| Peer-Reviewed

Signal Steganography Using Different Wavelets and Their Comparisons

Received: 9 May 2022    Accepted: 25 May 2022    Published: 30 June 2022
Views:       Downloads:
Abstract

The process of inserting secret data in any media as pictures, audio, video, text and protocol, also it can be empathy this secret connection is called steganography. At present, the widespread use of internet applications has become a security risk. Steganography is used to overcome this undesirable situation. It shows a significant character in maintaining privacy. Some steganographic techniques modify the image using the spatial domain, transform domain, spread spectrum, statistical method and distortion techniques. This work aims to develop efficient data encryption and decryption technique that provide security of data. In this research exertion, it anticipated an image steganalysis method using various wavelet decomposition, especially using multiwavelet decomposition. First, we decomposed the image using different wavelets and multiwavelets. Then we extracted the more informative parts into wavelet sub-bands as a feature and inserted them into the LL sub-band wavelet decomposed image. The resulting image is sent to the recipient as a signal. The recipient retrieves confidential information through encryption. Finally, by analyzing the actions of different wavelets, we can retrieve the original message through the decryption technique. The multiwavelet technique achieves PSNR of 48.26 - 56.5926 and MSE of 0.1428 - 0.97. The result indicates that multiwavelet provided a good recovery of the secret image quality that led to an increase in the imperceptibility of the system.

Published in Advances in Applied Sciences (Volume 7, Issue 2)
DOI 10.11648/j.aas.20220702.12
Page(s) 27-32
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Decryption, Encryption, Wavelet and Multiwavelet Decomposition, Steganography

References
[1] Abdulla, A. A., Sellahewa, H. and Jassim, S. A., (2014) “Stego quality enhancement by message size reduction and Fibonacci bit-plane mapping,” in Security Standardisation Research. Cham: Springer International Publishing, pp. 151–166. DOI: 10.1007/978-3-319-14054-4_10.
[2] Hemalatha, S., Acharya, U. D. and Renuka, A., (2013) “A Secure Color Image Steganography in Transform Domain,” International Journal on Cryptography and Information Security, 3 (1), pp. 17–24. arXiv preprint arXiv: 1307.3026.
[3] Hussain, M., Wahab, A. W. A., Idris, Y. I. B., Ho, A. T. and Jung, K. H., (2018) “Image steganography in spatial domain: A survey,” Signal processing. Image communication, 65, pp. 46–66. DOI: 10.1016/j.image.2018.03.012.
[4] Lin, G. and Liu, Z. M., (2000) “The application of multiwavelet transform to image coding,” IEEE transactions on image processing: a publication of the IEEE Signal Processing Society, 9 (2), pp. 270–273. DOI: 10.1109/83.821740.
[5] Murugan, G. V. K. and Uthandipalayam Subramaniyam, R., (2020) “Performance analysis of image steganography using wavelet transform for safe and secured transaction,” Multimedia tools and applications, 79 (13–14), pp. 9101–9115. DOI: 10.1007/s11042-019-7507-6.
[6] Parul, M. and Rohil, H. (2014) “Optimized Image Steganography using Discrete Wavelet Transform (DWT),” International Journal of Recent Development in Engineering and Technology (IJRDET), 2 (2), pp. 75–81.
[7] Pawar, S. S. and Kakde, V. (2014) “Review on Steganography for Hiding Data,” International Journal of Computer Science and Mobile Computing, 3 (4), pp. 225–229.
[8] Roy, R. et al. (2013) “Evaluating Image Steganography Techniques: Future Research Challenges, International Conference on Computing Management and Telecommunications,” pp. 309–314. doi: 10.1109/ComManTel.2013.6482411.
[9] Sidhik, S., Sudheer, S. K. and Mahadhevan Pillai, V. P. (2015) “Performance and analysis of high capacity Steganography of color images involving Wavelet Transform,” Optik, 126 (23), pp. 3755–3760. DOI: 10.1016/j.ijleo.2015.08.208.
[10] Jeevitha, S. and Amutha Prabha, N. (2020) “Effective payload and improved security using HMT Contourlet transform in medical image steganography,” Health and technology, 10 (1), pp. 217–229. DOI: 10.1007/s12553-018-00285-1.
[11] Serdean, C. V., Ibrahim, M. K., Moemeni, A. and Al-Akaidi, M. M., (2007) “Wavelet and multiwavelet watermarking,” IET image processing, 1 (2), p. 223. DOI: 10.1049/iet-ipr:20060214.
[12] Singh, A. K. (2017) “Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images,” Multimedia tools and applications, 76 (6), pp. 8881–8900. DOI: 10.1007/s11042-016-3514-z.
[13] Yuan, H. D., (2014) “Secret sharing with multi-host adaptive steganography,” Information Sciences, 254, pp. 197–212. DOI: 10.1016/j.ins.2013.08.012.
[14] Nipanikar, S. I., Hima Deepthi, V. and Kulkarni, N. (2018) “A sparse representation based image steganography using Particle Swarm Optimization and wavelet transform,” Alexandria Engineering Journal, 57 (4), pp. 2343–2356. doi: 10.1016/j.aej.2017.09.005.
[15] Zhang, Q. and Lu, W. (2016) “Joint Image Splicing Detection in DCT and Contourlet Transform Domain,” Journal of Visual Communication and Image Representation, 40, pp. 449–458.
Cite This Article
  • APA Style

    Shemanta Kumar Biswas, Redwanul Islam, Md. Rafiqul Islam. (2022). Signal Steganography Using Different Wavelets and Their Comparisons. Advances in Applied Sciences, 7(2), 27-32. https://doi.org/10.11648/j.aas.20220702.12

    Copy | Download

    ACS Style

    Shemanta Kumar Biswas; Redwanul Islam; Md. Rafiqul Islam. Signal Steganography Using Different Wavelets and Their Comparisons. Adv. Appl. Sci. 2022, 7(2), 27-32. doi: 10.11648/j.aas.20220702.12

    Copy | Download

    AMA Style

    Shemanta Kumar Biswas, Redwanul Islam, Md. Rafiqul Islam. Signal Steganography Using Different Wavelets and Their Comparisons. Adv Appl Sci. 2022;7(2):27-32. doi: 10.11648/j.aas.20220702.12

    Copy | Download

  • @article{10.11648/j.aas.20220702.12,
      author = {Shemanta Kumar Biswas and Redwanul Islam and Md. Rafiqul Islam},
      title = {Signal Steganography Using Different Wavelets and Their Comparisons},
      journal = {Advances in Applied Sciences},
      volume = {7},
      number = {2},
      pages = {27-32},
      doi = {10.11648/j.aas.20220702.12},
      url = {https://doi.org/10.11648/j.aas.20220702.12},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.aas.20220702.12},
      abstract = {The process of inserting secret data in any media as pictures, audio, video, text and protocol, also it can be empathy this secret connection is called steganography. At present, the widespread use of internet applications has become a security risk. Steganography is used to overcome this undesirable situation. It shows a significant character in maintaining privacy. Some steganographic techniques modify the image using the spatial domain, transform domain, spread spectrum, statistical method and distortion techniques. This work aims to develop efficient data encryption and decryption technique that provide security of data. In this research exertion, it anticipated an image steganalysis method using various wavelet decomposition, especially using multiwavelet decomposition. First, we decomposed the image using different wavelets and multiwavelets. Then we extracted the more informative parts into wavelet sub-bands as a feature and inserted them into the LL sub-band wavelet decomposed image. The resulting image is sent to the recipient as a signal. The recipient retrieves confidential information through encryption. Finally, by analyzing the actions of different wavelets, we can retrieve the original message through the decryption technique. The multiwavelet technique achieves PSNR of 48.26 - 56.5926 and MSE of 0.1428 - 0.97. The result indicates that multiwavelet provided a good recovery of the secret image quality that led to an increase in the imperceptibility of the system.},
     year = {2022}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Signal Steganography Using Different Wavelets and Their Comparisons
    AU  - Shemanta Kumar Biswas
    AU  - Redwanul Islam
    AU  - Md. Rafiqul Islam
    Y1  - 2022/06/30
    PY  - 2022
    N1  - https://doi.org/10.11648/j.aas.20220702.12
    DO  - 10.11648/j.aas.20220702.12
    T2  - Advances in Applied Sciences
    JF  - Advances in Applied Sciences
    JO  - Advances in Applied Sciences
    SP  - 27
    EP  - 32
    PB  - Science Publishing Group
    SN  - 2575-1514
    UR  - https://doi.org/10.11648/j.aas.20220702.12
    AB  - The process of inserting secret data in any media as pictures, audio, video, text and protocol, also it can be empathy this secret connection is called steganography. At present, the widespread use of internet applications has become a security risk. Steganography is used to overcome this undesirable situation. It shows a significant character in maintaining privacy. Some steganographic techniques modify the image using the spatial domain, transform domain, spread spectrum, statistical method and distortion techniques. This work aims to develop efficient data encryption and decryption technique that provide security of data. In this research exertion, it anticipated an image steganalysis method using various wavelet decomposition, especially using multiwavelet decomposition. First, we decomposed the image using different wavelets and multiwavelets. Then we extracted the more informative parts into wavelet sub-bands as a feature and inserted them into the LL sub-band wavelet decomposed image. The resulting image is sent to the recipient as a signal. The recipient retrieves confidential information through encryption. Finally, by analyzing the actions of different wavelets, we can retrieve the original message through the decryption technique. The multiwavelet technique achieves PSNR of 48.26 - 56.5926 and MSE of 0.1428 - 0.97. The result indicates that multiwavelet provided a good recovery of the secret image quality that led to an increase in the imperceptibility of the system.
    VL  - 7
    IS  - 2
    ER  - 

    Copy | Download

Author Information
  • Mathematics Discipline, Khulna University, Khulna, Bangladesh

  • Department of Biomedical Engineering, Khulna University of Engineering & Technology, Khulna, Bangladesh

  • Mathematics Discipline, Khulna University, Khulna, Bangladesh

  • Sections