The process of inserting secret data in any media as pictures, audio, video, text and protocol, also it can be empathy this secret connection is called steganography. At present, the widespread use of internet applications has become a security risk. Steganography is used to overcome this undesirable situation. It shows a significant character in maintaining privacy. Some steganographic techniques modify the image using the spatial domain, transform domain, spread spectrum, statistical method and distortion techniques. This work aims to develop efficient data encryption and decryption technique that provide security of data. In this research exertion, it anticipated an image steganalysis method using various wavelet decomposition, especially using multiwavelet decomposition. First, we decomposed the image using different wavelets and multiwavelets. Then we extracted the more informative parts into wavelet sub-bands as a feature and inserted them into the LL sub-band wavelet decomposed image. The resulting image is sent to the recipient as a signal. The recipient retrieves confidential information through encryption. Finally, by analyzing the actions of different wavelets, we can retrieve the original message through the decryption technique. The multiwavelet technique achieves PSNR of 48.26 - 56.5926 and MSE of 0.1428 - 0.97. The result indicates that multiwavelet provided a good recovery of the secret image quality that led to an increase in the imperceptibility of the system.
Published in | Advances in Applied Sciences (Volume 7, Issue 2) |
DOI | 10.11648/j.aas.20220702.12 |
Page(s) | 27-32 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2022. Published by Science Publishing Group |
Decryption, Encryption, Wavelet and Multiwavelet Decomposition, Steganography
[1] | Abdulla, A. A., Sellahewa, H. and Jassim, S. A., (2014) “Stego quality enhancement by message size reduction and Fibonacci bit-plane mapping,” in Security Standardisation Research. Cham: Springer International Publishing, pp. 151–166. DOI: 10.1007/978-3-319-14054-4_10. |
[2] | Hemalatha, S., Acharya, U. D. and Renuka, A., (2013) “A Secure Color Image Steganography in Transform Domain,” International Journal on Cryptography and Information Security, 3 (1), pp. 17–24. arXiv preprint arXiv: 1307.3026. |
[3] | Hussain, M., Wahab, A. W. A., Idris, Y. I. B., Ho, A. T. and Jung, K. H., (2018) “Image steganography in spatial domain: A survey,” Signal processing. Image communication, 65, pp. 46–66. DOI: 10.1016/j.image.2018.03.012. |
[4] | Lin, G. and Liu, Z. M., (2000) “The application of multiwavelet transform to image coding,” IEEE transactions on image processing: a publication of the IEEE Signal Processing Society, 9 (2), pp. 270–273. DOI: 10.1109/83.821740. |
[5] | Murugan, G. V. K. and Uthandipalayam Subramaniyam, R., (2020) “Performance analysis of image steganography using wavelet transform for safe and secured transaction,” Multimedia tools and applications, 79 (13–14), pp. 9101–9115. DOI: 10.1007/s11042-019-7507-6. |
[6] | Parul, M. and Rohil, H. (2014) “Optimized Image Steganography using Discrete Wavelet Transform (DWT),” International Journal of Recent Development in Engineering and Technology (IJRDET), 2 (2), pp. 75–81. |
[7] | Pawar, S. S. and Kakde, V. (2014) “Review on Steganography for Hiding Data,” International Journal of Computer Science and Mobile Computing, 3 (4), pp. 225–229. |
[8] | Roy, R. et al. (2013) “Evaluating Image Steganography Techniques: Future Research Challenges, International Conference on Computing Management and Telecommunications,” pp. 309–314. doi: 10.1109/ComManTel.2013.6482411. |
[9] | Sidhik, S., Sudheer, S. K. and Mahadhevan Pillai, V. P. (2015) “Performance and analysis of high capacity Steganography of color images involving Wavelet Transform,” Optik, 126 (23), pp. 3755–3760. DOI: 10.1016/j.ijleo.2015.08.208. |
[10] | Jeevitha, S. and Amutha Prabha, N. (2020) “Effective payload and improved security using HMT Contourlet transform in medical image steganography,” Health and technology, 10 (1), pp. 217–229. DOI: 10.1007/s12553-018-00285-1. |
[11] | Serdean, C. V., Ibrahim, M. K., Moemeni, A. and Al-Akaidi, M. M., (2007) “Wavelet and multiwavelet watermarking,” IET image processing, 1 (2), p. 223. DOI: 10.1049/iet-ipr:20060214. |
[12] | Singh, A. K. (2017) “Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images,” Multimedia tools and applications, 76 (6), pp. 8881–8900. DOI: 10.1007/s11042-016-3514-z. |
[13] | Yuan, H. D., (2014) “Secret sharing with multi-host adaptive steganography,” Information Sciences, 254, pp. 197–212. DOI: 10.1016/j.ins.2013.08.012. |
[14] | Nipanikar, S. I., Hima Deepthi, V. and Kulkarni, N. (2018) “A sparse representation based image steganography using Particle Swarm Optimization and wavelet transform,” Alexandria Engineering Journal, 57 (4), pp. 2343–2356. doi: 10.1016/j.aej.2017.09.005. |
[15] | Zhang, Q. and Lu, W. (2016) “Joint Image Splicing Detection in DCT and Contourlet Transform Domain,” Journal of Visual Communication and Image Representation, 40, pp. 449–458. |
APA Style
Shemanta Kumar Biswas, Redwanul Islam, Md. Rafiqul Islam. (2022). Signal Steganography Using Different Wavelets and Their Comparisons. Advances in Applied Sciences, 7(2), 27-32. https://doi.org/10.11648/j.aas.20220702.12
ACS Style
Shemanta Kumar Biswas; Redwanul Islam; Md. Rafiqul Islam. Signal Steganography Using Different Wavelets and Their Comparisons. Adv. Appl. Sci. 2022, 7(2), 27-32. doi: 10.11648/j.aas.20220702.12
@article{10.11648/j.aas.20220702.12, author = {Shemanta Kumar Biswas and Redwanul Islam and Md. Rafiqul Islam}, title = {Signal Steganography Using Different Wavelets and Their Comparisons}, journal = {Advances in Applied Sciences}, volume = {7}, number = {2}, pages = {27-32}, doi = {10.11648/j.aas.20220702.12}, url = {https://doi.org/10.11648/j.aas.20220702.12}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.aas.20220702.12}, abstract = {The process of inserting secret data in any media as pictures, audio, video, text and protocol, also it can be empathy this secret connection is called steganography. At present, the widespread use of internet applications has become a security risk. Steganography is used to overcome this undesirable situation. It shows a significant character in maintaining privacy. Some steganographic techniques modify the image using the spatial domain, transform domain, spread spectrum, statistical method and distortion techniques. This work aims to develop efficient data encryption and decryption technique that provide security of data. In this research exertion, it anticipated an image steganalysis method using various wavelet decomposition, especially using multiwavelet decomposition. First, we decomposed the image using different wavelets and multiwavelets. Then we extracted the more informative parts into wavelet sub-bands as a feature and inserted them into the LL sub-band wavelet decomposed image. The resulting image is sent to the recipient as a signal. The recipient retrieves confidential information through encryption. Finally, by analyzing the actions of different wavelets, we can retrieve the original message through the decryption technique. The multiwavelet technique achieves PSNR of 48.26 - 56.5926 and MSE of 0.1428 - 0.97. The result indicates that multiwavelet provided a good recovery of the secret image quality that led to an increase in the imperceptibility of the system.}, year = {2022} }
TY - JOUR T1 - Signal Steganography Using Different Wavelets and Their Comparisons AU - Shemanta Kumar Biswas AU - Redwanul Islam AU - Md. Rafiqul Islam Y1 - 2022/06/30 PY - 2022 N1 - https://doi.org/10.11648/j.aas.20220702.12 DO - 10.11648/j.aas.20220702.12 T2 - Advances in Applied Sciences JF - Advances in Applied Sciences JO - Advances in Applied Sciences SP - 27 EP - 32 PB - Science Publishing Group SN - 2575-1514 UR - https://doi.org/10.11648/j.aas.20220702.12 AB - The process of inserting secret data in any media as pictures, audio, video, text and protocol, also it can be empathy this secret connection is called steganography. At present, the widespread use of internet applications has become a security risk. Steganography is used to overcome this undesirable situation. It shows a significant character in maintaining privacy. Some steganographic techniques modify the image using the spatial domain, transform domain, spread spectrum, statistical method and distortion techniques. This work aims to develop efficient data encryption and decryption technique that provide security of data. In this research exertion, it anticipated an image steganalysis method using various wavelet decomposition, especially using multiwavelet decomposition. First, we decomposed the image using different wavelets and multiwavelets. Then we extracted the more informative parts into wavelet sub-bands as a feature and inserted them into the LL sub-band wavelet decomposed image. The resulting image is sent to the recipient as a signal. The recipient retrieves confidential information through encryption. Finally, by analyzing the actions of different wavelets, we can retrieve the original message through the decryption technique. The multiwavelet technique achieves PSNR of 48.26 - 56.5926 and MSE of 0.1428 - 0.97. The result indicates that multiwavelet provided a good recovery of the secret image quality that led to an increase in the imperceptibility of the system. VL - 7 IS - 2 ER -