A novel technique to hide information using Daubechies Transformation
Keywords:
Daubechies Transform, Cover Image,Stego ImageAbstract
Steganography is an ancient approach of fusing data into innocence medium to hide data secretly in such a way no one can have knowledge of it. This paper presents a technique of Image steganography on frequency domain through Daubechies Transformation. This transformation converts image from spatial domain to frequency domain and allowed embedding with a payload of 2.0 bpb without visual degradation. A gray level image considered as innocent medium of size NxN, where N = 2p, p is an positive integer & is divided into 4x4 non-overlapping blocks in a row major order and a 2D Daubechies Transformation is applied to each of (NxN)/16 blocks to generate frequency components. Three layer of adjustment in terms of security enhancement are applied to improve the quality of stego image. The number of bits embedded per pixel or block is a variable and based on hash function which is used to find the position of each bit. After embedding 4 bits from LSB are grouped into two pairs and XORed, bitwise results are shuffled and stored on last four bits from LSB
References
Alturki F.; Russell, Mersereau. (2001, October 7-10). Secure blind image steganographic technique using discrete Fourier transformation. International Conference on Image Processing. Proceedings., vol.2,. 542 545. doi: 10.1109/ICIP.2001.958548
Hashad, A.I.; Madani, A.S.; Wahdan, A.E.M.A. (2005, December 5th 6th). A robust steganography technique using discrete cosine transform insertion. 3rd International Conference on Information and Communications Technology. Enabling Technologies for the New Knowledge Society: ITICT. 255 264, doi: 10.1109/ITICT.2005.1609628.
J.K. Mandal,MadhumitaSengupta, ”Authentication/Secret Message Transformation through Wavelet Transform Based Subband Image Coding (WTSIC)”,2010
Hsieh, Ming-Shing; Tseng, Din-Chang; Huang. Yong-Huai. (2001, October). Hiding digital watermarks using multiresolution wavelet transform. Industrial Electronics, IEEE Transactions on, 48(5). 875 882. doi: 10.1109/41.954550.
MadhumitaSengupta,J. K. Mandal, N. Ghoshal ,”An Authentication Technique in Frequency Domain through Wavelet Transform (ATFDWT)”,2012
Sengupta, Madhumita; Mandal, J. K.,”Transformed IRIS Signature fabricated Authentication in Wavelet based Frequency Domain (TISAWFD)”,2011
MadhumitaSengupta,J.K. Mandal,”Authentication Through Hough Transformation Generated Signature on G-Let D3 Domain (AHSG)”,2013
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
