Skip to main content
Log in

An image steganography method based on integer wavelet transform

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper presents a novel approach for Image steganography based on Integer Wavelet Transform. In this method, the cover image is mapped to a specific frequency domain. Then in the obtained frequency domain, edge coefficients are classified based on their MSBs. The suggested method prevents changes in MSB in a way that receiver can extract the information without any mistakes. Considering the preformed classification, secret bits will be embedded in the frequency coefficients and then with the use of inverse transformation, stego image will be obtained. The most important features that our work obtained are good adaptation with human vision system and retrieval of data without error. Simulation results show that our proposed method has a good adaptation with human vision system (HVS) and outperforms in terms of PSPNR factors over recently published works.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Abduallah WM, Rahma AMS, Pathan ASK (2014) Mix column transform based on irreducible polynomial mathematics for color image steganography: a novel approach. Comput Electr Eng 40(4):1390–1404

    Article  Google Scholar 

  2. Abedini A, Miri A, Maleki A (2017) Parallel improved pulse coupled neural network application for edge detection in image processing. J Comput Eng Inf Technol 6:2

    Article  Google Scholar 

  3. Al-Dmour H, Al-Ani A (2016) A steganography embedding method based on edge identification and XOR coding. Expert Syst Appl 46:293–306

    Article  Google Scholar 

  4. Bedi P, Bansal R, Sehgal P (2013) Using PSO in a spatial domain based image hiding scheme with distortion tolerance. Comput Electr Eng 39(2):640–654

    Article  Google Scholar 

  5. Chakraborty, S, Jalal, AS, Bhatnagar, C (2017) LSB based non blind predictive edge adaptive image steganography. Multimedia tools and applications Multimedia Tools and Applications, 76(6):7973–7987

  6. Chou CH, Li YC (1995) A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile. IEEE Trans Circuits Syst Video Technol 5(6):467–476

    Article  Google Scholar 

  7. Davis R (1978) The data encryption standard in perspective. IEEE Communications Soc Mag 16(6):5–9

    Article  Google Scholar 

  8. Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process 51(7):1995–2007

    Article  MATH  Google Scholar 

  9. El-Emam NN (2015) New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization. Comput Secur 55:21–45

    Article  MathSciNet  Google Scholar 

  10. El-Emam NN, Al-Zubidy RAS (2013) New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm. J Syst Softw 86(6):1465–1481

    Article  Google Scholar 

  11. Fan L, Gao T, Cao Y (2013) Improving the embedding efficiency of weight matrix-based steganography for grayscale images. Comput Electr Eng 39(3):873–881

    Article  Google Scholar 

  12. Houssein, E. H., Ali, M. A., & Hassanien, A. E. (2016). An image steganography algorithm using Haar discrete wavelet transform with advanced encryption system. In computer science and information systems (FedCSIS), 2016 federated Conference on (pp. 641-644). IEEE

  13. Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41(14):6123–6130

    Article  Google Scholar 

  14. Ker, A. D. (2005). A general framework for structural steganalysis of LSB replacement. In International Workshop on Information Hiding (pp. 296–311). Springer Berlin Heidelberg

  15. Ker AD (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 12(6):441–444

    Article  Google Scholar 

  16. Kieu TD, Chang CC (2011) A steganographic scheme by fully exploiting modification directions. Expert Syst Appl 38(8):10648–10657

    Article  Google Scholar 

  17. Lin YK (2014) A data hiding scheme based upon DCT coefficient modification. Comput Stand Interfaces 36(5):855–862

    Article  Google Scholar 

  18. Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5(2):201–214

    Article  Google Scholar 

  19. Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287

    Article  Google Scholar 

  20. Parah SA, Sheikh JA, Hafiz AM, Bhat GM (2014) Data hiding in scrambled images: a new double layer security data hiding technique. Comput Electr Eng 40(1):70–82

    Article  Google Scholar 

  21. Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126

    Article  MathSciNet  MATH  Google Scholar 

  22. Seyedi, S. H., Aghaeinia, H., & Sayadian, A. (2011). A new robust image adaptive steganography method in wavelet domain. In Electrical Engineering (ICEE), 2011 19th Iranian Conference on (pp. 1-5). IEEE

  23. Singh, S., & Siddiqui, T. J. (2012). Robust image steganography technique based on redundant discrete wavelet transform. In power, control and embedded systems (ICPCES), 2012 2nd international Conference on (pp. 1-4). IEEE

  24. Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aref Miri.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Miri, A., Faez, K. An image steganography method based on integer wavelet transform. Multimed Tools Appl 77, 13133–13144 (2018). https://doi.org/10.1007/s11042-017-4935-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4935-z

Keywords

Navigation