IJIGSP Vol. 4, No. 12, 8 Nov. 2012
Cover page and Table of Contents: PDF (size: 1231KB)
Full Text (PDF, 1231KB), PP.26-33
Views: 0 Downloads: 0
Steganography, Integer Wavelet Transform (IWT), Optimal Pixel Adjustment Process (OPAP), Bicubic interpolation
Steganography is the art and science of hiding information in unremarkable cover media so as not to observe any suspicion. It is an application under information security field, being classified under information security, Steganography will be characterized by having set of measures that rely on strengths and counter attacks that are caused by weaknesses and vulnerabilities. The aim of this paper is to propose a modified high capacity image steganography technique that depends on integer wavelet transform with acceptable levels of imperceptibility and distortion in the cover image as a medium file and high levels of security. Bicubic interpolation causes overshoot, which increases acutance (apparent sharpness). The Bicubic algorithm is frequently used for scaling images and video for display. The algorithm preserves fine details of the image better than the common bilinear algorithm.
N. Ajeeshvali,B.Rajasekhar,"Steganography Based on Integer Wavelet Transform and Bicubic Interpolation", IJIGSP, vol.4, no.12, pp.26-33, 2012. DOI: 10.5815/ijigsp.2012.12.04
[1]Ali Al-Ataby and Fawzi Al-Naima “A Modified High Capacity Image Steganography Technique Based on Wavelet Transform” in the International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010
[2]G M. K. Ramani, E. V. Prasad, S. Varadarajan, "Steganography using BPCS to the integer wavelet transformed image " IJCSNS, Vol. 7, No. 7, pp. 293-302, July 2007.
[3]C. K. Chan and L. M. Chang, "Hiding data in images by simple LSB substitution," Pattern Recognition, pp. 469- 474, Mar. 2004.
[4]Lee K. and Chen H., “A High Capacity Image Steganographic Model,” in IEEE Proceedings on Vision Image and Signal Processing, China, pp. 288-294, 2000.
[5]Lin T. and Delp J., “A Review of Data Hiding in Digital Images,” in Proceedings of the Image processing.
[6]N. Provos, "Defending against statistical steganalysis," In Proc. OfiOth Usenix Security Symp, Usenix Assoc, pp. 323-335,2001.
[7]El Safy, R.O, Zayed. H. H, EI Dessoki. A, "An adaptive steganography technique based on integer wavelet transform," ICNM International Conference on Networking and Media Convergence, pp 111-117,2009.
[8]Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique Guorong Xuan1, Yun Q. Shi2, Chengyun Yang1, Yizhan Zheng1, Dekun Zou2, Peiqi Chai
[9]A.M. Fard, M.R Akbarzadeh and A. F Varasteh. "A new genetic algorithm approach for secure JPEG steganography," International Conference on Engineering of intelligence Systems, pp 1-6,2006.
[10]Ji. Rongrong, Yao. Hongxun, L. Shaohui and W. Liang, "Genetic algorithm based optimal block mapping method for LSB substitution," International Conference on Information Hiding and Multimedia Signal Processing, pp, 215-218, Dec 2006.
[11]A.R. Calderbank, I. Daubechies, W. Sweldens and B. Yeo., "Wavelet transforms that map integers to integers," Applied and Computational Harmonic Analysis, vol. 5, no. 3, pp. 332-369, July 1998.
[12]S. Sarreshtedari, S.Ghaemmaghami, “High capacity image steganography in wavelet domain”, IEEE CCNC 2010 procedings.