Comprehensive Data Hiding Technique for Discrete Wavelet Transform-Based Image Steganography Using Advance Encryption St

The steganography is the discipline of trouncing data into innocuous media in a manner that reality of the hidden data remains invisible to an antagonist. Varieties of methods have been developed over time in the area of image steganography. Robust stegan

  • PDF / 461,379 Bytes
  • 8 Pages / 439.37 x 666.142 pts Page_size
  • 107 Downloads / 291 Views

DOWNLOAD

REPORT


Abstract The steganography is the discipline of trouncing data into innocuous media in a manner that reality of the hidden data remains invisible to an antagonist. Varieties of methods have been developed over time in the area of image steganography. Robust steganography technique increases data protection from an adversary even if an attacker clutches the knowledge about the embedding process. Modern information security system combines both cryptography and steganography techniques. This paper proposes an image steganography method, at the initial stage secret image is encrypted using advance encryption standard (AES) and afterwards hide the results of AES into the picture (i.e. cover media or cover image) with the assistance of Haar Discrete Wavelet Transform and alpha blending. These efforts ensure that the proposed data hiding mechanism gives higher imperceptibility and trustworthiness which is the essential requirements of any steganography technique. All practical implementation perform on MATLAB.



Keywords AES Steganography Alpha blending PSNR MSE





⋅ Steganalysis ⋅ Haar DWT ⋅ Haar IDWT ⋅ ⋅ NCC

1 Introduction Information system security (Cryptography, Watermarking and Steganography) is a discipline that protects the confidentiality and accessibility of information. From earlier days, there were many ways to keep confidential information secure when they are communicated. The steganography is a technique that is used for secure communication. These vital aims separate it from supplementary practices as cryptography watermarking [1]. Sometimes, sending encrypted information may V.K. Sharma (✉) ⋅ D.K. Srivastava SCIT Manipal University, Jaipur, Rajasthan, India e-mail: [email protected] D.K. Srivastava e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2017 H.R. Vishwakarma and S. Akashe (eds.), Computing and Network Sustainability, Lecture Notes in Networks and Systems 12, DOI 10.1007/978-981-10-3935-5_36

353

354

V.K. Sharma and D.K. Srivastava

Cover image

Stego Image Message

Stegosystem Encoder

Key Estimate of Message

Stegosystem Decoder

CHANNEL

Estimate of Stego Image

Fig. 1 Basic steganography model (Source [1])

draw the attention of an observer, while imperceptible information will not. In cryptography, feature is always visual, whereas in steganography, the feature is always invisible. Watermarking is used for copyright protection. The main aim here is to place the identification of author or artist. It can be either visible or invisible. For secure communication, steganography is the most demanding technique; it is applicable to all data objects that contain redundancy, in this paper, images (i.e. JPEG and TIFF) are considered. People frequently broadcast digital pictures over Internet or other communication like e-mail, most common image format is JPEG. The use of JPEG picture format in steganography systems seems more interesting because system operate in transformed domain (like DWT, DCT) and not affected by existing visual attack Figure 1 shows the basi