Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 327))

Abstract

Steganography is one in all the foremost persuasive approaches to mask the presence of hidden data inside a cover object. Images are one of the suitable cover objects for the Steganography. Current trends support, digital image files as the cover file to hide multiple secret images. Steganography presents the clandestine information can be covered in mediums like image, video and audio. This paper provides a LSB image Steganography technique to hide multiple secret images in a cover image which is in a YCbCr color space format using Integer Wavelet Transform (IWT). There is no optical variation between the stego image and the original cover image. The proposed hardware architecture gives very fast, programmable & cost effective hardware solution in the area of Secure Communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Masud Karim, S.M., Saifur Rahman, M., Ismail Hossain, M.: A New Approach for LSB Based Image Steganography using Secret Key. In: Proceedings of 14th International Conference on Computer and Information Technology, pp. 286–291. IEEE Conference Publications

    Google Scholar 

  2. Xie, Q., Xie, J., Xiao, Y.: A High Capacity Information Hiding Algorithm in Color Image. In: Proceedings of 2nd International Conference on E-Business and Information System Security, pp. 1–4. IEEE Conference Publications (2010)

    Google Scholar 

  3. Sachdeva, S., Kumar, A.: Colour Image Steganography Based on Modified Quantization Table. In: Proceedings of Second International Conference on Advanced Computing & Communication Technologies, pp. 309–313. IEEE Conference Publications (2012)

    Google Scholar 

  4. Roy, S., Parekh, R.: A Secure Keyless Image Steganography Approach for Lossless RGB Images. In: Proceedings of International Conference on Communication, Computing & Security, pp. 573–576. ACM Publications (2011)

    Google Scholar 

  5. Mandal, J.K., Sengupta, M.: Steganographic Technique Based on Minimum Deviation of Fidelity (STMDF). In: Proceedings of Second International Conference on Emerging Applications of Information Technology, pp. 298–301. IEEE Conference Publications (2011)

    Google Scholar 

  6. Mandal, J.K., Sengupta, M.: Authentication/Secret Message Transformation Through Wavelet Transform based Sub-band Image Coding (WTSIC). In: Proceedings of International Symposium on Electronic System Design, pp. 225–229. IEEE Conference Publications (2010)

    Google Scholar 

  7. Sarreshtedari, S., Ghaemmaghami, S.: High Capacity Image Steganography in Wavelet Domain. In: Proceedings of 2010 7th IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, Nevada, USA, January 9-12, pp. 1–5. IEEE Conference Publications (2010)

    Google Scholar 

  8. Shejul, A.A., Kulkarni, U.L.: A Secure Skin Tone based Steganography (SSTS) using Wavelet Transform. International Journal of Computer Theory and Engineering 3(1), 16–22 (2011)

    Article  Google Scholar 

  9. Tong, L., Zheng-ding, Q.: A DWT-based Color Image Steganography Scheme. In: 6th International Conference on signal Processing, vol. 2, pp. 1568–1571. IEEE (2002)

    Google Scholar 

  10. Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Skin Tone Based Steganography in Video Files Exploiting the YCbCr Colour Space. In: School of Computing and Intelligent Systems, Londonderry, BT48 7JL, Northern Ireland, United Kingdom 978-1-4244-2571-6/08, pp. 905–908. IEEE (2008)

    Google Scholar 

  11. Hemalatha, S., Dinesh Acharya, U., Renuka, A., Kamath, P.R.: A Secure and high capacity image steganography technique. Signal & Image Processing: An International Journal (SIPIJ) 4(1), 83–89 (2013)

    Google Scholar 

  12. Maya, C., Sabarinath, G.: An Optimized FPGA Implementation of LSB Replacement Steganography Using DWT. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (An ISO 3297: 2007 Certified Organization) 2(1), 586–593 (2013)

    Google Scholar 

  13. Mahmood, A.F., Kanai, N.A., Mohmmad, S.S.: An FPGA Implementation of Secured Steganography Communication System. Tikrit Journal of Engineering Sciences 19(4), 14–23 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Sathish Shet .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Shet, K.S., Nagaveni, Aswath, A.R. (2015). Image Steganography Using Integer Wavelet Transform Based on Color Space Approach. In: Satapathy, S., Biswal, B., Udgata, S., Mandal, J. (eds) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, vol 327. Springer, Cham. https://doi.org/10.1007/978-3-319-11933-5_95

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11933-5_95

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11932-8

  • Online ISBN: 978-3-319-11933-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics