Data Hiding in Images in Discrete Wavelet Domain Using PMM

Over last two decades, due to hostilities of environment over the internet the concerns about confidentiality of information have increased at phenomenal rate. Therefore to safeguard the information from attacks, number of data/information hiding methods have evolved mostly in spatial and transformation domain.In spatial domain data hiding techniques,the information is embedded directly on the image plane itself. In transform domain data hiding techniques the image is first changed from spatial domain to some other domain and then the secret information is embedded so that the secret information remains more secure from any attack. Information hiding algorithms in time domain or spatial domain have high capacity and relatively lower robustness. In contrast, the algorithms in transform domain, such as DCT, DWT have certain robustness against some multimedia processing.In this work the authors propose a novel steganographic method for hiding information in the transform domain of the gray scale image.The proposed approach works by converting the gray level image in transform domain using discrete integer wavelet technique through lifting scheme.This approach performs a 2-D lifting wavelet decomposition through Haar lifted wavelet of the cover image and computes the approximation coefficients matrix CA and detail coefficients matrices CH, CV, and CD.Next step is to apply the PMM technique in those coefficients to form the stego image. The aim of this paper is to propose a high-capacity image steganography technique that uses pixel mapping method in integer wavelet domain with acceptable levels of imperceptibility and distortion in the cover image and high level of overall security. This solution is independent of the nature of the data to be hidden and produces a stego image with minimum degradation.




References:
[1] Ali Al-Ataby and Fawzi Al-Naima. A modified high capacity image
steganography technique based on wavelet transform. The International
Arab Journal of Information Technology, 7:358-364, 2010.
[2] Ahmad T. Al-Taani. and Abdullah M. AL-Issa. A novel steganographic
method for gray-level images. International Journal of Computer,
Information, and Systems Science, and Engineering, 3, 2009.
[3] Ross J. Anderson. and Fabien A.P.Petitcolas. On the limits of steganography.
IEEE Journal on Selected Areas in Communications (J-SAC),
Special Issue on Copyright and Privacy Protection, 16:474-481, 1998.
[4] Souvik Bhattacharyya. and Gautam Sanyal. Study of secure steganography
model. In Proceedings of International Conference on AdvancedComputing
and Communication Technologies (ICACCT-2008),
Panipath,India, 2008.
[5] Souvik Bhattacharyya. and Gautam Sanyal. An image based steganography
model for promoting global cyber security. In Proceedings of
International Conference on Systemics, Cybernetics and Informatics,
Hyderabad,India, 2009.
[6] Souvik Bhattacharyya. and Gautam Sanyal. Implementation and design
of an image based steganographic model. In Proceedings of IEEE
International Advance Computing Conference, Patiala ,India, 2009.
[7] Souvik Bhattacharyya. and Gautam Sanyal. Hiding data in images
using pixel mapping method (pmm). In Proceedings of 9th annual
Conference on Security and Management (SAM) under The 2010 World
Congress in Computer Science,Computer Engineering, and Applied
Computing(WorldComp 2010), LasVegas,USA, July 12-15,2010.
[8] Geert Uytterhoeven Dirk Roose Adhemar Bultheel. Integer wavelet
transforms using the lifting scheme. In CSCC Proceedings, 1999.
[9] J.Y. Hsiao. C.C. Chang. and C.-S. Chan. Finding optimal leastsignificant-
bit substitution in image hiding by dynamic programming
strategy. Pattern Recognition, 36:1583-1595, 2003.
[10] C.K. Chan. and L. M.Cheng. Hiding data in images by simple lsb
substitution. Pattern Recognition, 37:469-474, 2004.
[11] Po-Yueh Chen and Hung-Ju Lin. A dwt based approach for image
steganography. International Journal of Applied Science and Engineering,
4:275-290, 2006.
[12] Ajit Danti and Preethi Acharya. Randomized embedding scheme based
on dct coefficients for image steganography. IJCA Special Issue on
Recent Trends in Image Processing and Pattern Recognition, 2010.
[13] G. Doerr and J.L. Dugelay. A guide tour of video watermarking. Signal
Processing: Image Communication, 18:263-282, 2003.
[14] G. Doerr and J.L. Dugelay. Security pitfalls of frameby-frame approaches
to video watermarking. IEEE Transactions on Signal Processing,
Supplement on Secure Media, 52:2955-2964, 2004.
[15] Potdar V.and Chang E. Gray level modification steganography for
secret communication. In IEEE International Conference on Industria
lInformatics., pages 355-368, Berlin, Germany, 2004.
[16] K. Gopalan. Audio steganography using bit modification. In Proceedings
of the IEEE International Conference on Acoustics, Speech, and Signal
Processing, (ICASSP -03), volume 2, pages 421-424, 6-10 April 2003.
[17] N.F. Maxemchuk J.T. Brassil, S. Low and L. O.Gorman. Electronic
marking and identification techniques to discourage document copying.
IEEE Journal on Selected Areas in Communications, 13:1495-1504,
1995.
[18] R K Chhotaray K B Shiva Kumar, K B Raja and Sabyasachi Pattanaik.
Bit length replacement steganography based on dct coefficients. International
Journal of Engineering Science and Technology, 2:3561-3570,
2010.
[19] D. Kahn. The Codebreakers - the comprehensive history of secret
communication from ancient times to the Internet. Scribner, 1996.
[20] P Huang. K.C. Chang., C.P Chang. and T.M Tu. A novel image
steganography method using tri-way pixel value differencing. Journal
of Multimedia, 3, 2008.
[21] Kran Bailey Kevin Curran. An evaluation of image based steganography
methods. International Journal of Digital Evidence,Fall 2003, 2003.
[22] Dr.S.T.Gandhe K.T.Talele and Dr.A.G.Keskar. Steganography security
for copyright protection of digital images using dwt. (IJCNS) International
Journal of Computer and Network Security, 2:21-26, 2010.
[23] V. Kumar and D. Kumar. Performance evaluation of dwt based image
steganography. In Proceedings of Advance Computing Conference
(IACC), 2010 IEEE 2nd International, pages 223-228, 2010.
[24] Jr. L. M. Marvel, C. G. Boncelet and C. T. Retter. Spread spectrum
image steganography. IEEE Trans. on Image Processing, 8:1075-1083,
1999.
[25] Y. K. Lee. and L. H.Chen. High capacity image steganographic model.
IEE Proc.-Vision, Image and Signal Processing, 147:288-294, 2000.
[26] W. Sweldens. The lifting scheme. A construction of second generation
wavelets. SIAM J. Math. Anal., 29:511-546, 1997.
[27] Chia-Chen Lin. High capacity data hiding scheme for dct-based images.
Journal of Information Hiding and Multimedia Signal Processing, 1,
2010.
[28] G. Davida M. Chapman and M. Rennhard. A practical and effective
approach to large-scale automated linguistic steganography. In Proceedings
of the Information Security Conference, pages 156-165, October
2001.
[29] N.F.Johnson. and S. Jajodia. Steganography: seeing the unseen. IEEE
Computer, 16:26-34, 1998.
[30] W. Sweldens R. Calderbank, I. Daubechies and B.L. Yeo. Wavelet
transforms that map integers to integers. Appl. Comput. Harmon. Anal.,
5:332-369, 1998.
[31] Nasir Memon R. Chandramouli. Analysis of lsb based image steganography
techniques. In Proceedings of IEEE ICIP, 2001.
[32] H S Manjunatha Reddy and K B Raja. High capacity and security
steganography using discrete wavelet transform. International Journal
of Computer Science and Security (IJCSS), 3:462-472.
[33] C.F. Lin. R.Z. Wang. and J.C. Lin. Image hiding by optimal lsb
substitution and genetic algorithm. Pattern Recognition, 34:671-683,
2001.
[34] Gustavus J. Simmons. The prisoners- problem and the subliminal
channel. Proceedings of CRYPTO., 83:51-67, 1984.
[35] Avinash Prasad Kshitij. Souvik Bhattacharyya. and Gautam Sanyal.
A novel approach to develop a secure image based steganographic
model using integer wavelet transform. In Proceedings of International
Conference on Recent Trends in Information, Telecommunication and
Computing (Indexed by IEEE Computer Society), Cochin ,India, 2010.
[36] S.P.Mohanty. Digital Watermarking: A Tutorial. 1999.
[37] JHP Eloff. T Mrkel. and MS Olivier. An overview of image steganography.
In Proceedings of the fifth annual Information Security South
Africa Conference., 2005.
[38] N. Morimoto W. Bender, D. Gruhl and A. Lu. Techniques for data
hiding. IBM Systems Journal, 35:313-316, 1996.
[39] D.C. Wu. and W.H. Tsai. A steganographic method for images by pixelvalue
differencing. Pattern Recognition Letters, 24:1613-1626, 2003.
[40] Bo Yang and Beixing Deng. Steganography in gray images using
wavelet. In Proceedings of ISCCSP 2006.