FOREX Press I. J. of Electrical & Electronics Research
Support Open Access

Research Article |

Image Steganography Technique based on Singular Value Decomposition and Discrete Wavelet Transform

Author(s) : Juhi Singh1 and Mukesh Singla2

Publisher : FOREX Publication

Published : 22 May 2022

e-ISSN : 2347-470X

Page(s) : 122-125




Juhi Singh, Reserach Scholar, Department of Computer Science and engineering, Baba MastNath University, Rohtak Haryana, India; Email: juhisingh17@gmail.com

Mukesh Singla, Professor, Department of Computer Science and engineering, Baba MastNath University, Rohtak Haryana, India; Email: mukesh17singla@yahoo.co.in

[1] Harsh Vikram Singh, “Steganography in images using LSB technique” International Journal of Latest Trends in Engineering and Technology (IJLTET), volume 5, issue 1, pp 426-430.

[2] H. Vikram Singh and J. Singh, "Highly Impertible Spatial Domain Steganography in Double Precision Images," 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), 2018, pp. 768-771, doi: 10.1109/ICICCT.2018.8473067.

[3] Mandy Douglas, “Using SVD and DWT Based Steganography to Enhance the Security of Watermarked Fingerprint Images” TELKOMNIKA, Vol.15, No.3, September 2017, pp. 1368~ 1379 ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013 DOI: 10.12928/TELKOMNIKA.v15i3.6437

[4] Yambem Jina Chanu, “A Robust Steganographic Method based on Singular Value Decomposition”, International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 7 (2014), pp. 717-726

[5] Vikram S.H. (2019) “DCT- and DWT-Based Intellectual Property Right Protection in Digital Images” First International Conference on Artificial Intelligence and Cognitive Computing. Advances in Intelligent Systems and Computing, vol 815. Springer, Singapore. https://doi.org/10.1007/978-981-13-1580-0_49.

[6] Ali Ahmed, “A Secure Image Steganography using LSB and Double XOR Operations”, IJCSNS International Journal of Computer Science and Network Security, VOL.20, No.5, May 2020.

[7] Franklin Tchakounte, “An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images”, EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 05 2020 - 10 2020 | Volume 7 | Issue 24 | e2.

[8] Yambem Jina Chanu1, “A Robust Steganographic Method based on Singular Value”, International Journal of Information & Computation Technology, Volume 4, Number 7 (2014), pp. 717-726.

[9] Mandy Douglas “Using SVD and DWT Based Steganography to Enhance the Security of Watermarked Fingerprint Images”, TELKOMNIKA, Vol.15, No.3, September 2017, pp. 1368~ 1379.

[10] K Suresh Babu, “Robust and High-Capacity Image Steganography using SVD” IET-UK International Conference on Information and Communication Technology in Electrical Sciences (ICTES 2007), Dr. M.G.R. University, Chennai, Tamil Nadu, India. Dec. 20-22, 2007. pp. 718-723.

[11] A. Singh, M.K. Dutta, “A robust zero-watermarking scheme for tele-phthalmological applications” Journal of King Saud University – Computer and Information Sciences 32 (2020) 895–908.

[12] H. I. Shahadi, A. T. Thahab and H. R. Farhan, A novel robust approach for image copyright protection based on concentric rectangles, Journal of King Saud University – Computer and Information Sciences, https://doi.org/10.1016/j.jksuci.2020.06.006.[Cross Ref]

[13] Pan, P.; Wu, Z.; Yang, C.; Zhao, B. Double-Matrix Decomposition Image Steganography Scheme Based on Wavelet Transform with Multi-Region Coverage. Entropy 2022, 24, 246. https://doi.org/ 10.3390/e24020246.[Cross Ref]

[14] Singh, Siddharth, Rajiv Singh, and Tanveer J. Siddiqui. "Singular value decomposition based image steganography using integer wavelet transform." Advances in signal processing and intelligent recognition systems. Springer, Cham, 2016. 593-601.[Cross Ref]

[15] Lakshmi Sirisha, B. "Image steganography based on SVD and DWT techniques." Journal of Discrete Mathematical Sciences and Cryptography 23.3 (2020): 779-786.[Cross Ref]

[16] Compton, A. E., and Stacey L. Ernstberger. "Singular Value Decomposition: Applications to Image Processing." Journal of Undergraduate Research 17 (2020): 99-105.

Juhi Singh, Mukesh Singla (2022), Image Steganography Technique based on Singular Value Decomposition and Discrete Wavelet Transform. IJEER 10(2), 122-125. DOI: 10.37391/IJEER.100212.