Journal of Systems Engineering and Electronics ›› 2018, Vol. 29 ›› Issue (3): 639-649.doi: 10.21629/JSEE.2018.03.21
• Software Algorithm and Simulation • Previous Articles Next Articles
Emad ELSHAZLY1(), Safey ABDELWAHAB1,*(), Refaat ABOUZAID1(), Osama ZAHRAN2(), Sayed ELARABY1(), Mohamed ELKORDY2()
Received:
2016-10-26
Online:
2018-06-28
Published:
2018-07-02
Contact:
Safey ABDELWAHAB
E-mail:eaeshazly@yahoo.com;safeyash@hotmail.com;eng_refaat@yahoo.com;osama_zahran@menofia.edu.eg;selaraby@netscape.net;dr_elkordy@hotmail.com
About author:
ELSHAZLY Emad received his B.S. (Honors) degree in electronics and communications engineering from Faculty of Electronic Engineering, Menoufia University in 2004. He received his M.S. degree in electronics and communications engineering from Faculty of Electronic Engineering, Menoufia University in 2012. His current areas of interest are digital signal processing, digital image processing, data hiding, developing ICT-based materials, design of FPGA based instruments and radiation measurement instruments. E-mail: Emad ELSHAZLY, Safey ABDELWAHAB, Refaat ABOUZAID, Osama ZAHRAN, Sayed ELARABY, Mohamed ELKORDY. A secure image steganography algorithm based on least significant bit and integer wavelet transform[J]. Journal of Systems Engineering and Electronics, 2018, 29(3): 639-649.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
Table 1
MSE, PSNR and NCC values for previous and proposed embedding algorithms applied on grayscale images [15, 25]"
Grayscale image(512×512) | LSB | DWT-LSB | Proposed | ||||||||
MSE | PSNR | NCC | MSE | PSNR | NCC | MSE | PSNR | NCC | |||
Lena | 0.27 | 53.45 | 0.99 | 1.09 | 47.42 | 1.00 | 0.27 | 53.46 | 0.99 | ||
Barbara | 0.27 | 53.64 | 1.00 | 1.08 | 47.61 | 1.00 | 0.27 | 53.65 | 1.00 | ||
Sailboat | 0.28 | 53.66 | 0.99 | 1.09 | 47.77 | 1.00 | 0.27 | 53.78 | 0.99 | ||
Airplane | 0.27 | 52.91 | 0.99 | 1.09 | 46.86 | 1.00 | 0.27 | 52.91 | 0.99 | ||
House | 0.27 | 53.07 | 0.99 | 1.10 | 47.01 | 1.00 | 0.27 | 53.05 | 0.99 |
Table 2
MSE, PSNR and NCC values for different cases of the proposed embedding algorithms applied on grayscale cover images"
Embeddingtechnique | Evaluationparemeter | Grayscale image (512×512) | ||||
Lena | Barbara | Sailboat | Airplane | House | ||
IWT-LSB-1 | MSE | 0.270 5 | 0.269 7 | 0.272 3 | 0.270 6 | 0.273 8 |
PSNR | 53.462 3 | 53.650 7 | 53.780 4 | 52.912 0 | 53.046 7 | |
NCC | 0.999 9 | 1.000 0 | 0.999 9 | 0.999 9 | 0.999 9 | |
IWT-LSB-2 | MSE | 1.084 8 | 1.081 4 | 1.081 9 | 1.086 9 | 1.106 0 |
PSNR | 47.429 7 | 47.618 8 | 47.760 2 | 46.872 6 | 46.984 0 | |
NCC | 0.999 6 | 0.999 8 | 0.999 5 | 0.999 5 | 0.999 6 | |
IWT-LSB-3 | MSE | 4.331 8 | 4.304 0 | 4.376 0 | 4.247 1 | 4.522 2 |
PSNR | 41.416 7 | 41.620 0 | 41.720 0 | 40.953 7 | 40.867 8 | |
NCC | 0.998 3 | 0.999 2 | 0.998 2 | 0.998 1 | 0.998 8 | |
IWT-LSB-4 | MSE | 17.334 0 | 16.910 7 | 17.604 1 | 17.915 0 | 17.663 1 |
PSNR | 35.394 3 | 35.677 2 | 35.674 7 | 34.702 4 | 34.950 7 | |
NCC | 0.993 1 | 0.996 9 | 0.992 8 | 0.992 2 | 0.993 2 |
Table 3
MSE, PSNR and NCC values for previous and proposed algorithms applied on color cover images [15, 22, 25]"
Grayscale image(512×512) | LSB | DWT-LSB | Proposed | ||||||||
MSE | PSNR | NCC | MSE | PSNR | NCC | MSE | PSNR | NCC | |||
Lena | 0.18 | 55.49 | 1.00 | 0.18 | 55.56 | 1.00 | 0.18 | 55.52 | 1.00 | ||
Baboon | 0.18 | 55.54 | 1.00 | 0.18 | 55.55 | 1.00 | 0.18 | 55.56 | 1.00 | ||
Pepper | 0.17 | 55.18 | 1.00 | 0.18 | 55.18 | 1.00 | 0.17 | 55.20 | 55.20 | ||
Airplane | 0.18 | 54.84 | 1.00 | 0.18 | 54.80 | 1.00 | 0.18 | 54.80 | 1.00 | ||
House | 0.18 | 55.56 | 1.00 | 0.18 | 55.60 | 1.00 | 0.18 | 55.55 | 1.00 | ||
Tiffany | 0.19 | 55.41 | 1.00 | 0.18 | 55.52 | 1.00 | 0.32 | 53.06 | 1.00 |
Table 4
MSE, PSNR and NCC values for different cases of the proposed embedding algorithms applied on grayscale cover images"
Embeddingtechnique | Evaluationparemeter | Grayscale image (512×512) | |||||
Lena | Baboon | Pepper | Airplane | House | Tiffany | ||
IWT-LSB-1 | MSE | 0.182 5 | 0.180 7 | 0.169 5 | 0.181 4 | 0.181 2 | 0.321 4 |
PSNR | 55.517 7 | 55.562 2 | 55.203 1 | 54.798 4 | 55.550 0 | 53.060 1 | |
NCC | 0.999 9 | 0.999 9 | 0.999 9 | 0.999 9 | 0.999 9 | 0.999 7 | |
IWT-LSB-2 | MSE | 0.720 3 | 0.723 5 | 0.679 1 | 0.722 4 | 0.732 9 | 0.885 4 |
PSNR | 49.555 9 | 49.536 6 | 49.175 7 | 48.796 8 | 49.480 6 | 48.659 3 | |
NCC | 0.999 6 | 0.099 98 | 0.999 8 | 0.999 6 | 0.999 8 | 0.999 1 | |
IWT-LSB-3 | MSE | 2.884 6 | 2.903 8 | 2.698 0 | 2.848 8 | 2.865 0 | 3.123 8 |
PSNR | 43.529 9 | 43.501 1 | 43.184 6 | 42.837 6 | 43.559 6 | 43.184 0 | |
NCC | 0.998 4 | 0.999 1 | 0.999 1 | 0.998 2 | 0.999 1 | 0.996 6 | |
IWT-LSB-4 | MSE | 11.816 5 | 11.521 4 | 10.549 2 | 11.716 5 | 10.826 8 | 12.127 0 |
PSNR | 37.405 9 | 37.515 8 | 37.262 8 | 36.696 4 | 37.785 8 | 37.293 3 | |
NCC | 0.993 6 | 0.996 3 | 0.996 3 | 0.993 0 | 0.996 4 | 0.996 9 |
1 | THANGADURAI K, DEVI G S. An analysis of LSB based image steganography techniques. Proc. of International Conference on Computer Communication and Informatics, 2014: 1-4. |
2 |
BRANDÃO A S, JORGE D C. Artificial neural networks applied to image steganography. IEEE Latin America Transactions, 2016, 14 (3): 1361- 1366.
doi: 10.1109/TLA.2016.7459621 |
3 | NTALIANIS K, TSAPATSOULIS N. Remote authentication via biometrics: a robust video-object steganographic mechanism over wireless networks. IEEE Trans. on Emerging Topics in Computing, 2016, 4(1): 156-174. |
4 | CHALLITA K, FARHAT H. Combining steganography and cryptography: new directions. International Journal on New Computer Architectures and Their Applications, 2011, 1 (1): 199- 208. |
5 |
CHEDDAD A, CONDELL J, CURRAN K, et al. Digital image steganography: survey and analysis of current methods. Signal Processing, 2010, 90, 727- 752.
doi: 10.1016/j.sigpro.2009.08.010 |
6 | PATEL P, PATEL Y. Secure and authentic DCT image steganography through DWT -SVD based digital watermarking with RSA encryption. Proc. of the 5th International Conference on Communication Systems and Network Technologies, 2015: 736-739. |
7 | LASKAR T A, HEMACHANDRAN K. Digital image watermarking techniques and its applications. International Journal of Engineering Research & Technology, 2013, 2 (3): 1- 8. |
8 | HUSSAIN M, HUSSAIN M. A survey of image steganography techniques. International Journal of Advanced Science and Technology, 2013, 54, 113- 123. |
9 | RAI P, GURUNG S, GHOSE M K. Analysis of image steganography techniques: a survey. International Journal of Computer Applications, 2015, 114 (1): 11- 17. |
10 |
AHANI S, GHAEMMAGHAMI S. Colour image steganography method based on sparse representation. IET Image Processing, 2015, 9 (6): 496- 505.
doi: 10.1049/iet-ipr.2014.0351 |
11 | KAUR S, BANSAL S, BANSAL R K. Steganography and classification of image steganography techniques. Proc. of International Conference on Computing for Sustainable Global Development, 2014: 870-875. |
12 | THANIKAISELVAN V, ARULMOZHIVARMAN P. High security image steganography using iwt and graph theory. Proc. of International Conference on Signal and Image Processing Applications, 2013: 337-342. |
13 | HEMALATHA S, RENUKA A, ACHARYA U D, et al. A secure image steganography technique using integer wavelet transform. Proc. of World Congress on Information and Communication Technologies, 2012: 755-758. |
14 | EL SAFY R O, ZAYED H H, EL DESSOUKI A. An adaptive steganographic technique based on integer wavelet transform. Proc. of International Conference on Networking and Media Convergence, 2009: 111-117. |
15 | PRABAKARAN G, BHAVANI R. A modified secure digital image steganography based on discrete wavelet transform. Proc. of International Conference on Computing, Electronics and Electrical Technologies, 2012: 1096-1100. |
16 | ADI P W, RAHMANTI F Z, ABU N A. High quality image steganography on integer haar wavelet transform using modulus function. Proc. of International Conference on Science in Information Technology, 2015: 79-84. |
17 |
HEMALATHA S, ACHARYA U D, RENUKA A. Wavelet transform based steganography technique to hide audio signals in image. Procedia Computer Science, 2015, 47, 272- 281.
doi: 10.1016/j.procs.2015.03.207 |
18 | CHANDRAN S, BHATTACHARYYA K. Performance analysis of LSB, DCT, and DWT for digital watermarking application using steganography. Proc. of International Conference on Electrical, Electronics, Signals, Communication and Optimization, 2015: 1-5. |
19 | CHAWLA G, KAMALDEEP, YADAV R, et al. Analysis of various image steganography techniques on the basis of normalized cross-correlation (NCC). International Journal of Advanced and Innovative Research, 2012, 2 (2): 243- 248. |
20 |
Baby D, Thomas J, Augustine G, et al. A novel DWT based image securing method using steganography. Procedia Computer Science, 2015, 46, 612- 618.
doi: 10.1016/j.procs.2015.02.105 |
21 | RAFTARI N, MOGHADAM A M E. Digital image steganography based on integer wavelet transform and assignment algorithm. Proc. of the 6th Asia Modelling Symposium, 2012: 87-92. |
22 | JUNEJA M, SANDHU P S. An improved LSB based steganography technique for RGB color images. Proc. of the 2nd International Conference on Latest Computational Technologies, 2013: 10-14. |
23 |
MANDAL J K, DAS D. Colour image steganography based on pixel value differencing in spatial domain. International Journal of Information Sciences and Techniques, 2012, 2 (4): 83- 93.
doi: 10.5121/ijist.2012.2408 |
24 | GULVE A K, JOSHI M S. An image steganography method hiding secret data into coefficients of integer wavelet transform using pixel value differencing approach. Mathematical Problems in Engineering, 2015, 1- 11. |
25 |
ELSHAZLY E A, ABDELWAHAB S A S, FIKRY R M, et al. FPGA implementation of robust image steganography technique based on least significant bit (LSB) in spatial domain. International Journal of Computer Applications, 2016, 145 (12): 43- 52.
doi: 10.5120/ijca2016910796 |
[1] | Chaoxuan QIN, Xiaohui GU. A single image dehazing method based on decomposition strategy [J]. Journal of Systems Engineering and Electronics, 2022, 33(2): 279-293. |
[2] | Baoping WANG, Jianjun MA, Zhaoxuan HAN, Yan ZHANG, Yang FANG, Yimeng GE. Adaptive image enhancement algorithm based on fuzzy entropy and human visual characteristics [J]. Journal of Systems Engineering and Electronics, 2018, 29(5): 1079-1088. |
[3] | Xiaoping Shi, Rui Guo, Yi Zhu, and Zicai Wang. Astronomical image restoration using variational Bayesian blind deconvolution#br# [J]. Journal of Systems Engineering and Electronics, 2017, 28(6): 1236-1247. |
[4] | Yongjian Liu, Peng Xiao, Hongchao Wu, and Weihua Xiao. LPI radar signal detection based on radial integration of Choi-Williams time-frequency image [J]. Journal of Systems Engineering and Electronics, 2015, 26(5): 973-981. |
[5] | Rongchang Zhao and Yide Ma. Novel region-based image compression method based on spiking cortical model [J]. Journal of Systems Engineering and Electronics, 2015, 26(1): 161-. |
[6] | Mingbo Zhao, Jun He, Zaiqi Lu, and Qiang Fu. Range anomaly suppression based on neighborhood pixels detection in ladar range images [J]. Journal of Systems Engineering and Electronics, 2013, 24(1): 68-75. |
[7] | Kun Liu1, Lei Guo, and Jingsong Chen. Contourlet transform for image fusion using cycle spinning [J]. Journal of Systems Engineering and Electronics, 2011, 22(2): 353-357. |
[8] | Chunhui Zhu*, Yi Shen, and Qiang Wang. New fast algorithm for hypercomplex decomposition and hypercomplex cross-correlation [J]. Journal of Systems Engineering and Electronics, 2010, 21(3): 514-519. |
[9] | Yang Miao, & Wei Zhiqiang. Fuzzy color morphological sieves? [J]. Journal of Systems Engineering and Electronics, 2009, 20(6): 1366-1372. |
[10] | Zhang Wenge, Liu Fang, Jiao Licheng & Gao Xinbo. SAR image despeckling based on edge detection and nonsubsampled second generation bandelets [J]. Journal of Systems Engineering and Electronics, 2009, 20(3): 519-526. |
[11] | Ma Yu, Gu Xiaodong & Wang Yuanyuan. Feature fusion method for edge detection of color images [J]. Journal of Systems Engineering and Electronics, 2009, 20(2): 394-399. |
[12] | Ma Liyong, Shen Yi & Ma Jiachen. Local spatial properties based image interpolation scheme using SVMs [J]. Journal of Systems Engineering and Electronics, 2008, 19(3): 618-623. |
[13] | Deng Jiaxian & Wu Xiaoqin. Empirical data decomposition and its applications in image compression [J]. Journal of Systems Engineering and Electronics, 2007, 18(1): 164-170. |
[14] |
Hu Junhong , Zhang Tianxu & Jiang Haoyang.
New multi-DSP parallel computing architecture for real-time image processing
|
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||