Image Steganography Based on Wavelet Transform and Histogram Modification

E. M. Jamel
{"title":"Image Steganography Based on Wavelet Transform and Histogram Modification","authors":"E. M. Jamel","doi":"10.30526/33.1.2365","DOIUrl":null,"url":null,"abstract":"Recently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of confidential data. This paper presents a steganography method in frequency domain. Haar Wavelet Transform is applied for decomposition of gray level cover image into four sub-bands. The secret image is hidden in the high frequency HH sub-band after applying the histogram modification followed by scrambling process. A Histogram modification is adopted, to scale the secret image to normalize its values, that manipulates the secret image from bright image to dark. Thus the secret image becomes invisible so it can be hidden in the high frequency sub-band.  Scrambling the positions can be for rows then columns, which will give strong security of the hiding process. The experimental results demonstrate the proposed method has achieved superior performance in terms of quantifiable measurement (PSNR and correlation) and in terms of visual quality. The proposed method propositions good imperceptible results and good response for against the various image attacks.","PeriodicalId":13236,"journal":{"name":"Ibn Al-Haitham Journal For Pure And Applied Science","volume":"138 1","pages":"173-186"},"PeriodicalIF":0.0000,"publicationDate":"2020-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ibn Al-Haitham Journal For Pure And Applied Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30526/33.1.2365","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Recently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of confidential data. This paper presents a steganography method in frequency domain. Haar Wavelet Transform is applied for decomposition of gray level cover image into four sub-bands. The secret image is hidden in the high frequency HH sub-band after applying the histogram modification followed by scrambling process. A Histogram modification is adopted, to scale the secret image to normalize its values, that manipulates the secret image from bright image to dark. Thus the secret image becomes invisible so it can be hidden in the high frequency sub-band.  Scrambling the positions can be for rows then columns, which will give strong security of the hiding process. The experimental results demonstrate the proposed method has achieved superior performance in terms of quantifiable measurement (PSNR and correlation) and in terms of visual quality. The proposed method propositions good imperceptible results and good response for against the various image attacks.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于小波变换和直方图修正的图像隐写
近年来,数字通信已成为一种迫切需要,因此互联网已成为数字通信使用最多、效率最高的媒介。与此同时,通过互联网传输的数据变得越来越脆弱。因此,保持数据的机密性是非常重要的,特别是如果数据是个人的或机密的。隐写术为解决这类问题提供了可靠的方法。在数字世界中,通过互联网、电子邮件和其他方式进行数据共享和传输越来越多,隐写术是一种有效的秘密通信技术。隐写方法的主要挑战是机密数据的不可检测性和不可感知性。提出了一种频域隐写方法。采用Haar小波变换将灰度覆盖图像分解为四个子带。经过直方图修改和置乱处理,将秘密图像隐藏在高频HH子带中。采用直方图修改,对秘密图像进行缩放,使其值归一化,将秘密图像从亮图像变为暗图像。这样秘密图像就变得不可见,可以隐藏在高频子带中。对位置进行置乱可以是对行置乱,也可以是对列置乱,这样可以提高隐藏过程的安全性。实验结果表明,该方法在可量化测量(PSNR和相关)和视觉质量方面都取得了优异的性能。该方法对各种图像攻击具有良好的隐蔽性和响应性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Extend Nearly Pseudo Quasi-2-Absorbing submodules(I) Protective effect of (Andrographis Paniculata) on 4-Vinylcyclohexene Diepoxide Induced ovarian Toxicity in Female Albino Rats Genetic Algorithm and Particle Swarm Optimization Techniques for Solving Multi-Objectives on Single Machine Scheduling Problem Study of Nuclear Properties of High Purity Germanium Assessment of the Quality of Drinking Water for Plants in the Al-Karkh, Baghdad, Iraq
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1