IMAGE IN IMAGE STEGANOGRAPHY USING WAYELET TRANSFORM

This paper describes a stego system in which a gray scale image is embedded in another one.Wavelet transform of both the cover image and the embedded image is used to sort their subbands energies to guarantee that the embedded image will be inserted in the low frequency components of the cover imag...

Full description

Bibliographic Details
Main Author: Sonia A. R. Mohammed Ali
Format: Article
Language:English
Published: University of Baghdad 2002-12-01
Series:Journal of Engineering
Subjects:
Online Access:https://www.joe.uobaghdad.edu.iq/index.php/main/article/view/3146
_version_ 1827294712352997376
author Sonia A. R. Mohammed Ali
author_facet Sonia A. R. Mohammed Ali
author_sort Sonia A. R. Mohammed Ali
collection DOAJ
description This paper describes a stego system in which a gray scale image is embedded in another one.Wavelet transform of both the cover image and the embedded image is used to sort their subbands energies to guarantee that the embedded image will be inserted in the low frequency components of the cover image with little perceptual distortion. Embedding by this way increases the robustness of the system but affects the syster 1 imperceptibility, so a variable scaling factor (a) is used to attenuate the components of the embedded image before adding them to those of the cover image. It is found that the stego image with peak signal-to-noise ratio (PSNR) of about 30 dB has goo 1 imperceptibility.The attacker is proposed to be active, so compression is applied to the stego image. According to this, the scaling factor must be increased to compromise between the quality of the stego and the reconstructed images. This increment reduces the imperceptibility of the stego image and here the trade off between the imperceptibility and the robustness occurs.The attack is proposed to be stego known, so that to increase the security of the system, a stego key is generated from the embedded image itself and is transmitted separately, making the system type secret key steganography.The size of the embedded image obtained in the work is one quarter the size of the cover image that may be considered good comparing with the available systems.
first_indexed 2024-04-24T14:07:45Z
format Article
id doaj.art-9423976db86747778ff496e670fe4101
institution Directory Open Access Journal
issn 1726-4073
2520-3339
language English
last_indexed 2024-04-24T14:07:45Z
publishDate 2002-12-01
publisher University of Baghdad
record_format Article
series Journal of Engineering
spelling doaj.art-9423976db86747778ff496e670fe41012024-04-03T09:57:29ZengUniversity of BaghdadJournal of Engineering1726-40732520-33392002-12-0180410.31026/j.eng.2002.04.05IMAGE IN IMAGE STEGANOGRAPHY USING WAYELET TRANSFORMSonia A. R. Mohammed Ali This paper describes a stego system in which a gray scale image is embedded in another one.Wavelet transform of both the cover image and the embedded image is used to sort their subbands energies to guarantee that the embedded image will be inserted in the low frequency components of the cover image with little perceptual distortion. Embedding by this way increases the robustness of the system but affects the syster 1 imperceptibility, so a variable scaling factor (a) is used to attenuate the components of the embedded image before adding them to those of the cover image. It is found that the stego image with peak signal-to-noise ratio (PSNR) of about 30 dB has goo 1 imperceptibility.The attacker is proposed to be active, so compression is applied to the stego image. According to this, the scaling factor must be increased to compromise between the quality of the stego and the reconstructed images. This increment reduces the imperceptibility of the stego image and here the trade off between the imperceptibility and the robustness occurs.The attack is proposed to be stego known, so that to increase the security of the system, a stego key is generated from the embedded image itself and is transmitted separately, making the system type secret key steganography.The size of the embedded image obtained in the work is one quarter the size of the cover image that may be considered good comparing with the available systems. https://www.joe.uobaghdad.edu.iq/index.php/main/article/view/3146Steganography; infonnation hiding; irnage hiding'
spellingShingle Sonia A. R. Mohammed Ali
IMAGE IN IMAGE STEGANOGRAPHY USING WAYELET TRANSFORM
Journal of Engineering
Steganography; infonnation hiding; irnage hiding'
title IMAGE IN IMAGE STEGANOGRAPHY USING WAYELET TRANSFORM
title_full IMAGE IN IMAGE STEGANOGRAPHY USING WAYELET TRANSFORM
title_fullStr IMAGE IN IMAGE STEGANOGRAPHY USING WAYELET TRANSFORM
title_full_unstemmed IMAGE IN IMAGE STEGANOGRAPHY USING WAYELET TRANSFORM
title_short IMAGE IN IMAGE STEGANOGRAPHY USING WAYELET TRANSFORM
title_sort image in image steganography using wayelet transform
topic Steganography; infonnation hiding; irnage hiding'
url https://www.joe.uobaghdad.edu.iq/index.php/main/article/view/3146
work_keys_str_mv AT soniaarmohammedali imageinimagesteganographyusingwayelettransform