Research Article |
Image Steganography Technique based on Singular Value Decomposition and Discrete Wavelet Transform
Author(s) : Juhi Singh1 and Mukesh Singla2
Published In : International Journal of Electrical and Electronics Research (IJEER) Volume 10, Issue 2 , Special Issue on RDCTML
Publisher : FOREX Publication
Published : 22 May 2022
e-ISSN : 2347-470X
Page(s) : 122-125
Abstract
Steganography is a technique of hiding information in digital media. In recent years plenty of work has been done in this domain, and the work can be compared on various parameters such as high robustness and large capacity to achieve a goal. This paper proposed the method of steganography in digital media using Singular Value Decomposition (SVD) and Discrete Wavelet Transform (DWT). The DWT is a frequency-domain technique comprising DWT which comparatively offers better robustness and high PSNR value of stego image over other techniques. The proposed method works well for information hiding against AWGN (additive white Gaussian noise) attack and fulfills the objective to achieve high robustness and high PSNR.
Keywords: Data Hiding
, Steganography
, SVD
, DWT
, PSNR
Juhi Singh, Reserach Scholar, Department of Computer Science and engineering, Baba MastNath University, Rohtak Haryana, India; Email: juhisingh17@gmail.com
Mukesh Singla, Professor, Department of Computer Science and engineering, Baba MastNath University, Rohtak Haryana, India; Email: mukesh17singla@yahoo.co.in
[1] Harsh Vikram Singh, “Steganography in images using LSB technique” International Journal of Latest Trends in Engineering and Technology (IJLTET), volume 5, issue 1, pp 426-430.
[2] H. Vikram Singh and J. Singh, "Highly Impertible Spatial Domain Steganography in Double Precision Images," 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), 2018, pp. 768-771, doi: 10.1109/ICICCT.2018.8473067.
[3] Mandy Douglas, “Using SVD and DWT Based Steganography to Enhance the Security of Watermarked Fingerprint Images” TELKOMNIKA, Vol.15, No.3, September 2017, pp. 1368~ 1379 ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013 DOI: 10.12928/TELKOMNIKA.v15i3.6437
[4] Yambem Jina Chanu, “A Robust Steganographic Method based on Singular Value Decomposition”, International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 7 (2014), pp. 717-726
[5] Vikram S.H. (2019) “DCT- and DWT-Based Intellectual Property Right Protection in Digital Images” First International Conference on Artificial Intelligence and Cognitive Computing. Advances in Intelligent Systems and Computing, vol 815. Springer, Singapore. https://doi.org/10.1007/978-981-13-1580-0_49.
[6] Ali Ahmed, “A Secure Image Steganography using LSB and Double XOR Operations”, IJCSNS International Journal of Computer Science and Network Security, VOL.20, No.5, May 2020.
[7] Franklin Tchakounte, “An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images”, EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 05 2020 - 10 2020 | Volume 7 | Issue 24 | e2.
[8] Yambem Jina Chanu1, “A Robust Steganographic Method based on Singular Value”, International Journal of Information & Computation Technology, Volume 4, Number 7 (2014), pp. 717-726.
[9] Mandy Douglas “Using SVD and DWT Based Steganography to Enhance the Security of Watermarked Fingerprint Images”, TELKOMNIKA, Vol.15, No.3, September 2017, pp. 1368~ 1379.
[10] K Suresh Babu, “Robust and High-Capacity Image Steganography using SVD” IET-UK International Conference on Information and Communication Technology in Electrical Sciences (ICTES 2007), Dr. M.G.R. University, Chennai, Tamil Nadu, India. Dec. 20-22, 2007. pp. 718-723.
[11] A. Singh, M.K. Dutta, “A robust zero-watermarking scheme for tele-phthalmological applications” Journal of King Saud University – Computer and Information Sciences 32 (2020) 895–908.
[12] H. I. Shahadi, A. T. Thahab and H. R. Farhan, A novel robust approach for image copyright protection based on concentric rectangles, Journal of King Saud University – Computer and Information Sciences, https://doi.org/10.1016/j.jksuci.2020.06.006.[Cross Ref]
[13] Pan, P.; Wu, Z.; Yang, C.; Zhao, B. Double-Matrix Decomposition Image Steganography Scheme Based on Wavelet Transform with Multi-Region Coverage. Entropy 2022, 24, 246. https://doi.org/ 10.3390/e24020246.[Cross Ref]
[14] Singh, Siddharth, Rajiv Singh, and Tanveer J. Siddiqui. "Singular value decomposition based image steganography using integer wavelet transform." Advances in signal processing and intelligent recognition systems. Springer, Cham, 2016. 593-601.[Cross Ref]
[15] Lakshmi Sirisha, B. "Image steganography based on SVD and DWT techniques." Journal of Discrete Mathematical Sciences and Cryptography 23.3 (2020): 779-786.[Cross Ref]
[16] Compton, A. E., and Stacey L. Ernstberger. "Singular Value Decomposition: Applications to Image Processing." Journal of Undergraduate Research 17 (2020): 99-105.
Juhi Singh, Mukesh Singla (2022), Image Steganography Technique based on Singular Value Decomposition and Discrete Wavelet Transform. IJEER 10(2), 122-125. DOI: 10.37391/IJEER.100212.