Arnold Transform-Lifting Wavelet Transform and Singular Value Decomposition Based Alpha Blending Image Steganography for Secure Communication
Keywords:
Cover image, Payload image, Stego image, PSNR, SteganographyAbstract
Image steganography is an artistic approach used to conceal secret data within a cover image (CI) while maintaining its visual quality. This paper presents a strategy for image steganography by applying Arnold Transformation (AT) to Secret Image (SI), Singular Value Decomposition (SVD), and Lift Wavelet Transformation (LWT) to CI and SI. AT is enforced on the RGB plane of SI, and the LWT is engaged to decompose the image into approximations and detail coefficients, allowing for the identification of areas suitable for embedding without noticeable changes. The SVD is operating on the approximation coefficients, resulting in the U, singular value S, and V matrices. By modifying the singular values, secret data is embedded. The proposed method offers improved robustness and security as modifications are distributed across various frequency components, making it challenging for unauthorized parties to detect the confidential information. Experimental results demonstrate that the combination of LWT and SVD yields effective results, i.e., Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR) with minimal visual distortion. However, the embedded information may still be susceptible to specific steganalysis attacks, necessitating additional security measures for sensitive data.
Downloads
References
Hussah N. AlEisa, Data Confidentiality in Healthcare Monitoring Systems Based on Image Steganography to Improve the Exchange of Patient Information Using the Internet of Things, Journal of Healthcare Engineering, vol. 2022, Article ID 7528583, pp.1-11, 2022.
Aya Jaradat, Eyad Taqieddin, Moad Mowafi, A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization, Security and Communication Networks, vol. 2021, Article ID 6679284, pp.1-11, 2021.
A. K. Singh, J. Singh, and H. V. Singh, Steganography in images using LSB technique, International Journal of Latest Trends in Engineering and Technology (IJLTET), vol. 5, no. 1, pp. 426–430, 2015.
D. Wang, D. Tan, and L. Liu, Particle swarm optimization algorithm: an overview, Soft Computing, vol. 22, no. 2, pp. 387–408, 2018.
Cox, I. J., Miller, M. L., Bloom, J. A., Fridrich, J, Digital Watermarking and Steganography. Morgan Kaufmann, 2007.
Katzenbeisser, S., Petitcolas, F. A. P, Information Hiding Techniques for Steganography and Digital Watermarking. Artech House,2000.
Zhang, X., Wang, S., & Wang, H, A Survey on Image Steganography and Steganalysis. Journal of Information Hiding and Multimedia Signal Processing, 6(6), pp.1427-1442,2015.
Pevny, T., Bas, P., & Fridrich, J, Steganalysis by Subtractive Pixel Adjacency Matrix. IEEE Transactions on Information Forensics and Security, 5(2), pp.215-224,2010.
Fridrich, J, Steganography in Digital Images: Terminology, Tools, and Detectability. Proceedings of the International Workshop on Information Hiding, pp.306-318,1998.
Huang, H. Y., Wang, H. C., Huang, C. R, A High Capacity Image Steganography Scheme Based on Wavelet Transform and Pixel-Value Differencing. Journal of Systems and Software, 84(10), pp.1781-1791,2011.
Provos, N., Honeyman, P, Hide and Seek: An Introduction to Steganography. IEEE Security & Privacy, 1(3), pp.32-44,2003.
Singh, N., & Sharma, P, A Review of Image Steganography Techniques. International Journal of Advanced Research in Computer Science and Software Engineering, 2(5), pp.201-205,2012.
Barni, M., Bartolini, F., Cappellini, V, A DCT-Domain System for Robust Image Watermarking. IEEE Transactions on Image Processing, 13(12), pp.1577-1586,2004.
Li, S., Liu, Z., & Sun, Q, Deep Learning for Steganography and Steganalysis: A Comprehensive Review. Information Fusion, 47, pp.177-194, 2019.
Kapre Bhagyashri, S., Joshi, M.Y. All Frequency Band DWT-SVD Robust Watermarking Technique for Color Images in YUV Color Space. In Proceedings of 2011 IEEE International Conference on Computer Science and Automation Engineering (CSAE), (10-12 June 2011), IEEE Conference Publications, pp. 295 – 299, 2011.
Ghoshal, N., Mandal, J.K. A Steganographic Scheme for Colour Image Authentication (SSCIA). In Proceedings of International Conference on Recent Trends in Information Technology (ICRTIT 2011), (Madras Institute of Technology, Chennai, India June 03 - 05, 2011), IEEE Conference Publications, pp.826 – 831,2011.
Raja KB, Chowdary CR, Venugopal KR, Patnaik LM, A secure image steganography using LSB, DCT and compression techniques on raw images. In: 2005 3rd international conference on intelligent sensing and information processing. IEEE, pp 170–176, 2005.
K.B.Shiva Kumar, K.B. Raja, R.K.Chhotaray, Sabyasachi Pattnaik, “Coherent Steganography using Segmentation and DCT”, IEEE-978-1-4244-5967-4, 2010.
K. S. Babu, K. B. Raja, U. M. Rao, R. K. A, V. K. R, and L. M. Patnaik. Robust and high capacity image steganography using svd. IET UK International Conference on Information and Communication Technology in Electrical Sciences, pp. 718--727, 2007.
K. S. kumar and K. B. Raja. Khasim T. Dual transform technique for robust steganography. IEEE International Conference on Computational Intelligence and Communication Systems, pp. 310-314, 2011.
Saidi, M.; Hermassi, H.; Rhouma, R. A new adaptive image steganography scheme based on DCT and chaotic map. Multimedia. Tools Appl. pp.76, 13493–135, 2017.
Rabie, T.; Kamel, I. High capacity steganography: A global-adaptive region discrete cosine transform approach. Multimedia. Tools Appl. pp.72, 1–21, 2016.
Chang, C.-C.; Chen, T.-S.; Chung, L.-Z. A steganographic method based upon JPEG and quantization table modification. Inform. Sci. pp. 141, 123–138, 2002.
Chan, Y.-K.; Chen, W.-T.; Yu, S.-S.; Ho, Y.-A.; Tsai, C.-S.; Chu, Y.-P. A HDWT-based reversible data hiding method. J. Syst. Softw. 82, pp.411–421, 2009.
Dai, H.Z.; Cheng, J.; Li, Y.F. A Novel Steganography Algorithm Based on Quantization Table Modification and Image Scrambling in DCT Domain. Int. J. Pattern Recognition. Artificial. Intelligence. 35, 2154001, 2021.
Ramu, P., Swami Nathan, R. Imperceptibility—Robustness tradeoff studies for ECG steganography using continuous ant colony optimization. Expert Syst. Appl. 49, pp.123–135, 2016.
Ghebleh, M.; Kanso, A. A robust chaotic algorithm for digital image steganography. Commun. Nonlinear Sci. Numer. Simul. 19, pp.1898–1907, 2014.
Li, Y.; Xiong, C.; Han, X.; Xiang, R.-X.; He, F.-Y.; Du, H.-W. Image steganography using cosine transform with large-scale multimedia application. Multimedia. Tools Appl. 79, pp.13–14, 2018.
Miri, A.; Feaz, K. Adaptive image steganography based on transform domain via genetic algorithm. Optik 145, 158–168, 2017.
Sharma, V.K.; Srivastava, D.K.; Mathur, P. A Daubechies DWT Based Image Steganography Using Smoothing Operation. Int. Arab. J. Inf. Technol. 17, pp.154–161, 2020.
Chaudhary, S.; Hiranwal, S.; Gupta, C.P. Spectral Graph Wavelet Based Image Steganography Using SVD and Arnold Transform. Traitement Du Signal, 38, pp.1113–1121, 2021.
Arnold, V. I., Instability of Dynamical Systems with Several Degrees of Freedom. Soviet Mathematics Doklady, 9(4), 949-952, 1968.
Li, S., & Halang, W. A., Arnold's Cat Map-Based Image Encryption Scheme Using Chaotic Standard Map. Physics Letters A, 336(6), 445-450. 2005.
Xu, Z., Xue, Q., & Li, Q., Image Encryption Algorithm Based on Arnold Transform and Bit-Level Permutation. Optics Communications, 335, 133-141., 2015
Nascimento, A. L., & Oliveira, M. M., A Survey on Chaos-Based Image Encryption Techniques. Journal of Imaging, 5(2), 21. 2019.
Ding, C., Li, S., & Xiao, D., Efficient Arnold Transform Using Matrix Operations. Signal Processing, 92(10), 2332-2339. 2012.
K. B. Raja, C. R. Chowdary, K. R. Venugopal and L. M. Patnaik, “A secure image steganography using LSB, DCT and compression techniques on raw images,” In Proceedings of the 3rd International Conference on Intelligent Sensing and Information Processing IEEE, Bangalore, India, pp. 171–176,2005.
K. B. Raja, S. Sindhu, T. D. Mahalakshmi, S. Akshatha, B. K. Nithin, M. Sarvajith, K. R. Venugopal and L. M. Patnaik, “Robust image adaptive steganography using integer wavelets,” in Proc. Int. Conf. Communication Systems, pp. 614–621,2008.
Ravi J, Saleem S. Tevaramani and K. B. Raja, "Face recognition using DT-CWT and LBP features," 2012 International Conference on Computing, Communication and Applications, Dindigul, India, pp. 1-6,2012.
H. S. M. Reddy, N. Sathisha, A. Kumari and K. B. Raja, "Secure steganography using hybrid domain technique," 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT 12), pp. 1-11, 2012.
Rafael C. Gonzalez, Richard E.Woods and Steven L. Eddins, “Digital Image Processing Using MATLAB”, Gatesmark Publishing, 200
https://sipi.usc.edu/database/database.php?volume=misc
Y. Li, B. K. Via, and Y. Li, “Lifting wavelet transform for Vis-NIR spectral data optimization to predict wood density,” Spectrochim. Acta Part A Mol. Biomol. Spectrosc., vol. 240, pp. 118566, Oct. 2020.
N. S. Lingamallu and V. Veeramani, “Secure and covert communication using steganography by Wavelet Transform,” Optik (Stuttg)., vol. 242, pp. 167-172, Sep. 2021.
S. Chaudhary, S. Hiranwal, and C. P. Gupta, “Spectral graph wavelet based image steganography using SVD and arnold transform,” Trait. du Signal, vol. 38, no. 4, pp. 1113–1121, Aug. 2021.
X. Z. Xie, C. C. Chang, and C. C. Lin, “A Hybrid Reversible Data Hiding for Multiple Images with High Embedding Capacity,” IEEE Access, vol. 8, pp. 37–52, 2020.
H. A. Abdallah, R. Alkanhel, and A. A. Ateya, “Novel Hybrid Fusion-Based Technique for Securing Medical Images,” Electronics, vol. 11, no. 20, p. 3421, Oct. 2022.
Mehdi Hussain, Ainuddin Wahid Abdul Wahab, Yamani Idna Bin Idris, Anthony T.S. Ho, Ki- Hyun Jung, Image steganography in spatial domain: A survey, Signal Processing: Image Communication,Volume 65, pp. 46-66,ISSN 0923-5965,2018.
KhaldiAmine, Steganographic Techniques Classification According to Image Format, international annals of science, Volume 8, Issue 1, pp. 143-149, 2020.
Ilyas Benkhaddra, Abhishek Kumar, Zine El Abidine Bensalem, Lei Hang, Secure transmission of secret data using optimization based embedding techniques in Blockchain, Expert Systems with Applications, Volume 211,pp.118469,ISSN 0957-4174,2023.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.