Steganographic Method with High Visual Concealment in Wavelet Domain

Article Preview

Abstract:

In this paper we propose a new steganographic method, which based on wet paper codes and wavelet transformation. The method is designed to embed secret messages in images' wavelet coefficients and depends on images' texture characters in local neighborhood. The receivers can extract secret bits from carrier images only by some matrix multiplications without knowing the formulas written by senders, which further improves steganographic security and minimizes the impact of embedding changes. The experimental results show that our proposed method has good robust and visual concealment performance and proves out it's a practical steganographic algorithm.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

47-50

Citation:

Online since:

January 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Xi Ling, Ping Xi-jian, Zhang Tao, Double-layered embedding based wet paper code adaptive steganography, Journal of Computer Applications. Vol. 31(5)1280-1283(2011).

DOI: 10.3724/sp.j.1087.2011.01280

Google Scholar

[2] Arun Rana, Nitin Sharma, Amandeep Kaur, Image steganography method based on kohonen neural network, International Journal of Engineering Research and Applications, Vol. 2, Issue 3, May 2012, pp.2234-2236.

Google Scholar

[3] Barni Mauro, Bartolini Franco, Piva Alessandro. Improved wavelet watermarking through pixel wise masking, IEEE Transactions on Image Processing, 200l, Vol. 10(5), pp.783-791.

DOI: 10.1109/83.918570

Google Scholar

[4] Fridrich Jessica, Goljan Miroslav, Lisonek Petr, et a1. Writing on wet paper, IEEE Transactions on Image Processing, 2005, Vol. 53(10), pp.3923-3935.

DOI: 10.1109/tsp.2005.855393

Google Scholar

[5] Elham Ghasemi, Jamshid Shanbehzadeh, Nima Fassihi, High Capacity Image Steganography Based on Genetic Algorithm and Wavelet Transform, Lecture Notes in Electrical Engineering, 2012, Volume 110, pp.395-404.

DOI: 10.1007/978-1-4614-1695-1_30

Google Scholar

[6] Brent R P, Gao S, Lauder A G B, Random Krylov spaces over finite fields, Discrete Math, 2003, Vol. 16(2), pp.276-287.

DOI: 10.1137/s089548010139388x

Google Scholar

[7] Fridrich J. Rich Models for Steganalysis of Digital Images, IEEE Transactions on, Jun. 2012, Vol. 7(3), pp.868-882.

Google Scholar

[8] Lewis A S. Knowles G, Image compression using the 2-D wavelet transform, IEEE Transactions On Image Processing, Vol. 1(2), 244-250(1992).

DOI: 10.1109/83.136601

Google Scholar