Cart (Loading....) | Create Account
Close category search window
 

A Novel Approach to Develop a Secure Image based Steganographic Model using Integer Wavelet Transform

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Bhattacharyya, S. ; Dept. of Comput. Sci. & Eng., Univ. of Burdwan, Burdwan, India ; Kshitij, A.P. ; Sanyal, G.

Steganography is a process that involves hiding a message in an appropriate carrier like image or audio. It is of Greek origin and means "Covered or hidden writing". The carrier can be sent to a receiver without any one except the authenticated receiver only knows existence of the information. Steganography is an emerging area which is used for secured data transmission over any public media. Considerable amount of work has been carried out by different researchers on steganography. In this paper, a specific image based steganography technique for communicating information more securely between two locations is proposed. The author incorporated the idea of secret key for authentication at both ends in order to achieve high level of security. Before the embedding operation the cover image is segmented in different objects through normalized cut. As a further improvement of security level, the information has been permuted, encoded through integer wavelet transformation by lifting scheme and segmented in different parts and then finally each part has been embedded through modified lsb embedding method on different cuts of the cover image to form different stego objects. Finally stego image is formed by combining different stego objects and transmit to the receiver side. At the receiver side different reverse operation has been carried out to get back the original information. The proposed embedding approach works by selecting the embedding pixels using some mathematical function and then finds the 8 neighborhood of the selected pixel and map each bit of the secret message in each of the neighbor pixel in a specified manner. Before embedding a checking has been done to find out whether the selected pixel or its neighbor lies at the boundary of the image or not.

Published in:

Recent Trends in Information, Telecommunication and Computing (ITC), 2010 International Conference on

Date of Conference:

12-13 March 2010

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.