HOME JOURNALS CONTACT

Information Technology Journal

Year: 2014 | Volume: 13 | Issue: 16 | Page No.: 2534-2543
DOI: 10.3923/itj.2014.2534.2543
Comparative Analysis of (5/3) and Haar IWT Based Steganography
V. Thanikaiselvan, P. Arulmozhivarman, Siddhanta Chakrabarty, Ashutosh Agarwa1, S. Subashanthini and Rengarajan Amirtharajan

Abstract: Steganography is the technique of hiding information inside other information. It provides data security. Image steganography can be implemented in both, the spatial and transform domain. In this study, transform domain steganography has been adopted. A cover image is transformed to the frequency domain using Integer Wavelet Transform (IWT) and a secret image is embedded in it using Least Significant Bit (LSB) substitution. The secret data is embedded only in high frequency sub-bands of the frequency domain transform of the cover image. Both adaptive and non-adaptive embedding techniques are employed and the results are compared. Also, random traversing for embedding the secret data is implemented for higher security. Haar and (5/3) IWT based algorithms are used. The Peak Signal to Noise Ratio (PSNR) values and payload capacity are obtained and compared for above algorithms.

Fulltext PDF Fulltext HTML

How to cite this article
V. Thanikaiselvan, P. Arulmozhivarman, Siddhanta Chakrabarty, Ashutosh Agarwa1, S. Subashanthini and Rengarajan Amirtharajan, 2014. Comparative Analysis of (5/3) and Haar IWT Based Steganography. Information Technology Journal, 13: 2534-2543.

Related Articles:
© Science Alert. All Rights Reserved