Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

May Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the May 2023 Edition of the journal. The last date of research paper submission is April 14, 2023.

Performance Comparison of Block-DCT, Kekre's Wavelet and Haar Transform using LZW and Huffman Encoding in Image Steganography

Archana B. Patankar, Sana Naik Published in Image Processing

IJAIS Proceedings on International Conference and Workshop on Communication, Computing and Virtualization
Year of Publication: 2015
© 2015 by IJAIS Journal
Download full text
  1. Archana B Patankar and Sana Naik. Article: Performance Comparison of Block-DCT, Kekre’s Wavelet and Haar Transform using LZW and Huffman Encoding in Image Steganography. IJAIS Proceedings on International Conference and Workshop on Communication, Computing and Virtualization ICWCCV 2015(3):1-6, September 2015. BibTeX

    @article{key:article,
    	author = "Archana B. Patankar and Sana Naik",
    	title = "Article: Performance Comparison of Block-DCT, Kekre’s Wavelet and Haar Transform using LZW and Huffman Encoding in Image Steganography",
    	journal = "IJAIS Proceedings on International Conference and Workshop on Communication, Computing and Virtualization",
    	year = 2015,
    	volume = "ICWCCV 2015",
    	number = 3,
    	pages = "1-6",
    	month = "September",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

This paper proposes the use of various transforms for image steganography. It focuses on use of wavelet transform such as Kekre's Wavelet and Haar transform to compress cover image and use of compression mechanisms such as LZW for secret image. Wavelet transform is generated from their respective orthogonal transform. Image Steganography is the art of hiding information into a co4ver image. A novel technique for image steganography using transforms such as Kekre's wavelet transform and Haq3ar transform along with LZW is used to convert original image (cover image) from spatial domain to frequency domain. In the proposed methodology the secret message is encoded using LZW technique. Then encrypted image/message is embedded in the transformed carrier image. The experimental results show the comparative results between Huffman coding and LZW compression using Kekre's Wavelet t4ransform, Haar transform and DCT. Moreover PSNR and RMSE between the cover image and stego image shows the better results in comparison with other existing steganography approaches. The perceptual difference between the stego image and original image is imperceptible to human eye. The results show an improvement over PSNR and MSE compared to the existing approach. Further high security is maintained since the secret message/image cannot be extracted without knowing decoding rules and Decoding table.

Reference

  1. H. B. Kekre, SudeepThepade, "Image Retrieval using Non- Involutional Orthogonal Kekre?s Transform", International Journal of Multidisciplinary Research and Advances in Engineering (IJMRAE), Vol. 1, No. 1, November 2009. Pp. 189-203.
  2. M. Sifuzzaman1, M. R. Islam1 and M. Z. Ali, "Application of Wavelet Transform and its Advantages Compared to Fourier Transform", Journal of Physical Sciences, Vol. 13, 2009, pp. 121-134.
  3. H. B. Kekre, TanujaSarode, SudeepThepade, Sonal Shroff, "Instigation of Orthogonal Wavelet Transforms using Walsh, Cosine, Hartley, Kekre Transforms and Their use in Image Compression" International Journal of Computer Science and Information Security, Vol. 9, No. 6, 2011.
  4. H. B. Kekre, ArchanaAthawale, DipaliSadavarti, "Algorithm to Generate Kekre?s Wavelet Transform from Kekre?s Transform", International Journal of Engineering Science and Technology (IJEST), Vol. 2, No. 11, 2010, pp. 756-767.
  5. Gonzalez, R. C. and Woods, R. E. , Digital Image Processing using MATLAB, Pearson Education, India,2006.
  6. Jayaraman, S. , Esakkirajan, S. and Veerakumar, T. Digital Image Processing, Tata McGraw Hill Education Private Limited, India, 2009.
  7. Chan, C. K. and Cheng. L. M. 2003. Hiding data in image by simple LSB substitution. Pattern Recognition, 37: 469 – 474.
  8. A. Nag, S. Biswas, D. Sarkar, P. P. Sarkar,"A novel technique for image steganography based on Block-DCT and Huffman Encoding", International Journal of Computer Science and Information Technology, Volume 2, Number 3, June 2010
  9. H. B. Kekre, Tanuja Sarode, Prachi Natu "Performance Comparison of Walsh Wavelet,Kekre Wavelet and Slant Wavelet Transform in Image Compression, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 10, October 2013
  10. Chen, T. S. , Chang C. C. , and Hwang, M. S. 1998. A virtual image cryptosystem based upon vector quantization. IEEE transactions on Image Processing, 7,10: 1485 – 1488.
  11. Chung, K. L. , Shen, C. H. and Chang, L. C. 2001. A novel SVD- and VQ-based image hiding scheme. Pattern Recognition Letters, 22: 1051 – 1058.
  12. Iwata, M. , Miyake, K. , and Shiozaki, A. 2004. Digital Steganography Utilizing Features of JPEG Images, IEICE Transfusion Fundamentals, E87-A, 4:929 – 936.
  13. Li, Zhi. , Sui, Ai, Fen. , and Yang, Yi, Xian. 2003 "A LSB steganography detection algorithm", IEEE Proceedings on Personal Indoor and Mobile Radio Communications: 2780-2783.
  14. H. B. Kekre, ArchanaAthawale, DipaliSadawarti, "Algorithm to Generate Wavelet Transform from an Orthogonal Transform", International Journal of Image Processing (IJIP), Vol. 4, Issue 4, 2010.
  15. Moerland, T, "Steganography and Steganalysis", Leiden Institute of Advanced Computing Science, www. liacs. nl/home/ tmoerl/privtech. pdf
  16. Ahmed, N. , Natarajan T. , Rao K. R. "Discrete cosine transform". In: IEEE Transactions on Computers, Vol. 23, 1974, 90-93.
  17. R. S. Stankovi? and B. J. Falkowski. "The Haar wavelet transform: its status and achievements". Computers and Electrical Engineering, Vol. 29, No. 1, January 2003, pp. 25-44
  18. H. B. Kekre, TanujaSarode, PrachiNatu : "Color Image Compression using Hybrid Wavelet Transform with Haar as Base Transform",International Journal of Scientific and Research Publications, Volume 4, Issue 6, June 2014 1 ISSN 2250-3153.
  19. DrArchana B. Patankar ,Sana Haji "A Comparative study of Block-DCT, Kekre's Wavelet and Haar Transform using Huffman Encoding in Image Steganography" International Conference on Communication Computing and Virtualization 2015,Vol. 1 ,ISBN 978-0-9884925-7-8,pp 119-124

Keywords

Kekre’s Wavelet Transform, Kekre’s Transform, Steganography, Haar Transform