Skip to main content

DWT Difference Modulation Based Novel Steganographic Algorithm

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9478))

Abstract

Data security means protecting data, such as a database, file, from destructive forces and the unwanted actions of unauthorized users. Since the use of internet is getting popular day by day, data security for efficient and reliable communication has become an important issue. This is the first step towards the introduction of modern day cryptography, steganography and watermarking. Discrete Wavelet Transform Difference Modulation (DWTDM) can be used to embed data by adjusting the pixel values and thus the data can be hidden and the human eye will not be able to notice the hidden text in the cover image. This paper explains the DWTDM with some modified strategies in order to minimize the distortion of the stego image from the cover image. We also show that our work withstand the statistical attacks as well as the benchmark like stirmark.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Bhattacharyya, S., Sanyal, G.: A robust image steganography using DWT difference modulation (DWTDM). Int. J. Comput. Netw. Inf. Secur. 4, 27–40 (2012)

    Google Scholar 

  2. Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. J. Pattern Recogn. Soc. 37, 469–474 (2004)

    Article  MATH  Google Scholar 

  3. Chen, P.Y., Lin, H.J.: A DWT based approach for image steganography. Int. J. Appl. Sci. Eng. 4, 275–290 (2006)

    Google Scholar 

  4. Cipra, B.: An introduction to the Ising model. Am. Math. Mon. 94(10), 937–959 (1987)

    Article  MathSciNet  Google Scholar 

  5. Elfouly, H.F., Mahmoud, M.I., Dessouky, M.I.M., Deyab, S.: Comparison between Haar and DaubechiesWavelet Transformations on FPGA Technology. Int. J. Electr. Robot. Electron. Commun. Eng 2, 133–137 (2008)

    Google Scholar 

  6. Hossain, S.M., Haque, M.S.: A block based data hiding method in images using pixel value differencing and LSB substitution method. In: Proceedings of the 15th International Conference on Computer and Information Technology (ICCIT), pp. 168–172 (2012)

    Google Scholar 

  7. Kocioek, M., Materka, A., Strzelecki, M., Szczypiski, P.: Discrete wavelet transform derived features for digital image texture analysis. Int. J. Eng. Technol., 833–841 (2014)

    Google Scholar 

  8. Masud Karim, S.M., Rahman, M.S., Hossain, M.I.: A new approach for LSB based image steganography using secret key. In: Proceedings of the 14th International Conference Computer and Information Technology (ICCIT), pp. 286–291 (2011)

    Google Scholar 

  9. Pahati, O.J.: Confounding Carnivore: How to Protect Your Online Privacy (2008)

    Google Scholar 

  10. Paul, G., Davidson, I., Mukherjee, I., Ravi, S.S.: Keyless steganography in spatial domain using Energetic pixels. In: Venkatakrishnan, V., Goswami, D. (eds.) ICISS 2012. LNCS, vol. 7671, pp. 134–148. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  11. Reddy, V.L., Subramanyam, A., Reddy, P.C.: Implementation of LSB steganography and its evaluation for various file formats. Int. J. Adv. Netw. Appl. 2, 868–872 (2011)

    Google Scholar 

  12. Torres, S., Nakano-Miyatake, M., Perez-Meana, H.: An image steganography systems based on BPCS and IWT. In: 16th International Conference Electronics, Communications and Computers, CONIELECOMP 2006 (2006)

    Google Scholar 

  13. Verma, A., Nolkha, R., Singh, A., Jaiswal, G.: Implementation of image steganography using 2-level DWT technique. Int. J. Comput. Sci. Bus. Inform. 1, 1–14 (2013)

    Google Scholar 

  14. www.imageprocessingplace.com

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Imon Mukherjee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Mukherjee, I., Datta, B., Banerjee, R., Das, S. (2015). DWT Difference Modulation Based Novel Steganographic Algorithm. In: Jajoda, S., Mazumdar, C. (eds) Information Systems Security. ICISS 2015. Lecture Notes in Computer Science(), vol 9478. Springer, Cham. https://doi.org/10.1007/978-3-319-26961-0_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26961-0_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26960-3

  • Online ISBN: 978-3-319-26961-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics