Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm

被引:0
|
作者
Sabeti, Vajiheh [1 ]
Amerehei, Mahsa [1 ]
机构
[1] Alzahra Univ, Fac Engn, Dept Comp Engn, Tehran, Iran
关键词
Digital Steganography; Steganalysis; Discrete Wavelet Transform; Genetic Algorithm; SCHEME; DOMAIN;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A steganography system must embed the message in an unseen and unrecognizable manner in the cover signal. Embedding information in transform coefficients, especially Discrete Wavelet Transform, is one of the most successful approaches in this field. The proposed method in this paper has two main steps. In the first step, the XOR logical function was used to embed two bits of data in the adjacent DWT coefficient pair. No change in the coefficients will occur if the XOR result of the two bits of low-value data of the two adjacent coefficients is identical to the two bits of secret data. Otherwise, one or both of the coefficient(s) will need a one-unit increase or decrease. In the second step, the genetic algorithm was used to select, between the two possible solutions, a new value for the adjacent coefficient pair that needs to be changed. Using the genetic algorithm, the selections were made such that the generated stego image experienced the least change relative to the cover image. The results of comparing this method with the existing methods in low- and high-level embedding showed that the proposed method was successful in producing stego images with high-quality criteria. In addition, the SPAM steganalysis method did not show high accuracy in its detection. One of the benefits of the proposed method is the need for a short key to embed and extract the secret message. This issue increases the security and feasibility of the proposed method. (C) 2020 ISC. All rights reserved.
引用
收藏
页码:185 / 197
页数:13
相关论文
共 50 条
  • [21] Enhanced high capacity image steganography using discrete wavelet transform and the Laplacian pyramid
    Tamer Rabie
    Mohammed Baziyad
    Ibrahim Kamel
    Multimedia Tools and Applications, 2018, 77 : 23673 - 23698
  • [22] New Image Steganography Method Based on Haar Discrete Wavelet Transform
    Taouil, Youssef
    Ameur, El Bachir
    Belghiti, Moulay Taib
    EUROPE AND MENA COOPERATION ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGIES, 2017, 520 : 287 - 297
  • [23] Robust Image Steganography Technique Based on Redundant Discrete Wavelet Transform
    Singh, Siddharth
    Siddiqui, Tanveer J.
    2012 2ND INTERNATIONAL CONFERENCE ON POWER, CONTROL AND EMBEDDED SYSTEMS (ICPCES 2012), 2012,
  • [24] Role of Genetic Algorithm in Performance Improvement of Image Steganography combined with Transform and Its Hybrid Wavelet
    Joshi, Shweta
    Sonawane, Kavita V.
    Khan, Shamsuddin
    2017 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS, COMPUTING AND IT APPLICATIONS (CSCITA), 2017, : 133 - 138
  • [25] Robust Image Steganography Using Complex Wavelet Transform
    Singh, Siddharth
    Siddiqui, Tanveer J.
    2013 INTERNATIONAL CONFERENCE ON MULTIMEDIA, SIGNAL PROCESSING AND COMMUNICATION TECHNOLOGIES (IMPACT), 2013, : 56 - 60
  • [26] Optimization of Image Fusion Using Genetic Algorithms and Discrete Wavelet Transform
    Lacewell, Chaunte W.
    Gebril, Mohamed
    Buaba, Ruben
    Homaifar, Abdollah
    PROCEEDINGS OF THE IEEE 2010 NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2010, : 116 - 121
  • [27] Image Steganography using Discrete Fractional Fourier Transform
    Soni, Ashish
    Jain, Jitendra
    Roshan, Rakesh
    2013 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND SIGNAL PROCESSING (ISSP), 2013, : 97 - 100
  • [28] High Quality Image Steganography on Integer Haar Wavelet Transform using Modulus Function
    Adi, Prajanto Wahyu
    Rahmanti, Farah Zakiyah
    Abu, Nur Azman
    2015 INTERNATIONAL CONFERENCE ON SCIENCE IN INFORMATION TECHNOLOGY (ICSITECH), 2015, : 79 - 84
  • [29] Secure image steganography using framelet transform and bidiagonal SVD
    Mansi S. Subhedar
    Vijay H. Mankar
    Multimedia Tools and Applications, 2020, 79 : 1865 - 1886
  • [30] Efficient and secure image encryption using key substitution process with discrete wavelet transform
    Rehman, Mujeeb Ur
    Shafique, Arslan
    Khan, Kashif Hesham
    Hazzazi, Mohammad Mazyad
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (07)