• Corpus ID: 63229088

A DWT Method for Image Steganography

@inproceedings{Banik2013ADM,
  title={A DWT Method for Image Steganography},
  author={Barnali Gupta Banik and Samir Kumar Bandyopadhyay},
  year={2013}
}
In this era of Internet every digitized object is transferable and exchangeable over internet for various purposes. As every computer user knows that there are numerous security threats for digitized objects hence methods like steganography are getting more importance day by day. Though steganography is a very old method of hiding information behind some object, but still this is very effective for secure data transfer and data exchange. Today this method is used for digital objects like text… 

Figures from this paper

An Overview of Image Steganography Techniques
TLDR
Various image steganography techniques such as Least significant bit, Discrete wavelet transformation, Pixel value differencing, Discreet cosine transformation, Masking and filtering etc. are discussed.
Image Steganography using DWT and Data Encryption Standard (DES)
TLDR
An image steganography that combines Discrete wavelet transform (DWT), least significant bit (LSB), and Encryption techniques on raw images to enhance the security of secret message is presented.
A Survey on Various Approaches of Image Steganography
TLDR
An overview of different techniques used for image steganography is given, among which DCT & DWT techniques are widely used because of their efficiency.
Image Steganography in Wavelet Domain
TLDR
An image steganography method in transform domain is proposed, which is based on discrete wavelet transform and a canny edge detection technique, in an attempt to increase amount of embedded data into cover image and improve quality of stego image.
A DWT based Attack Resistant Video Steganography
TLDR
An advance DWT based approach for data protection is proposed that shows that data is securely extracted after performing various attacks, due to the use of attack resistant based video steganography concept.
A Review on Steganography - Least Significant Bit Algorithm and Discrete Wavelet Transform Algorithm
TLDR
This paper is reviewing the two Steganography algorithms- Least Significant Bit and Discrete Wavelet Transformation.
Audio Hiding in an Image Using Steganographic Methods
TLDR
The implementation carried out here will give a clear understanding on how LSB stands out best from other algorithms such as Discrete Wavelet Transform (DWT) and other techniques while hiding an audio file inside an image.
A New Hybrid Method for Colored Image Steganography Based On DWT
TLDR
This study proposes a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blue channel to provide robustness against attacks, eavesdropping and capacity.
Text Steganography on Digital Video Using Discrete Wavelet Transform and Cryptographic Advanced Encryption Standard Algorithm
TLDR
The quality of the results of steganography used to hide secret messages in a video (stego video) using Discrete Wavelet Transform (DWT) and Advanced Encryption Standard (AES) is good, which means the change of the video frame due to insertion does not cause large noise, thus, thequality of the resulting video stego is satisfactory.
Image Steganography Technique Using Daubechies Discrete Wavelet Transform
TLDR
This research implements steganography technique using Daubechies Discrete Wavelet Transform (DWT) to obtain secret information from stego image and the performance of the proposed approach is evaluated using PSNR and MSE.
...
...

References

SHOWING 1-8 OF 8 REFERENCES
Image Steganography using DWT and Blowfish Algorithms
TLDR
A steganography technique which embeds the secret messages in frequency domain using Blowfish algorithm, an evolutionary improvement over DES, 3DES, etc designed to increase security and to improve performance.
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
TLDR
This paper presents a novel technique for Image steganography based on DWT, where DWT is used to transform original image (cover image) from spatial domain to frequency domain, where satisfactory security is maintained since the secret message/image cannot be extracted without knowing decoding rules and Huffman table.
Wavelets: A Tutorial in Theory and Applications
Orthogonal wavelets daubechies' scaling function on (0.3), D. Pollen wavelet matrices and the representation of discrete functions, P.N. Heller, et al wavelets and generalized functions, G.G. Walter
Ten Lectures on Wavelets
TLDR
This paper presents a meta-analyses of the wavelet transforms of Coxeter’s inequality and its applications to multiresolutional analysis and orthonormal bases.
[Linear regression and correlation].
Mihir Bellare , Shafi Goldwassery and Daniele Micciancioz “ ‘ Pseudo - Random ’ Number Generation within Cryptographic Algorithms : the DSS Case ” , Advances in Cryptology - Crypto 97 Proceedings
  • " Linear Regression and Correlation . " Ch . 15 in Mathematics of Statistics , Pt . 1
  • 1997
Linear Regression and Correlation." Ch
  • Mathematics of Statistics,
  • 1962