Research Article | OPEN ACCESS
Novel Technology for Secure Data Transmission Based on Integer Wavelet Transform and Particle Swarm Optimization
1S.Thenmozhi and 2Dr. M. Chandrasekaran
1Anna University
2GCE, Bargur, Tamilnadu, India
Research Journal of Applied Sciences, Engineering and Technology 2016 2:188-196
Received: June 14, 2015 | Accepted: August 15, 2015 | Published: January 20, 2016
Abstract
Steganography is the art and science of embedding hidden messages in a carrier medium such that no one apart from the sender and intended recipient even realizes that there is a hidden message. Mediums can include image, video and audio. The main goal of steganography is to maintain secret communication between two parties. There are many techniques available to achieve steganography. This study provides a robust and secure image steganography method to conceal secret image in digital cover image without incurring any perceptual distortion. The technique is based on Integer Wavelet Transform (IWT) and Particle Swarm Optimization (PSO) in transform domain. The transform domain is employed to increase the robustness of the image steganography method. Integer wavelet transform evades the floating point precision problems of the wavelet filters. To achieve high security, an encryption mechanism utilizing PSO is proposed. The secret message to be transmitted is normalized and then embedded into the cover image using IWT and the key generated by PSO. The proposed method is tested on various cover and secret images. The experimental results substantiate that PSO in IWT domain can improve the quality of stego image effectively without any compromise in histogram and statistical analysis. The proposed method also maintains good perceptual quality in Stego image and greater security.
Keywords:
Histogram analysis, image steganography, image steganography, particle swarm optimization,
References
-
Al-Ataby, A. and F. Al-Naima, 2010. A modified high capacity image steganography technique based on wavelet transform. Int. Arab J. Inf. Techn., 7(4): 358-364.
-
Bedi, P., R. Bansal and P. Seghal, 2013. Using PSO in a spatial domain based image hiding scheme with distortion tolerance. Comput. Electr. Eng., 39(2): 640-654.
CrossRef -
Bhattacharya, T., N. Dey and S.R. Bhadra Chaudhuri, 2011. A novel session based dual steganographic technique using DWT and spread spectrum. Int. J. Modern Eng. Res. (IJMER), 1(1): 157-161.
-
Chan, C.K. and L.M. Cheng, 2004. Hiding data in images by simple LSB substitution. Pattern Recogn., 37(3): 469-474.
CrossRef -
Chang, C.C., T.S. Chen and L.Z. Chung, 2002. A steganographic method based upon JPEG and quantization table modification. Inform. Sciences, 141: 123-138.
CrossRef -
Chang,K.C., C.P. Chang, P.S. Huang and T.M. Tu, 2008. A novel image steganographic method using tri-way pixel-value differencing. J. Multimedia, 3(2): 37-44.
CrossRef -
Chen,P. and H. Lin, 2006. A DWT approach for image steganography. Int. J. Appl. Sci. Eng., 4(3): 275-290.
-
Cox, I.J., J. Kilian, F.T.Leighton and T. Shamoon, 1997. Secure spread spectrum watermarking for multimedia. IEEE T. Image Process., 6(12): 1673-1687.
CrossRef PMid:18285237 -
Elbeltagi, E., T.Hegacy and D. Grierson, 2005. Comparison among five evolutionary-based optimization algorithms. Adv.Eng. Inform., 19(1): 43-53.
CrossRef -
Hsieh, M.S., D.C. Tseng and Y.H. Huang, 2001. Hiding digital watermarks using multiresolution wavelet transform. IEEE T. Ind. Electron., 48(5): 875-882.
CrossRef -
Ioannidou, A., S.T. Halkidis and G. Stephanides, 2012. A novel technique for image steganography based on a high payload method and edge detection. Expert Syst. Appl., 39: 11517-11524.
CrossRef -
Katzenbeisser,S. and F.A.P. Petitcolas, 2000. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Inc., Boston.
-
Kennedy, J. and R. Eberhart, 1995. Particle swarm optimization. Proceeding of the IEEE International Conference on Neural Networks, pp: 1942-1948.
CrossRef -
Kiamini, M. and S. Fazli, 2008. A high performance steganographic method using JPEG and PSO algorithm. Proceeding of IEEE International Multitopic (December 24, 2008).
-
Lai, B.L. and L.W. Chang, 2006. Adaptive data hiding for images based on harr discrete wavelet transform. In: Chang, L.W., W.N. Lie and R. Chiang (Eds.), PSIVT, 2006. LNCS 4319, Springer-Verlag,Berlin,Heidelberg, pp: 1085-1093.
CrossRef -
Lee, S., C.D.Yoo and T. Kalker, 2007. Reversible image watermarking based on integer-to-integer wavelet transform. IEEE T. Inf. Foren. Sec., 2(3): 321- 330.
CrossRef -
Mandal, J.K. and M. Sengupta, 2010. Authentication/secret message transformation through wavelet transform based subband image coding (WTSIC). Proceeding of International Symposium on Electronic System Design, pp: 225-229.
CrossRef -
Nasiri, J.A.,H.S. Yazdi, M.A. Moulavi,M.Rouhani and A.E.Shargh, 2008. A PSO tuning approach for lip detection on color images. Proceeding of the 2nd UKSIM European Symposium on Computer Modeling and Simulation, pp: 278-282.
CrossRef -
Ni, Z.C., Y.Q. Shi, N. Ansari and W. Su, 2006. Reversible data hiding. IEEE T. Circ. Syst. Vid., 16(3): 354-362.
CrossRef -
Noda, H., M. Niimi and E. Kawaguchi, 2006. High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recogn. Lett., 27(5): 455-461.
CrossRef -
Parul, Manju and H. Rohil, 2014. Optimized image steganography using discrete wavelet transform. Int. J. Recent Dev. Eng. Technol., 2(2): 75-81.
-
Petitcolas, F.A.P., R.J. Anderson and M.G. Kuhn, 1999. Information hiding-a survey. P.IEEE, 87(7): 1062-1078.
CrossRef -
Shejul, A.A. and U.L. Kulkarni, 2011. A secure skin tone based steganography using wavelet transform. Int. J. Comput. Theor. Eng., 3(1): 16-22.
CrossRef -
Shih, F.Y. and Y.T. Wu, 2005. Robust watermarking and compression for medical images based on genetic algorithms. Inform. Sciences, 175(3): 200-216.
CrossRef -
Tai, W.L., C.M. Yeh and C.C. Chang, 2009. Reversible data hiding based on histogram modification of pixel differences. IEEE T. Circ. Syst. Vid., 19(6): 906-910.
CrossRef -
Tian, J., 2003. Reversible data embedding using a difference expansion. IEEE T. Circ. Syst. Vid., 13(8): 890-896.
CrossRef -
Tiwari, S. and S. Gajbhiye, 2013. Algorithm of swarm intelligence using data clustering. Int. J. Comput. Sci. Inform. Technol., 4(4): 549-552.
-
Tolba, M.F., M.A. Ghonemy, I.A. Taha and A.S. Khalifa, 2004. Using integer wavelet transforms in colored image-stegnography. Int. J. Intell. Coop. I., 4: 75-85.
-
Tseng, H.W. and C.C. Chang, 2004. High capacity data hiding in jpeg compressed images. Informatica, 15(1): 127-142.
-
Wang, R.Z., C.F. Lin and J.C. Lin, 2001. Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn., 34(3): 671-683.
CrossRef -
Westfeld, A., 2001. F5a steganographic algorithm: High capacity despite better steganalysis. Proceeding of the 4th International Workshop on Information Hiding, pp: 289-302.
CrossRef -
Xuan, G., 2002. Distortion less data hiding based on integer wavelet transform. Electron. Lett., 38(25): 1646-1648.
CrossRef -
Zayed, H.H., 2005. A high-hiding capacity technique for hiding data in images based on k-bit LSB substitution. Proceeding of the 30th International Conference on Artificial Intelligence Applications, Cairo.
-
Zeng, G. and Y. Jiang, 2010. A modified PSO algorithm with line search. Proceeding of the International Conference on Computational Intelligence and Software Engineering (CiSE), pp: 1-4.
CrossRef -
Zhang, X.P. and S.Z. Wang, 2005. Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Proc. Let., 12(1): 67-70.
CrossRef
Competing interests
The authors have no competing interests.
Open Access Policy
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Copyright
The authors have no competing interests.
|
|
|
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
|
Information |
|
|
|
Sales & Services |
|
|
|