Arnold Transform-Lifting Wavelet Transform and Singular Value Decomposition Based Alpha Blending Image Steganography for Secure Communication

Authors

  • Saleem S. Tevaramani Research Scholar, Dept. of ECE, Global Academy of Technology, Bangalore, Visvesvaraya Technological University Belagavi 590018.
  • Ravi J. Professor, Dept. of ECE, Global Academy of Technology, Bangalore, Visvesvaraya Technological University Belagavi 590018.

Keywords:

Cover image, Payload image, Stego image, PSNR, Steganography

Abstract

Image steganography is an artistic approach used to conceal secret data within a cover image (CI) while maintaining its visual quality. This paper presents a strategy for image steganography by applying Arnold Transformation (AT) to Secret Image (SI), Singular Value Decomposition (SVD), and Lift Wavelet Transformation (LWT) to CI and SI. AT is enforced on the RGB plane of SI, and the LWT is engaged to decompose the image into approximations and detail coefficients, allowing for the identification of areas suitable for embedding without noticeable changes. The SVD is operating on the approximation coefficients, resulting in the U, singular value S, and V matrices. By modifying the singular values, secret data is embedded. The proposed method offers improved robustness and security as modifications are distributed across various frequency components, making it challenging for unauthorized parties to detect the confidential information. Experimental results demonstrate that the combination of LWT and SVD yields effective results, i.e., Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR) with minimal visual distortion. However, the embedded information may still be susceptible to specific steganalysis attacks, necessitating additional security measures for sensitive data.

Downloads

Download data is not yet available.

References

Hussah N. AlEisa, Data Confidentiality in Healthcare Monitoring Systems Based on Image Steganography to Improve the Exchange of Patient Information Using the Internet of Things, Journal of Healthcare Engineering, vol. 2022, Article ID 7528583, pp.1-11, 2022.

Aya Jaradat, Eyad Taqieddin, Moad Mowafi, A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization, Security and Communication Networks, vol. 2021, Article ID 6679284, pp.1-11, 2021.

A. K. Singh, J. Singh, and H. V. Singh, Steganography in images using LSB technique, International Journal of Latest Trends in Engineering and Technology (IJLTET), vol. 5, no. 1, pp. 426–430, 2015.

D. Wang, D. Tan, and L. Liu, Particle swarm optimization algorithm: an overview, Soft Computing, vol. 22, no. 2, pp. 387–408, 2018.

Cox, I. J., Miller, M. L., Bloom, J. A., Fridrich, J, Digital Watermarking and Steganography. Morgan Kaufmann, 2007.

Katzenbeisser, S., Petitcolas, F. A. P, Information Hiding Techniques for Steganography and Digital Watermarking. Artech House,2000.

Zhang, X., Wang, S., & Wang, H, A Survey on Image Steganography and Steganalysis. Journal of Information Hiding and Multimedia Signal Processing, 6(6), pp.1427-1442,2015.

Pevny, T., Bas, P., & Fridrich, J, Steganalysis by Subtractive Pixel Adjacency Matrix. IEEE Transactions on Information Forensics and Security, 5(2), pp.215-224,2010.

Fridrich, J, Steganography in Digital Images: Terminology, Tools, and Detectability. Proceedings of the International Workshop on Information Hiding, pp.306-318,1998.

Huang, H. Y., Wang, H. C., Huang, C. R, A High Capacity Image Steganography Scheme Based on Wavelet Transform and Pixel-Value Differencing. Journal of Systems and Software, 84(10), pp.1781-1791,2011.

Provos, N., Honeyman, P, Hide and Seek: An Introduction to Steganography. IEEE Security & Privacy, 1(3), pp.32-44,2003.

Singh, N., & Sharma, P, A Review of Image Steganography Techniques. International Journal of Advanced Research in Computer Science and Software Engineering, 2(5), pp.201-205,2012.

Barni, M., Bartolini, F., Cappellini, V, A DCT-Domain System for Robust Image Watermarking. IEEE Transactions on Image Processing, 13(12), pp.1577-1586,2004.

Li, S., Liu, Z., & Sun, Q, Deep Learning for Steganography and Steganalysis: A Comprehensive Review. Information Fusion, 47, pp.177-194, 2019.

Kapre Bhagyashri, S., Joshi, M.Y. All Frequency Band DWT-SVD Robust Watermarking Technique for Color Images in YUV Color Space. In Proceedings of 2011 IEEE International Conference on Computer Science and Automation Engineering (CSAE), (10-12 June 2011), IEEE Conference Publications, pp. 295 – 299, 2011.

Ghoshal, N., Mandal, J.K. A Steganographic Scheme for Colour Image Authentication (SSCIA). In Proceedings of International Conference on Recent Trends in Information Technology (ICRTIT 2011), (Madras Institute of Technology, Chennai, India June 03 - 05, 2011), IEEE Conference Publications, pp.826 – 831,2011.

Raja KB, Chowdary CR, Venugopal KR, Patnaik LM, A secure image steganography using LSB, DCT and compression techniques on raw images. In: 2005 3rd international conference on intelligent sensing and information processing. IEEE, pp 170–176, 2005.

K.B.Shiva Kumar, K.B. Raja, R.K.Chhotaray, Sabyasachi Pattnaik, “Coherent Steganography using Segmentation and DCT”, IEEE-978-1-4244-5967-4, 2010.

K. S. Babu, K. B. Raja, U. M. Rao, R. K. A, V. K. R, and L. M. Patnaik. Robust and high capacity image steganography using svd. IET UK International Conference on Information and Communication Technology in Electrical Sciences, pp. 718--727, 2007.

K. S. kumar and K. B. Raja. Khasim T. Dual transform technique for robust steganography. IEEE International Conference on Computational Intelligence and Communication Systems, pp. 310-314, 2011.

Saidi, M.; Hermassi, H.; Rhouma, R. A new adaptive image steganography scheme based on DCT and chaotic map. Multimedia. Tools Appl. pp.76, 13493–135, 2017.

Rabie, T.; Kamel, I. High capacity steganography: A global-adaptive region discrete cosine transform approach. Multimedia. Tools Appl. pp.72, 1–21, 2016.

Chang, C.-C.; Chen, T.-S.; Chung, L.-Z. A steganographic method based upon JPEG and quantization table modification. Inform. Sci. pp. 141, 123–138, 2002.

Chan, Y.-K.; Chen, W.-T.; Yu, S.-S.; Ho, Y.-A.; Tsai, C.-S.; Chu, Y.-P. A HDWT-based reversible data hiding method. J. Syst. Softw. 82, pp.411–421, 2009.

Dai, H.Z.; Cheng, J.; Li, Y.F. A Novel Steganography Algorithm Based on Quantization Table Modification and Image Scrambling in DCT Domain. Int. J. Pattern Recognition. Artificial. Intelligence. 35, 2154001, 2021.

Ramu, P., Swami Nathan, R. Imperceptibility—Robustness tradeoff studies for ECG steganography using continuous ant colony optimization. Expert Syst. Appl. 49, pp.123–135, 2016.

Ghebleh, M.; Kanso, A. A robust chaotic algorithm for digital image steganography. Commun. Nonlinear Sci. Numer. Simul. 19, pp.1898–1907, 2014.

Li, Y.; Xiong, C.; Han, X.; Xiang, R.-X.; He, F.-Y.; Du, H.-W. Image steganography using cosine transform with large-scale multimedia application. Multimedia. Tools Appl. 79, pp.13–14, 2018.

Miri, A.; Feaz, K. Adaptive image steganography based on transform domain via genetic algorithm. Optik 145, 158–168, 2017.

Sharma, V.K.; Srivastava, D.K.; Mathur, P. A Daubechies DWT Based Image Steganography Using Smoothing Operation. Int. Arab. J. Inf. Technol. 17, pp.154–161, 2020.

Chaudhary, S.; Hiranwal, S.; Gupta, C.P. Spectral Graph Wavelet Based Image Steganography Using SVD and Arnold Transform. Traitement Du Signal, 38, pp.1113–1121, 2021.

Arnold, V. I., Instability of Dynamical Systems with Several Degrees of Freedom. Soviet Mathematics Doklady, 9(4), 949-952, 1968.

Li, S., & Halang, W. A., Arnold's Cat Map-Based Image Encryption Scheme Using Chaotic Standard Map. Physics Letters A, 336(6), 445-450. 2005.

Xu, Z., Xue, Q., & Li, Q., Image Encryption Algorithm Based on Arnold Transform and Bit-Level Permutation. Optics Communications, 335, 133-141., 2015

Nascimento, A. L., & Oliveira, M. M., A Survey on Chaos-Based Image Encryption Techniques. Journal of Imaging, 5(2), 21. 2019.

Ding, C., Li, S., & Xiao, D., Efficient Arnold Transform Using Matrix Operations. Signal Processing, 92(10), 2332-2339. 2012.

K. B. Raja, C. R. Chowdary, K. R. Venugopal and L. M. Patnaik, “A secure image steganography using LSB, DCT and compression techniques on raw images,” In Proceedings of the 3rd International Conference on Intelligent Sensing and Information Processing IEEE, Bangalore, India, pp. 171–176,2005.

K. B. Raja, S. Sindhu, T. D. Mahalakshmi, S. Akshatha, B. K. Nithin, M. Sarvajith, K. R. Venugopal and L. M. Patnaik, “Robust image adaptive steganography using integer wavelets,” in Proc. Int. Conf. Communication Systems, pp. 614–621,2008.

Ravi J, Saleem S. Tevaramani and K. B. Raja, "Face recognition using DT-CWT and LBP features," 2012 International Conference on Computing, Communication and Applications, Dindigul, India, pp. 1-6,2012.

H. S. M. Reddy, N. Sathisha, A. Kumari and K. B. Raja, "Secure steganography using hybrid domain technique," 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT 12), pp. 1-11, 2012.

Rafael C. Gonzalez, Richard E.Woods and Steven L. Eddins, “Digital Image Processing Using MATLAB”, Gatesmark Publishing, 200

https://sipi.usc.edu/database/database.php?volume=misc

Y. Li, B. K. Via, and Y. Li, “Lifting wavelet transform for Vis-NIR spectral data optimization to predict wood density,” Spectrochim. Acta Part A Mol. Biomol. Spectrosc., vol. 240, pp. 118566, Oct. 2020.

N. S. Lingamallu and V. Veeramani, “Secure and covert communication using steganography by Wavelet Transform,” Optik (Stuttg)., vol. 242, pp. 167-172, Sep. 2021.

S. Chaudhary, S. Hiranwal, and C. P. Gupta, “Spectral graph wavelet based image steganography using SVD and arnold transform,” Trait. du Signal, vol. 38, no. 4, pp. 1113–1121, Aug. 2021.

X. Z. Xie, C. C. Chang, and C. C. Lin, “A Hybrid Reversible Data Hiding for Multiple Images with High Embedding Capacity,” IEEE Access, vol. 8, pp. 37–52, 2020.

H. A. Abdallah, R. Alkanhel, and A. A. Ateya, “Novel Hybrid Fusion-Based Technique for Securing Medical Images,” Electronics, vol. 11, no. 20, p. 3421, Oct. 2022.

Mehdi Hussain, Ainuddin Wahid Abdul Wahab, Yamani Idna Bin Idris, Anthony T.S. Ho, Ki- Hyun Jung, Image steganography in spatial domain: A survey, Signal Processing: Image Communication,Volume 65, pp. 46-66,ISSN 0923-5965,2018.

KhaldiAmine, Steganographic Techniques Classification According to Image Format, international annals of science, Volume 8, Issue 1, pp. 143-149, 2020.

Ilyas Benkhaddra, Abhishek Kumar, Zine El Abidine Bensalem, Lei Hang, Secure transmission of secret data using optimization based embedding techniques in Blockchain, Expert Systems with Applications, Volume 211,pp.118469,ISSN 0957-4174,2023.

Downloads

Published

25.12.2023

How to Cite

Tevaramani , S. S. ., & J. , R. . (2023). Arnold Transform-Lifting Wavelet Transform and Singular Value Decomposition Based Alpha Blending Image Steganography for Secure Communication. International Journal of Intelligent Systems and Applications in Engineering, 12(1), 536–542. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3951

Issue

Section

Research Article