Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
Information Technology Journal
Year: 2014  |  Volume: 13  |  Issue: 16  |  Page No.: 2534 - 2543

Comparative Analysis of (5/3) and Haar IWT Based Steganography

V. Thanikaiselvan, P. Arulmozhivarman, Siddhanta Chakrabarty, Ashutosh Agarwa1, S. Subashanthini and Rengarajan Amirtharajan    

Abstract: Steganography is the technique of hiding information inside other information. It provides data security. Image steganography can be implemented in both, the spatial and transform domain. In this study, transform domain steganography has been adopted. A cover image is transformed to the frequency domain using Integer Wavelet Transform (IWT) and a secret image is embedded in it using Least Significant Bit (LSB) substitution. The secret data is embedded only in high frequency sub-bands of the frequency domain transform of the cover image. Both adaptive and non-adaptive embedding techniques are employed and the results are compared. Also, random traversing for embedding the secret data is implemented for higher security. Haar and (5/3) IWT based algorithms are used. The Peak Signal to Noise Ratio (PSNR) values and payload capacity are obtained and compared for above algorithms.

Cited References   |    Fulltext    |   Related Articles   |   Back
 
 
   
 
 
 
  Related Articles

 
 
 
 
 
 
 
 
 
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility