CFP last date
15 April 2024
Reseach Article

Performance Comparison of Block-DCT, Kekre�s Wavelet and Haar Transform using LZW and Huffman Encoding in Image Steganography

Published on September 2015 by Archana B. Patankar, Sana Naik
International Conference and Workshop on Communication, Computing and Virtualization
Foundation of Computer Science USA
ICWCCV2015 - Number 3
September 2015
Authors: Archana B. Patankar, Sana Naik
880a0d00-ff6a-482a-acc2-d85c8e131130

Archana B. Patankar, Sana Naik . Performance Comparison of Block-DCT, Kekre�s Wavelet and Haar Transform using LZW and Huffman Encoding in Image Steganography. International Conference and Workshop on Communication, Computing and Virtualization. ICWCCV2015, 3 (September 2015), 0-0.

@article{
author = { Archana B. Patankar, Sana Naik },
title = { Performance Comparison of Block-DCT, Kekre�s Wavelet and Haar Transform using LZW and Huffman Encoding in Image Steganography },
journal = { International Conference and Workshop on Communication, Computing and Virtualization },
issue_date = { September 2015 },
volume = { ICWCCV2015 },
number = { 3 },
month = { September },
year = { 2015 },
issn = 2249-0868,
pages = { 0-0 },
numpages = 1,
url = { /proceedings/icwccv2015/number3/800-1571/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference and Workshop on Communication, Computing and Virtualization
%A Archana B. Patankar
%A Sana Naik
%T Performance Comparison of Block-DCT, Kekre�s Wavelet and Haar Transform using LZW and Huffman Encoding in Image Steganography
%J International Conference and Workshop on Communication, Computing and Virtualization
%@ 2249-0868
%V ICWCCV2015
%N 3
%P 0-0
%D 2015
%I International Journal of Applied Information Systems
Abstract

This paper proposes the use of various transforms for image steganography. It focuses on use of wavelet transform such as Kekre's Wavelet and Haar transform to compress cover image and use of compression mechanisms such as LZW for secret image. Wavelet transform is generated from their respective orthogonal transform. Image Steganography is the art of hiding information into a co4ver image. A novel technique for image steganography using transforms such as Kekre's wavelet transform and Haq3ar transform along with LZW is used to convert original image (cover image) from spatial domain to frequency domain. In the proposed methodology the secret message is encoded using LZW technique. Then encrypted image/message is embedded in the transformed carrier image. The experimental results show the comparative results between Huffman coding and LZW compression using Kekre's Wavelet t4ransform, Haar transform and DCT. Moreover PSNR and RMSE between the cover image and stego image shows the better results in comparison with other existing steganography approaches. The perceptual difference between the stego image and original image is imperceptible to human eye. The results show an improvement over PSNR and MSE compared to the existing approach. Further high security is maintained since the secret message/image cannot be extracted without knowing decoding rules and Decoding table.

References
  1. H. B. Kekre, SudeepThepade, "Image Retrieval using Non- Involutional Orthogonal Kekre?s Transform", International Journal of Multidisciplinary Research and Advances in Engineering (IJMRAE), Vol. 1, No. 1, November 2009. Pp. 189-203.
  2. M. Sifuzzaman1, M. R. Islam1 and M. Z. Ali, "Application of Wavelet Transform and its Advantages Compared to Fourier Transform", Journal of Physical Sciences, Vol. 13, 2009, pp. 121-134.
  3. H. B. Kekre, TanujaSarode, SudeepThepade, Sonal Shroff, "Instigation of Orthogonal Wavelet Transforms using Walsh, Cosine, Hartley, Kekre Transforms and Their use in Image Compression" International Journal of Computer Science and Information Security, Vol. 9, No. 6, 2011.
  4. H. B. Kekre, ArchanaAthawale, DipaliSadavarti, "Algorithm to Generate Kekre?s Wavelet Transform from Kekre?s Transform", International Journal of Engineering Science and Technology (IJEST), Vol. 2, No. 11, 2010, pp. 756-767.
  5. Gonzalez, R. C. and Woods, R. E. , Digital Image Processing using MATLAB, Pearson Education, India,2006.
  6. Jayaraman, S. , Esakkirajan, S. and Veerakumar, T. Digital Image Processing, Tata McGraw Hill Education Private Limited, India, 2009.
  7. Chan, C. K. and Cheng. L. M. 2003. Hiding data in image by simple LSB substitution. Pattern Recognition, 37: 469 – 474.
  8. A. Nag, S. Biswas, D. Sarkar, P. P. Sarkar,"A novel technique for image steganography based on Block-DCT and Huffman Encoding", International Journal of Computer Science and Information Technology, Volume 2, Number 3, June 2010
  9. H. B. Kekre, Tanuja Sarode, Prachi Natu "Performance Comparison of Walsh Wavelet,Kekre Wavelet and Slant Wavelet Transform in Image Compression, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 10, October 2013
  10. Chen, T. S. , Chang C. C. , and Hwang, M. S. 1998. A virtual image cryptosystem based upon vector quantization. IEEE transactions on Image Processing, 7,10: 1485 – 1488.
  11. Chung, K. L. , Shen, C. H. and Chang, L. C. 2001. A novel SVD- and VQ-based image hiding scheme. Pattern Recognition Letters, 22: 1051 – 1058.
  12. Iwata, M. , Miyake, K. , and Shiozaki, A. 2004. Digital Steganography Utilizing Features of JPEG Images, IEICE Transfusion Fundamentals, E87-A, 4:929 – 936.
  13. Li, Zhi. , Sui, Ai, Fen. , and Yang, Yi, Xian. 2003 "A LSB steganography detection algorithm", IEEE Proceedings on Personal Indoor and Mobile Radio Communications: 2780-2783.
  14. H. B. Kekre, ArchanaAthawale, DipaliSadawarti, "Algorithm to Generate Wavelet Transform from an Orthogonal Transform", International Journal of Image Processing (IJIP), Vol. 4, Issue 4, 2010.
  15. Moerland, T, "Steganography and Steganalysis", Leiden Institute of Advanced Computing Science, www. liacs. nl/home/ tmoerl/privtech. pdf
  16. Ahmed, N. , Natarajan T. , Rao K. R. "Discrete cosine transform". In: IEEE Transactions on Computers, Vol. 23, 1974, 90-93.
  17. R. S. Stankovi? and B. J. Falkowski. "The Haar wavelet transform: its status and achievements". Computers and Electrical Engineering, Vol. 29, No. 1, January 2003, pp. 25-44
  18. H. B. Kekre, TanujaSarode, PrachiNatu : "Color Image Compression using Hybrid Wavelet Transform with Haar as Base Transform",International Journal of Scientific and Research Publications, Volume 4, Issue 6, June 2014 1 ISSN 2250-3153.
  19. DrArchana B. Patankar ,Sana Haji "A Comparative study of Block-DCT, Kekre's Wavelet and Haar Transform using Huffman Encoding in Image Steganography" International Conference on Communication Computing and Virtualization 2015,Vol. 1 ,ISBN 978-0-9884925-7-8,pp 119-124
Index Terms

Computer Science
Information Sciences

Keywords

Kekre’s Wavelet Transform Kekre’s Transform Steganography Haar Transform