Abstract
Data security means protecting data, such as a database, file, from destructive forces and the unwanted actions of unauthorized users. Since the use of internet is getting popular day by day, data security for efficient and reliable communication has become an important issue. This is the first step towards the introduction of modern day cryptography, steganography and watermarking. Discrete Wavelet Transform Difference Modulation (DWTDM) can be used to embed data by adjusting the pixel values and thus the data can be hidden and the human eye will not be able to notice the hidden text in the cover image. This paper explains the DWTDM with some modified strategies in order to minimize the distortion of the stego image from the cover image. We also show that our work withstand the statistical attacks as well as the benchmark like stirmark.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Bhattacharyya, S., Sanyal, G.: A robust image steganography using DWT difference modulation (DWTDM). Int. J. Comput. Netw. Inf. Secur. 4, 27–40 (2012)
Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. J. Pattern Recogn. Soc. 37, 469–474 (2004)
Chen, P.Y., Lin, H.J.: A DWT based approach for image steganography. Int. J. Appl. Sci. Eng. 4, 275–290 (2006)
Cipra, B.: An introduction to the Ising model. Am. Math. Mon. 94(10), 937–959 (1987)
Elfouly, H.F., Mahmoud, M.I., Dessouky, M.I.M., Deyab, S.: Comparison between Haar and DaubechiesWavelet Transformations on FPGA Technology. Int. J. Electr. Robot. Electron. Commun. Eng 2, 133–137 (2008)
Hossain, S.M., Haque, M.S.: A block based data hiding method in images using pixel value differencing and LSB substitution method. In: Proceedings of the 15th International Conference on Computer and Information Technology (ICCIT), pp. 168–172 (2012)
Kocioek, M., Materka, A., Strzelecki, M., Szczypiski, P.: Discrete wavelet transform derived features for digital image texture analysis. Int. J. Eng. Technol., 833–841 (2014)
Masud Karim, S.M., Rahman, M.S., Hossain, M.I.: A new approach for LSB based image steganography using secret key. In: Proceedings of the 14th International Conference Computer and Information Technology (ICCIT), pp. 286–291 (2011)
Pahati, O.J.: Confounding Carnivore: How to Protect Your Online Privacy (2008)
Paul, G., Davidson, I., Mukherjee, I., Ravi, S.S.: Keyless steganography in spatial domain using Energetic pixels. In: Venkatakrishnan, V., Goswami, D. (eds.) ICISS 2012. LNCS, vol. 7671, pp. 134–148. Springer, Heidelberg (2012)
Reddy, V.L., Subramanyam, A., Reddy, P.C.: Implementation of LSB steganography and its evaluation for various file formats. Int. J. Adv. Netw. Appl. 2, 868–872 (2011)
Torres, S., Nakano-Miyatake, M., Perez-Meana, H.: An image steganography systems based on BPCS and IWT. In: 16th International Conference Electronics, Communications and Computers, CONIELECOMP 2006 (2006)
Verma, A., Nolkha, R., Singh, A., Jaiswal, G.: Implementation of image steganography using 2-level DWT technique. Int. J. Comput. Sci. Bus. Inform. 1, 1–14 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Mukherjee, I., Datta, B., Banerjee, R., Das, S. (2015). DWT Difference Modulation Based Novel Steganographic Algorithm. In: Jajoda, S., Mazumdar, C. (eds) Information Systems Security. ICISS 2015. Lecture Notes in Computer Science(), vol 9478. Springer, Cham. https://doi.org/10.1007/978-3-319-26961-0_36
Download citation
DOI: https://doi.org/10.1007/978-3-319-26961-0_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-26960-3
Online ISBN: 978-3-319-26961-0
eBook Packages: Computer ScienceComputer Science (R0)