Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Novel Technology for Secure Data Transmission Based on Integer Wavelet Transform and Particle Swarm Optimization

1S.Thenmozhi and 2Dr. M. Chandrasekaran
1Anna University
2GCE, Bargur, Tamilnadu, India
Research Journal of Applied Sciences, Engineering and Technology  2016  2:188-196
http://dx.doi.org/10.19026/rjaset.12.2320  |  © The Author(s) 2016
Received: June ‎14, ‎2015  |  Accepted: August ‎15, ‎2015  |  Published: January 20, 2016

Abstract

Steganography is the art and science of embedding hidden messages in a carrier medium such that no one apart from the sender and intended recipient even realizes that there is a hidden message. Mediums can include image, video and audio. The main goal of steganography is to maintain secret communication between two parties. There are many techniques available to achieve steganography. This study provides a robust and secure image steganography method to conceal secret image in digital cover image without incurring any perceptual distortion. The technique is based on Integer Wavelet Transform (IWT) and Particle Swarm Optimization (PSO) in transform domain. The transform domain is employed to increase the robustness of the image steganography method. Integer wavelet transform evades the floating point precision problems of the wavelet filters. To achieve high security, an encryption mechanism utilizing PSO is proposed. The secret message to be transmitted is normalized and then embedded into the cover image using IWT and the key generated by PSO. The proposed method is tested on various cover and secret images. The experimental results substantiate that PSO in IWT domain can improve the quality of stego image effectively without any compromise in histogram and statistical analysis. The proposed method also maintains good perceptual quality in Stego image and greater security.

Keywords:

Histogram analysis, image steganography, image steganography, particle swarm optimization,


References

  1. Al-Ataby, A. and F. Al-Naima, 2010. A modified high capacity image steganography technique based on wavelet transform. Int. Arab J. Inf. Techn., 7(4): 358-364.
  2. Bedi, P., R. Bansal and P. Seghal, 2013. Using PSO in a spatial domain based image hiding scheme with distortion tolerance. Comput. Electr. Eng., 39(2): 640-654.
    CrossRef    
  3. Bhattacharya, T., N. Dey and S.R. Bhadra Chaudhuri, 2011. A novel session based dual steganographic technique using DWT and spread spectrum. Int. J. Modern Eng. Res. (IJMER), 1(1): 157-161.
  4. Chan, C.K. and L.M. Cheng, 2004. Hiding data in images by simple LSB substitution. Pattern Recogn., 37(3): 469-474.
    CrossRef    
  5. Chang, C.C., T.S. Chen and L.Z. Chung, 2002. A steganographic method based upon JPEG and quantization table modification. Inform. Sciences, 141: 123-138.
    CrossRef    
  6. Chang,K.C., C.P. Chang, P.S. Huang and T.M. Tu, 2008. A novel image steganographic method using tri-way pixel-value differencing. J. Multimedia, 3(2): 37-44.
    CrossRef    
  7. Chen,P. and H. Lin, 2006. A DWT approach for image steganography. Int. J. Appl. Sci. Eng., 4(3): 275-290.
  8. Cox, I.J., J. Kilian, F.T.Leighton and T. Shamoon, 1997. Secure spread spectrum watermarking for multimedia. IEEE T. Image Process., 6(12): 1673-1687.
    CrossRef    PMid:18285237    
  9. Elbeltagi, E., T.Hegacy and D. Grierson, 2005. Comparison among five evolutionary-based optimization algorithms. Adv.Eng. Inform., 19(1): 43-53.
    CrossRef    
  10. Hsieh, M.S., D.C. Tseng and Y.H. Huang, 2001. Hiding digital watermarks using multiresolution wavelet transform. IEEE T. Ind. Electron., 48(5): 875-882.
    CrossRef    
  11. Ioannidou, A., S.T. Halkidis and G. Stephanides, 2012. A novel technique for image steganography based on a high payload method and edge detection. Expert Syst. Appl., 39: 11517-11524.
    CrossRef    
  12. Katzenbeisser,S. and F.A.P. Petitcolas, 2000. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Inc., Boston.
  13. Kennedy, J. and R. Eberhart, 1995. Particle swarm optimization. Proceeding of the IEEE International Conference on Neural Networks, pp: 1942-1948.
    CrossRef    
  14. Kiamini, M. and S. Fazli, 2008. A high performance steganographic method using JPEG and PSO algorithm. Proceeding of IEEE International Multitopic (December 24, 2008).
  15. Lai, B.L. and L.W. Chang, 2006. Adaptive data hiding for images based on harr discrete wavelet transform. In: Chang, L.W., W.N. Lie and R. Chiang (Eds.), PSIVT, 2006. LNCS 4319, Springer-Verlag,Berlin,Heidelberg, pp: 1085-1093.
    CrossRef    
  16. Lee, S., C.D.Yoo and T. Kalker, 2007. Reversible image watermarking based on integer-to-integer wavelet transform. IEEE T. Inf. Foren. Sec., 2(3): 321- 330.
    CrossRef    
  17. Mandal, J.K. and M. Sengupta, 2010. Authentication/secret message transformation through wavelet transform based subband image coding (WTSIC). Proceeding of International Symposium on Electronic System Design, pp: 225-229.
    CrossRef    
  18. Nasiri, J.A.,H.S. Yazdi, M.A. Moulavi,M.Rouhani and A.E.Shargh, 2008. A PSO tuning approach for lip detection on color images. Proceeding of the 2nd UKSIM European Symposium on Computer Modeling and Simulation, pp: 278-282.
    CrossRef    
  19. Ni, Z.C., Y.Q. Shi, N. Ansari and W. Su, 2006. Reversible data hiding. IEEE T. Circ. Syst. Vid., 16(3): 354-362.
    CrossRef    
  20. Noda, H., M. Niimi and E. Kawaguchi, 2006. High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recogn. Lett., 27(5): 455-461.
    CrossRef    
  21. Parul, Manju and H. Rohil, 2014. Optimized image steganography using discrete wavelet transform. Int. J. Recent Dev. Eng. Technol., 2(2): 75-81.
  22. Petitcolas, F.A.P., R.J. Anderson and M.G. Kuhn, 1999. Information hiding-a survey. P.IEEE, 87(7): 1062-1078.
    CrossRef    
  23. Shejul, A.A. and U.L. Kulkarni, 2011. A secure skin tone based steganography using wavelet transform. Int. J. Comput. Theor. Eng., 3(1): 16-22.
    CrossRef    
  24. Shih, F.Y. and Y.T. Wu, 2005. Robust watermarking and compression for medical images based on genetic algorithms. Inform. Sciences, 175(3): 200-216.
    CrossRef    
  25. Tai, W.L., C.M. Yeh and C.C. Chang, 2009. Reversible data hiding based on histogram modification of pixel differences. IEEE T. Circ. Syst. Vid., 19(6): 906-910.
    CrossRef    
  26. Tian, J., 2003. Reversible data embedding using a difference expansion. IEEE T. Circ. Syst. Vid., 13(8): 890-896.
    CrossRef    
  27. Tiwari, S. and S. Gajbhiye, 2013. Algorithm of swarm intelligence using data clustering. Int. J. Comput. Sci. Inform. Technol., 4(4): 549-552.
  28. Tolba, M.F., M.A. Ghonemy, I.A. Taha and A.S. Khalifa, 2004. Using integer wavelet transforms in colored image-stegnography. Int. J. Intell. Coop. I., 4: 75-85.
  29. Tseng, H.W. and C.C. Chang, 2004. High capacity data hiding in jpeg compressed images. Informatica, 15(1): 127-142.
  30. Wang, R.Z., C.F. Lin and J.C. Lin, 2001. Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn., 34(3): 671-683.
    CrossRef    
  31. Westfeld, A., 2001. F5a steganographic algorithm: High capacity despite better steganalysis. Proceeding of the 4th International Workshop on Information Hiding, pp: 289-302.
    CrossRef    
  32. Xuan, G., 2002. Distortion less data hiding based on integer wavelet transform. Electron. Lett., 38(25): 1646-1648.
    CrossRef    
  33. Zayed, H.H., 2005. A high-hiding capacity technique for hiding data in images based on k-bit LSB substitution. Proceeding of the 30th International Conference on Artificial Intelligence Applications, Cairo.
  34. Zeng, G. and Y. Jiang, 2010. A modified PSO algorithm with line search. Proceeding of the International Conference on Computational Intelligence and Software Engineering (CiSE), pp: 1-4.
    CrossRef    
  35. Zhang, X.P. and S.Z. Wang, 2005. Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Proc. Let., 12(1): 67-70.
    CrossRef    

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved