden data and has a potential capacity to hide the existence of confidential data. In this paper, we propose a novel steganography using coefficient replacement and adaptive scaling based on Dual Tree Complex Wavelet Transform (DTCWT) technique. The DTCWT and LWT 2 is applied on cover image and payload respectively to convert spatial domain into transform domain. The HH sub band coefficients of cover image are replaced by the LL sub band coefficients of payload to generate intermediate stego object and the adaptive scaling factor is used to scale down intermediate stego object coefficient values to generate final stego object. The adaptive scaling factor is determined based on entropy of cover image. The security and the capacity of the proposed method are high compared to the existing algorithms.
Implementation of Image Steganography Using 2-Level DWT Technique .............................................1
Aayushi Verma, Rajshree Nolkha, Aishwarya Singh and Garima Jaiswal
Efficient Neighbor Routing in Wireless Mesh Networks.......................................................................1
V. Lakshmi Praba and A. Mercy Rani
Content Based Messaging Model for Library Information System........................................................1
Surbhi Agarwal, Chandrika Chanda and Senthil Murugan B.
Building an Internal Cloud for IT Support Organisations: A Preview .....................................................1
S. M. M. M Kalyan Kumar and Dr S. C. Pradhan
Use of Intelligent Business, a Method for Complete Fulfillment of E-government ................................1
M. Nili Ahmadabadi, Masoud Najafi and Peyman Gholami
Comparison of Swarm Intelligence Techniques ...................................................................................1
Prof. S. A. Thakare
An Efficient Rough Set Approach in Querying Covering Based Relational Databases.............................1
P. Prabhavathy and Dr. B. K. Tripathy
An improved security and message capacity using AES and Huffman coding on ima...TELKOMNIKA JOURNAL
Information security is very important and has been widely implemented. Cryptography and steganography are two common methods that can be implemented to secure and conceal the information. In this research, the proposed AES algorithm for cryptography and DWT for steganography. However, in case of implementing DWT as steganography, there is a weakness which is a lower capacity. Based on DWT’s problem, proposed Huffman Coding to reduce the total of the message’s bit and increase the capacity. In the implementation, a message will be processed by using AES and compressed by using Huffman Coding then conceal in a cover using DWT. After doing several experiments using a 128x128 pixel message image and a 512x512 pixel of the cover image, achieved the average of MSE is 1.5676 and the average of PSNR result is above 40 db which is 46.1878.
In this paper steganography is used to hide the data inside the images. Steganography is the science that involves
communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. The main goal of
steganography is to ensure that the transmitted message is completely masked, thereby ensuring that the message is accessible
only to the intended receiver and not to any intruders or unauthorized parties. This work focuses on the image steganography with
an image compression using least significant bit with Discrete Wavelet Transform (DWT) on FPGA Spartan III Evaluation
Development Kit (EDK). Current trends support digital image files as the cover file to hide another digital file with secret
message or data. At receiver side, using Inverse Discrete Wavelet transform, both original image as well as hidden data can be
successfully extracted.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a linear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
Report compiled by: AmCham Singapore & the U.S. Chamber of Commerce. The purpose of the study is to measure business leaders' opinions on prospects for business growth and their perceptions about a series of factors that influence the business environment in the ASEAN region.
This was presented at 2009 Web World Conference.
The presentation analyzes some trends of cloud computing, and prospects the futures of cloud computing.
2015 North Bridge Future of Cloud Computing Study, with Wikibon |Broadest exploration of cloud trends, cloud migration & evolution of the cloud computing sector. Survey participation was the largest to date and included responses from 38 countries. 50 collaborators supported the 5th Annual Future of Cloud Computing study, which reveals that cloud has become an accepted and integral technology. Furthermore, the study shows that despite deployment gaps among clouds, we should expect a future powered by hybrid cloud technologies. The question of whether companies are using the cloud has morphed to how deeply cloud adoption is integrated within the business. From the bottom to the top, all products and services will in some way be powered by the cloud making the promise of goods and services that have the potential to be better tomorrow than today. IT departments have reclaimed the reins on driving company technology strategy and cloud adoption as roles, skills and processes have shifted. Importantly, We’re also seeing the emergence of the cloud as the only way businesses can truly get more out of their data including analyzing and executing on it real-time. On the investment front, 2015 could tip the scale from private to public capital for SaaS companies.
CompTIA’s new Trends in Cloud Computing study shows that while well over 90 percent of companies still claim to use some form of cloud computing, the pace of progress appears to have slowed. In some cases, it even appears to have taken a step backwards. What accounts for this phenomenon? Why does it seem like attitudes towards cloud have cooled, even though cloud continues to be a primary factor in IT growth? Download this study today and learn more about the state of the cloud.
In 2016, cloud technologies went mainstream. But with maturity came the realization that moving to the cloud doesn’t happen overnight. CIOs are prioritizing hosted computing and cloud data storage. But they’re approaching the shift as a gradual, multi-year journey.
Many startups and small businesses will continue to go all-in on cloud. But enterprises will find success in a slow but steady move from on-prem. Hybrid ecosystems—of data, software, and infrastructure—will be the reality for most established organizations.
As this shift to cloud progresses where are things are headed? This paper highlights the top cloud trends for 2017.
North Bridge and Wikibon, announced the results of its sixth annual Future of Cloud Computing Survey, which analyzes trends in cloud computing, adoption, use and challenges on a yearly basis. The study provides the broadest and deepest exploration of cloud in the industry with 53 leading cloud companies participating as collaborators. This year’s survey received 1,351 responses, a record-breaking number, representing a 60/40 balance of user/vendor perspectives spanning senior executives to practitioners across all industry sectors such as Technology, F.I.R.E., Government, Healthcare, Manufacturing, Media, Professional Services and Transportation.
According to Wikibon’s July 2016 report based on market conditions and recent public cloud revenue results of Amazon, Microsoft, Oracle, SAP, and IBM; public cloud spending is expected to accelerate rapidly, growing from $75B in 2015 to $522B by 2026 at a compound annual growth rate of 19%. Within each public cloud segment continued rapid growth rates are also expected during this period: SaaS (19% CAGR), PaaS (33% CAGR), and IaaS (18% CAGR). Wikibon estimates that by 2026, cloud will account for nearly 50% of spending related to enterprise hardware, software, and outsourcing services.
Cloud Strategy
Based on our survey, while slightly less than 50% of all companies either have a cloud first or cloud only strategy; some form of cloud strategy is pervasive among all with 90% of companies surveyed reporting that they use it in some way.
A new finding this year is the fact that a surprisingly high number, 42%, of companies surveyed derive 50% or more of their business through cloud-based applications. In fact, a whopping 79.9% of the companies surveyed were getting some revenue from the cloud. This speaks to the digital transformation occurring across many industries and how many are looking to not only move more quickly with the cloud but profit from it as well.
Read more: http://www.northbridge.com/2016-future-cloud-computing-survey
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINijcisjournal
Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover image. The extracted image is also similar to the secret image. This is proved by the high PSNR (Peak Signal to Noise Ratio), value for both stego and extracted secret image. The results are compared with the results of similar techniques and it is found that the proposed technique is simple and gives better PSNR values than others.
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINijcisjournal
Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover image. The extracted image is also similar to the secret image. This is proved by the high PSNR (Peak Signal to Noise Ratio), value for both stego and extracted secret image. The results are compared with the results of similar techniques and it is found that the proposed technique is simple and gives better PSNR values than others.
Image steganography using least significant bit and secret map techniques IJECEIAES
In steganography, secret data are invisible in cover media, such as text, audio, video and image. Hence, attackers have no knowledge of the original message contained in the media or which algorithm is used to embed or extract such message. Image steganography is a branch of steganography in which secret data are hidden in host images. In this study, image steganography using least significant bit and secret map techniques is performed by applying 3D chaotic maps, namely, 3D Chebyshev and 3D logistic maps, to obtain high security. This technique is based on the concept of performing random insertion and selecting a pixel from a host image. The proposed algorithm is comprehensively evaluated on the basis of different criteria, such as correlation coefficient, information entropy, homogeneity, contrast, image, histogram, key sensitivity, hiding capacity, quality index, mean square error (MSE), peak signal-to-noise ratio (PSNR) and image fidelity. Results show that the proposed algorithm satisfies all the aforementioned criteria and is superior to other previous methods. Hence, it is efficient in hiding secret data and preserving the good visual quality of stego images. The proposed algorithm is resistant to different attacks, such as differential and statistical attacks, and yields good results in terms of key sensitivity, hiding capacity, quality index, MSE, PSNR and image fidelity.
Blind Key Steganography Based on Multilevel Wavelet and CSF irjes
- Steganography is the art and science of invisible communication as it hides the information message
inside cover image In This paper the cover image is decomposed using multilevel wavelet transform and theses
wavelet coefficients are statistically weighted according to their perceptual importance (CSF weights) to identify
the regions of interest for the embedding. The hiding image is encrypted using secret key based on wavelet
coefficients on the last approximation level. Then the encrypted watermark is embedded using CSF weights in
the wavelet domain into the cover image. Experimental results denote the feasibility of the proposed method as
the stego images has high PSNR and subjective quality which declare that the algorithm gains a good
performance in transparency and robustness against noise attacks.
A Secure Color Image Steganography in Transform Domain ijcisjournal
Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover image. The extracted image is also similar to the secret image. This is proved by the high PSNR (Peak Signal to Noise Ratio), value for both stego and extracted secret image. The results are compared with the results of similar techniques and it is found that the proposed technique is simple and gives better PSNR values than others.
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
Steganography is the science of hidden data in the cover image without any updating of the cover image.
The recent research of the steganography is significantly used to hide large amount of information within
an image and/or audio files. This paper proposed a new novel approach for hiding the data of secret image
using Discrete Cosine Transform (DCT) features based on linear Support Vector Machine (SVM)
classifier. The DCT features are used to decrease the image redundant information. Moreover, DCT is
used to embed the secrete message based on the least significant bits of the RGB. Each bit in the cover
image is changed only to the extent that is not seen by the eyes of human. The SVM used as a classifier to
speed up the hiding process via the DCT features. The proposed method is implemented and the results
show significant improvements. In addition, the performance analysis is calculated based on the
parameters MSE, PSNR, NC, processing time, capacity, and robustness.
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYSEditor IJMTER
Steganography gained significance in the past few years due to the increasing need
for providing secrecy in an open environment like the internet. With almost anyone can
observe the communicated data all around, steganography attempts to hide the very existence
of the message and make communication undetectable. In this paper we propose a modern
technique with Integer Wavelet transform (IWT) and double key to accomplish high hiding
capability, high security and good visual quality. Here cover image is transformed in to
wavelet transform co-efficients and the coefficients are selected randomly by using Key-2 for
embedding the data. Key-1 is used to calculate the number of bits to be embedded in the
randomly selected coefficients. Finally the Optimum Pixel Adjustment Process(OPAP) is
applied to the stego image to reduce the data embedding error.
An image steganography using improved hyper-chaotic Henon map and fractal Tro...IJECEIAES
Steganography is a vital security approach that hides any secret content within ordinary data, such as multimedia. First, the cover image is converted into a wavelet environment using the integer wavelet transform (IWT), which protects the cover images from false mistakes. The grey wolf optimizer (GWO) is used to choose the pixel’s image that would be utilized to insert the hidden image in the cover image. GWO effectively selects pixels by calculating entropy, pixel intensity, and fitness function using the cover images. Moreover, the secret image was encrypted by utilizing a proposed hyper-chaotic improved Henon map and fractal Tromino. The suggested method increases computational security and efficiency with increased embedding capacity. Following the embedding algorithm of the secret image and the alteration of the cover image, the least significant bit (LSB) is utilized to locate the tempered region and to provide self-recovery characteristics in the digital image. According to the findings, the proposed technique provides a more secure transmission network with lower complexity in terms of peak signal-to-noise ratio (PSNR), normalized cross correlation (NCC), structural similarity index (SSIM), entropy and mean square error (MSE). As compared to the current approaches, the proposed method performed better in terms of PSNR 70.58% Db and SSIM 0.999 respectively.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
Steganography is a technique of concealing the secret information in a digital carrier media, so that only
the authorized recipient can detect the presence of secret information. In this paper, we propose a spatial
domain steganography method for embedding secret information on conditional basis using 1-Bit of Most
Significant Bit (MSB). The cover image is decomposed into blocks of 8*8 matrix size. The first block of
cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving
payload at the destination. The mean of median values and difference between consecutive pixels of each
8*8 block of cover image is determined to embed payload in 3 bits of Least Significant Bit (LSB) and 1 bit
of MSB based on prefixed conditions. It is observed that the capacity and security is improved compared to
the existing methods with reasonable PSNR.
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
There are algorithms in existence for hiding data within an image. The proposed scheme treats the image as a whole. Here
Integer Cosine Transform (ICT) and Integer Wavelet Transform (IWT) is combined for converting signal to frequency. Hide Behind
Corner (HBC) algorithm is used to place a key at corners of the image. All the corner keys are encrypted by generating Pseudo
Random Numbers. The Secret keys are used for corner parts. Then the hidden image is transmitted. The receiver should be aware of
the keys that are used at the corners while encrypting the image. Reverse Data Hiding (RDH) is used to get the original image and it
proceeds once when all the corners are unlocked with proper secret keys. With these methods the performance of the stegnographic
technique is improved in terms of PSNR value.
In this paper steganography is used to hide the data inside the images. Steganography is the science that involves
communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. The main goal of
steganography is to ensure that the transmitted message is completely masked, thereby ensuring that the message is accessible
only to the intended receiver and not to any intruders or unauthorized parties. This work focuses on the image steganography with
an image compression using least significant bit with Discrete Wavelet Transform (DWT) on FPGA Spartan III Evaluation
Development Kit (EDK). Current trends support digital image files as the cover file to hide another digital file with secret
message or data. At receiver side, using Inverse Discrete Wavelet transform, both original image as well as hidden data can be
successfully extracted.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to A Novel Technique for Image Steganography Based on DWT and Huffman Encoding (20)
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
1. Amitava Nag, Sushanta Biswas, Debasree Sarkar & Partha Pratim Sarkar
International Journal of Computer Science and Security, (IJCSS), Volume (4): Issue (6) 561
A Novel Technique for Image Steganography Based on DWT and
Huffman Encoding
Amitava Nag amitava.nag@aot.edu.in
Dept. of Information Technology
Academy of Technology,
West Bengal University of Technology, Hoogly – 721212,India.
Sushanta Biswas biswas.su@gmail.com
Dept. of Engineering and Technological Studies
University of Kalyani,
Kalyani, Nadia – 741 235, West Bengal, India
Debasree Sarkar dsarkar70@gmail.com
Dept. of Engineering and Technological Studies
University of Kalyani,
Kalyani, Nadia – 741 235, West Bengal, India
Partha Pratim Sarkar ppsarkar@klyuniv.ac.in
Dept. of Engineering and Technological Studies
University of Kalyani,
Kalyani, Nadia – 741 235, West Bengal, India
Abstract
Image steganography is the art of hiding information into a cover image. This
paper presents a novel technique for Image steganography based on DWT,
where DWT is used to transform original image (cover image) from spatial
domain to frequency domain. Firstly two dimensional Discrete Wavelet Transform
(2-D DWT) is performed on a gray level cover image of size M × N and Huffman
encoding is performed on the secret messages/image before embedding. Then
each bit of Huffman code of secret message/image is embedded in the high
frequency coefficients resulted from Discrete Wavelet Transform. Image quality is
to be improved by preserving the wavelet coefficients in the low frequency sub-
band. The experimental results show that the algorithm has a high capacity and a
good invisibility. Moreover PSNR of cover image with stego-image shows the
better results in comparison with other existing steganography approaches.
Furthermore, satisfactory security is maintained since the secret message/image
cannot be extracted without knowing decoding rules and Huffman table.
Keywords: Steganography, Frequency Domain, DWT, Huffman Coding, Information Hiding.
1. INTRODUCTION
Information hiding is an old but interesting technology [1]. Steganography is a branch of
information hiding in which secret information is camouflaged within other information. The word
steganography in Greek means “covered writing” ( Greek words “stegos” meaning “cover” and
“grafia” meaning “writing”) [2]. The main objective of steganography is to communicate securely in
2. Amitava Nag, Sushanta Biswas, Debasree Sarkar & Partha Pratim Sarkar
International Journal of Computer Science and Security, (IJCSS), Volume (4): Issue (6) 562
such a way that the true message is not visible to the observer. That is unwanted parties should
not be able to distinguish any sense between cover-image (image not containing any secret
message) and stego-image (modified cover-image that containing secret message). Thus the
stego-image should not deviate much from original cover-image. Today steganography is mostly
used on computers with digital data being the carriers and networks being the high speed delivery
channels. Figure. 1 shows the block diagram of a simple image steganographic system.
Secret Image Cover Image f of size N×N Stego Image g of size N×N
FIGURE. 1: The block diagram of a simple steganographic system
2. RELATED WORK
Image steganography schemes can be classified into two broad categories: spatial-domain
[3,4,18] based and transform-domain based [5,6,7]. In spatial domain approaches, the secret
messages are embedded directly. The simplest steganography is the Least Significant Bit (LSB)
approach which was modified by several algorithms. In [8], a new steganography technique,
named, “modified side match scheme” was proposed. It reserves the image quality, increases
embedding capacity but is not robust against attack because it is a spatial domain approach and
no transfer is used.
In [9] using VQ compression method is compressed the gray-level secret image before
embedding. Next the compressed gray-level secret image is encrypted and then embedded into
the DWT coefficients of the cover image. Though this paper provides a recovery scheme to repair
the secret image if the stego-image is destroyed, but the PSNR of the stego-images are less than
36dB.
In the paper [10], the proposed steganography scheme embeds the secret message by modifying
the Gabor coefficient of the cover image.
Abdelwahab and Hassan [11] used a data hiding technique in the DWT domain where 1-level
DWT is performed on both secret and cover images. The disadvantage of this method is that the
extracted data is not totally identical to the embedded version.
In [12], Bao P. and Ma X. embed a watermark in the singular value decomposition in the wavelet
domain of an image.
In [13], Maity S.P. and Kundu M.K. proposes a blind watermarking techniques to embed the
watermark redundantly in the multilevel wavelet coefficients of the LL and RR band of the cover
image. The scheme is claimed to have robutness and have the ability to detect the degree of
external attack already occurred in watermarked image, but PSNR is very low.
3. Amitava Nag, Sushanta Biswas, Debasree Sarkar & Partha Pratim Sarkar
International Journal of Computer Science and Security, (IJCSS), Volume (4): Issue (6) 563
In [17], the major importance is given on the secrecy as well as the privacy of text messages,
where the authors combines cryptography ,steganography and along with that an extra layer of
security has been imposed in between them.
According to Raja et al. [16] fast Fourier transform (FFT) methods introduce round-off errors; thus
it is not suitable for hidden communication.
The DWT based approach scheme [14] using a mapping table, the secret message is embbed in
the high frequency coefficients resulted from Discrete Wavelet Transform. Among all other
methods mentioned earlier, this method provides better quality of image, increases embedding
capacity and is also robust against attack. Based on the same embedding capacity of [14], our
proposed method improves both image quality and security.
2.1 Huffman Encoding and Huffman Table(HT)
Before embedding the secret image into cover image, it is first encoded using Huffman coding
[15]. Huffman codes are optimal codes that map one symbol to one code word. For an image
Huffman coding assigns a binary code to each intensity value of the image and a 2-D M2 × N2
image is converted to a 1-D bits stream with length LH < M2 × N2.
Huffman encoding is used to serve the following three:
Lossless Compression –It increases the embedding capacity
Security by means of encoding – Huffman encoded bit stream cannot reveals anything. To
extract the exact meaning, the Huffman table is required to decode.
It provides one type of authentication, as any single bit change in the Huffman coded bit stream,
Huffman table is unable to decode.
2.2 Discrete Wavelet Transform
Wavelets are special functions which ( in a form analogous to sins and cosines in Fourier
analysis) are used as basal functions for representing signals. The discrete wavelet transform
(DWT) we applied here is Haar-DWT, the simplest DWT. In Haar-DWT the low frequency wavelet
coefficient are generated by averaging the two pixel values and high frequency coefficients are
generated by taking half of the difference of the same two pixels.
For 2-D images, applying DWT (Discrete Wavelet Transform) separates the image into a lower
resolution approximation image or band (LL) as well as horizontal (HL), vertical (LH) and diagonal
(HH) detail components as shown in figure 3.
FIGURE 2: Components of 1-level 2-Dimensional Discrete Wavelet Transform
With the DWT, the significant part(smooth parts ) of the spatial domain image exist in the
approximation band that consists of low frequency wavelet coefficients and the edge and texture
details usually exist in high frequency sub bands, such as HH, HL, and LH. The whole procedure
4. Amitava Nag, Sushanta Biswas, Debasree Sarkar & Partha Pratim Sarkar
International Journal of Computer Science and Security, (IJCSS), Volume (4): Issue (6) 564
explained above is called the one-level 2-D Haar-DWT. The one-level 2-D Haar-DWT applied on
the image “boat” is shown in Figure 4.
(a) (b)
FIGURE 4: (a) Original image of boat, (b) Result after the one-level 2-D Haar-DWT
The human eyes are not sensitive to the small changes in the edges and textures of an image but
very sensitive to the small changes in the smooth parts. This allows the secret message/image to
be embedded at high frequency sub-bands without being perceived by the human eye.
3. PROPOSED IMAGE STEGANOGRAPHY ALGORITHM
Hiding the secret message/image in the special domain can easily be extracted by unauthorized
user. In this paper, we proposed a steganography technique using DWT (Discrete Wavelet
Transform) for hiding a large amount of data with high security, a good invisibility and no loss of
secret message. The basic idea to hide information using DWT is to alter the magnitude of the
DWT coefficients of three sub-bands, HH, HL, and LH of cover image. The schematic/ block
diagram of the whole process is given in figure 2((a) to (d)).
(a) Huffman encoding of secret image (or message)
5. Amitava Nag, Sushanta Biswas, Debasree Sarkar & Partha Pratim Sarkar
International Journal of Computer Science and Security, (IJCSS), Volume (4): Issue (6) 565
(b) Insertion of a Huffman code of secret image (or message) into a Cover image
(c) Removal of Huffman code of secret Image (or message)
(d) Huffman decoding of secret image (or message)
3.1 3-bit Block Preparation
Huffman code H is now decomposed into 3-bits blocks and thus form a decimal value ranging
from 0 to 7. For example, the binary sequence …. 110 001 010 111 100 000 011 …. will be
changed to the decimal sequence (D )… 6 1 2 7 4 0 3… . The decimal sequence (D ) is defined
as follows:
6. Amitava Nag, Sushanta Biswas, Debasree Sarkar & Partha Pratim Sarkar
International Journal of Computer Science and Security, (IJCSS), Volume (4): Issue (6) 566
3.2 Embedding of Secret Message / Image
We proposed the secret message/image embedding scheme comprises the following five steps:
Step 1: Decompose the cover image by using Haar wavelet transform.
Step 2: Huffman encoding.
Perform Huffman encoding on the 2-D secret image S of size M2 × N2 to convert it into a 1-D bits
stream H.
Step 3: 3-bit block (Bi) preparation
Huffman code H is decomposed into 3-bits blocks and thus form a decimal value ranging from 0
to 7. For example, the binary sequence …. 110 001 010 111 100 000 011 will be changed to the
decimal sequence (Bi ) … 6 1 2 7 4 0 3.
Step 4: Bits replacement
Select one sub-band for embedding the secret message. If we donate ‘f ’ as coefficients matrix of
the selected sub-band, then using the following equation, the 3 least significant bits of wavelet
coefficients is replaced by the 3 bits of Huffman encoded bit stream in the form of 3 bit block Bi.
f´(x,y) = f(x,y) – f(x,y) % 8 + Bi ----------(1)
Step 5: IDWT
Apply the Haar inverse DWT (IDWT) on the DWT transformed image, including the modified sub-
band to produce a new image f1 which contains secret image.
Embedding Algorithm
Input: An M1×N1 carrier image and a secret message/image.
Output: A stego-image.
1. Obtain Huffman table of secret message/image.
2. Find the Huffman encoded binary bit stream of secret-image by applying Huffman encoding
technique using Huffman table obtained in step 1.
3. Decompose the cover image by using Haar wavelet transform
4. Calculate the size of encoded bit stream in bits.
5. Repeat for each bit obtained in step 4
(a) Insert the 3 consecutive bits into 3 LSB position in each DWT coefficient of the selected sub-
band.
6. Repeat for each bit obtained in step 2
(a) Insert the 3 consecutive bits into 3 LSB position in each DWT coefficient(excluding the first
four coefficients in each sub-band) of the selected sub-band.
7. Repeat for each bit of the Huffman table
(a) Insert the 3 consecutive bits into 3 LSB position in each DWT coefficient of the selected
sub-band.
8. Apply inverse DWT.
9. End.
3.3 Extraction of the Secret Message / Image
The stego-image is received in spatial domain. DWT is applied on the stego-image to transform
the stego-image from spatial domain to frequency domain. The following formula is used to
extract bit stream from wavelet coefficients in the form of blocks Bi .
Bi =f´(x,y) % 8 -------------- (2)
The size of the encoded bit stream and the encoded bit stream of secret message/image are
extracted along with the Huffman table of the secret message/image. The block diagram of the
extracting process is given in figure 4((c) and (d)) and the extracting algorithm as follows:
7. Amitava Nag, Sushanta Biswas, Debasree Sarkar & Partha Pratim Sarkar
International Journal of Computer Science and Security, (IJCSS), Volume (4): Issue (6) 567
Extraction Algorithm
Input: An M1×N1 Stego-image.
Output: Secret image.
1. Apply DWT to the stego-image.
2. The size of the encoded bit stream is extracted from 1st four DWT coefficients in each subband
by collecting the 3 least significant bits.
3. The 3 least significant bits of all of the DWT coefficients inside each sub-bands(excluding the
first four coefficients in each sub-bands) are collected and added to a 1-D array.
4. Repeat step 3 until the size of the 1-D array becomes equal to the size extracted in step 2.
5. Construct the Huffman table by extracting 3 bits from the LSB of all of the DWT coefficients
inside each sub-bands excluding the coefficients used in step 2 and step 3.
6. Decode the 1-D array obtained in step 3 using the Huffman table obtained in step 5.
7. End.
4. SIMULATION RESULTS
In this section, some experiments are carried out to prove the efficiency of the proposed scheme. The
proposed method has been simulated using the MATLAB 7 program on Windows XP platform. A set of 8-
bit grayscale images of size 512 × 512 are used as the cover-image to form the stego-image. The Figure 6
(a) – (d) shows the original cover (carrier) images and Figure 7 shows the original secret message.
(a) Lena (b) Baboon (c) Airplane (d) Boat
FIGURE 6: Four cover-images for simulations
FIGURE 7: Secret Image to be embedded
8. Amitava Nag, Sushanta Biswas, Debasree Sarkar & Partha Pratim Sarkar
International Journal of Computer Science and Security, (IJCSS), Volume (4): Issue (6) 568
(a) Lena (b) Baboon (c) Airplane (d) Boat
FIGURE 8: stego-images of the proposed methods
FIGURE 9: Extracted Secret Image
Here we are embedding a 8-bit grayscale image of size 256 × 248 into a 8-bit grayscale images
of size 512 × 512 i.e. 507904 bits are embedded into a 512 × 512 carrier image. Here, PSNR
value is utilized to evaluate the invisibility of the stego-images.
TABLE 1: COMPARISON OF RESULTS FOR THE PROPOSED METHOD AND DWT BASED MODEL[14]
To compare the proposed approach with the DWTIS method [14], table 1 exhibit the capacity and
PSNR after the secret data is embedded using those two approaches. From table 1 it is clear that
for the same capacity, the PSNR of our proposed algorithm is better than the one in reference
[14]. From table 1, it is noticed that for all images, PSNR is nearly 55. Figure 8 shows the
resulted stego-images of the proposed methods and figure 9 extracted Image
5. CONCLUSION
Generally, image steganography method does not provide much attention on the basic demand
of secrecy and privacy. In this paper, the major importance is given on the secrecy as well as the
privacy of information. The embedding process is hidden under the transformation (DWT and
IDWT) of cover image. These operations provide sufficient secrecy. On the other hand to obtain
privacy we have used huffman encoding. In a similar type of paper[14] the authors have provided
their attention on the security by a well designed mathemetical mapping. Our paper deals with the
Huffman encoding. After comparision it is found that in our paper PSNR is higher than the
mentioned paper. Here lies the novelity of our research work.
Cover
Image
(512 ×512)
DWT base [14] Our Method
Capacity
(bits)
PSNR
(dB)
Capacity
(bits)
PSNR
(dB)
Lena
Airplan
Baboon
Boat
507856
507856
507670
507867
46.0882
45.9961
46.1948
46.1385
507856
507856
507670
507867
54.93
54.67
55.11
54.80
9. Amitava Nag, Sushanta Biswas, Debasree Sarkar & Partha Pratim Sarkar
International Journal of Computer Science and Security, (IJCSS), Volume (4): Issue (6) 569
6. REFERENCES
[1] N. F. Johnson and S. Katzenbeisser, “A survey of steganographic techniques”. Information
Hiding, Artech House, pp. 43-78, 2000.
[2] Moerland, T. “Steganography and Steganalysis”. Leiden Institute of Advanced Computing
Science, www.liacs.nl/home/ tmoerl/privtech.pdf
[3] Chan, C.K. and Cheng. L.M. “Hiding data in image by simple LSB substitution”. Pattern
Recognition, 37: 469 – 474, 2003.
[4] Chang, C.C and Tseng, H.W. “A Steganographic method for digital images using side match”.
Pattern Recognition Letters, 25: 1431 – 1437, 2004.
[5] Chen, T.S., Chang C.C., and Hwang, M.S. “A virtual image cryptosystem based upon vector
quantization”. IEEE transactions on Image Processing, 7,(10): 1485 – 1488, 1998.
[6] Chung, K.L., Shen, C.H. and Chang, L.C. “A novel SVD- and VQ-based image hiding scheme.
Pattern Recognition Letters” 22: 1051 – 1058, 2001.
[7] Iwata, M., Miyake, K., and Shiozaki, A. “Digital Steganography Utilizing Features of JPEG
Images, IEICE Transfusion Fundamentals”. E87-A(4):929 – 936, 2004.
[8] Chen, P.Y. and Wu, W.E. “A Modified Side Match Scheme for Image Steganography”.
International Journal of Applied Science and Engineering, 7(1): 53 – 60, 2009..
[9] Chu, Y.P., Guo, S.W., Chan, Y.K. and Wu, H.C. “Image Hiding Based on a Hybrid Technique
of VQ Compression and Discrete Wavelet Transform”, International Computer Symposium, 313-
317,2004.
[10] Mythreyi S and Vaidehi V. “Gabor Transform based Image Steganography”, IETE Journal of
Research, 53(2):. 103 – 112,2007.
[11] A.A. Abdelwahab, L.A. Hassan. “A discrete wavelet transform based technique for image
data hiding”, in: Proceedings of 25th National Radio Science Conference, Egypt, 2008.
[12] Bao, P and Ma, X. “Image Adaptive Watermarking Using Wavelet Domain Singular Value
Decomposition”, IEEE Transaction on Circuits and Systems for Video Technology, 15(1):2005
[13] Maity S.P. and Kundu M.K., “A Blind CDMA Image Watermarking Scheme in Wavelet
Domain” IEEE International Conference:2633 – 2336,2004.
[14] Chen, P.Y. and Wu, W.E. “A DWT Based Approach for Image Steganography”, International
Journal of Applied Science and Engineering, 4,3: 275 –290.
[15] Jayaraman, S., Esakkirajan, S. and Veerakumar, T. “Digital Image Processing”, Tata
McGraw Hill Education Private Limited, India, 2009.
[16] K.B. Raja, C.R. Chowdary, K.R. Venugopal, L.M. Patnaik. “A secure image steganography
using LSB, DCT and compression techniques on raw images”. Proceedings of IEEE 3rd
International Conference on Intelligent Sensing and Information Processing, ICISIP’05,
Bangalore, India, 14–17 December 2005..
[17]Debnath Bhattacharyya, Poulami Das, Samir kumar Bandyopadhyay and Tai-hoon Kim. “Text
Steganography: A Novel Approach,” International Journal of Advanced Science and Technology,
vol.3, pp.79-85, February2009.
10. Amitava Nag, Sushanta Biswas, Debasree Sarkar & Partha Pratim Sarkar
International Journal of Computer Science and Security, (IJCSS), Volume (4): Issue (6) 570
[18] H. Arafat Ali. “Qualitative Spatial Image Data Hiding for Secure Data Transmission”. GVIP
Journal, 7(1):35-43, 2007.