2013
DOI: 10.5120/12099-8310
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of Image Steganography based on DWT and Arnold Transform

Abstract: Steganography is the technique that communicates secret data in different carriers like image, audio files etc. in such a way that it is not be visible to attackers. In this paper, performance analysis of image steganography based on Discrete Wavelet Transform (DWT) associated to colored and gray scale images is done. Arnold transformation along with a private key is used during encoding to provide high security. DWT is applied on both the cover image and the secret image and then alpha blending operation is d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
2
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Arash Vosoughi, et al, [12] proposed the use of discrete wavelet transform and Wiener filter for speckle noise suppression of ultrasound images. Shikha Sharda, et al, [13] proposed the important methods of steganography and presented the review of steganography in digital images. This paper presents a new steganography method for embedding secret image into cover image with enhanced security.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Arash Vosoughi, et al, [12] proposed the use of discrete wavelet transform and Wiener filter for speckle noise suppression of ultrasound images. Shikha Sharda, et al, [13] proposed the important methods of steganography and presented the review of steganography in digital images. This paper presents a new steganography method for embedding secret image into cover image with enhanced security.…”
Section: Related Workmentioning
confidence: 99%
“…Cryptography tends to modify the data into a form that an eavesdropper cannot understand. On the other hand, steganography tends to hide the existence of the message itself, which makes it difficult for an observer to find out where the message is [13]. Sometimes, sending encrypted information may draw the attention of an observer, while invisible information will not.…”
Section: Introductionmentioning
confidence: 99%
“…Steganography exploit of human perception; our senses aren't made to hunt for files with information concealed inside of them [1].a superb image steganography technique includes three main parts, the first is capacity or the greatest quantity of data that must be held within the cover image, the second factor is imperceptibility which refers to the quality of the stego-picture built after data has been hidden, and the third factor is robustness which measures the ability of secret information to resist against threats [3].The most popular stenographic approach is Least Significant Bit (LSB) substitution. The core notion of LSB substitution entails embedding secret data in bits with the smallest weighting so that the value of the original pixel is unaffected [4]. Steganography methods can be classified into text, image, audio, and video steganography according on the cover media used to embed secret data [3]:…”
Section: Introductionmentioning
confidence: 99%
“…Steganography is a technique for embedding secret information into an innocent-looking carrier. There are many medium that can be used as carrier, such as videos (Sadek, Khalifa, & Mostafa, 2015), audios (Dutta, Bhattacharyya, & Kim, 2009), images (Sharda & Budhiraja, 2013), et al Video has become one of the most popular carrier for Steganography with the development of multimedia. Video Steganography can easily achieve a large Capacity with slight modification.…”
Section: Introductionmentioning
confidence: 99%