Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2015, Article ID 684824, 11 pages
http://dx.doi.org/10.1155/2015/684824
Research Article

An Image Steganography Method Hiding Secret Data into Coefficients of Integer Wavelet Transform Using Pixel Value Differencing Approach

1Government College of Engineering, Aurangabad, Maharashtra 431 005, India
2Jawaharlal Nehru College of Engineering, Aurangabad, Maharashtra 431 005, India

Received 12 November 2014; Accepted 23 December 2014

Academic Editor: Gen Qi Xu

Copyright © 2015 Avinash K. Gulve and Madhuri S. Joshi. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. D.-C. Wu and W.-H. Tsai, “A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1613–1626, 2003. View at Publisher · View at Google Scholar · View at Scopus
  2. H. C. Wu, N. I. Wu, C. S. Tsai, and M.-S. Hwang, “Image steganographic scheme based on pixel-value differencing and LSB replacement methods,” IEE Proceedings—Vision, Image and Signal Processing, vol. 152, no. 5, pp. 611–615, 2005. View at Publisher · View at Google Scholar
  3. K.-C. Chang, P. S. Huang, T.-M. Tu, and C.-P. Chang, “Adaptive image steganographic scheme based on tri-way pixel-value differencing,” in Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics (SMC '07), pp. 1165–1170, Montreal, Canada, October 2007. View at Publisher · View at Google Scholar · View at Scopus
  4. A. K. Gulve and M. S. Joshi, “An image steganography algorithm with five pixel pair differencing and gray code conversion,” International Journal of Image, Graphics and Signal Processing, vol. 6, no. 3, pp. 12–20, 2014. View at Publisher · View at Google Scholar
  5. K.-C. Chang, C.-P. Chang, P. S. Huang, and T.-M. Tu, “A novel image steganographic method using tri-way pixel-value differencing,” Journal of Multimedia, vol. 3, no. 2, pp. 37–44, 2008. View at Google Scholar · View at Scopus
  6. K. C. Chang, P. S. Huang, T. M. Tu, and C. P. Chang, “Image steganographic scheme using tri-way pixel-value differencing and adaptive rules,” in Proceedings of the IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 449–452, Kaohsiung, Taiwan, 2007.
  7. A. K. Gulve and M. S. Joshi, “A secured image steganography algorithm with five pixel pair differencing by selecting the common pixel randomly,” in Proceedings of the 3rd International Conference on Computational Intelligence and Information Technology (CIIT '13), pp. 55–61, Elseveir, Mumbai, India, 2013.
  8. A. R. Calderbank, I. Daubechies, W. Sweldens, and B.-L. Yeo, “Wavelet transforms that map integers to integers,” Applied and Computational Harmonic Analysis, vol. 5, no. 3, pp. 332–369, 1998. View at Publisher · View at Google Scholar · View at MathSciNet
  9. B. Ramalingam, R. Amirtharajan, and J. B. B. Rayappan, “Stego on FPGA: an IWT approach,” The Scientific World Journal, vol. 2014, Article ID 192512, 9 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  10. E. Ghasemi, J. Shanbehzadeh, and B. ZahirAzami, “A steganographic method based on Integer Wavelet Transform and Genetic Algorithm,” in Proceedings of the International Conference on Communications and Signal Processing (ICCSP '11), pp. 42–45, Calicut, India, February 2011. View at Publisher · View at Google Scholar · View at Scopus
  11. E. Ghasemi, J. Shanbehzadeh, and N. Fassihi, “High capacity image steganography using wavelet transform and genetic algorithm,” in Proceedings of the International Multi Conference of Engineers and Computer Scientists (IMECS '11), pp. 495–498, Hong Kong, March 2011. View at Scopus
  12. G. Xuan, Y. Q. Shi, C. Yang, Y. Zheng, D. Zou, and P. Chai, “Lossless data hiding using integer wavelet transform and threshold embedding technique,” in Proceedings of the IEEE International Conference on Multimedia and Expo (ICME '05), pp. 1520–1523, IEEE, Amsterdam, The Netherlands, July 2005. View at Publisher · View at Google Scholar · View at Scopus
  13. R. O. El Safy, H. H. Zayed, and A. El Dessouki, “An adaptive steganographic technique based on integer wavelet transform,” in Proceedings of the International Conference on Networking and Media Convergence (ICNM '09), pp. 111–117, Cairo, Egypt, March 2009. View at Publisher · View at Google Scholar · View at Scopus
  14. S. Archana, A. Judice, and K. P. Kaliyamurthie, “A novel approach on image steganographic methods for optimum hiding capacity,” International Journal of Engineering and Computer Science, vol. 2, no. 2, pp. 378–385, 2013. View at Google Scholar
  15. A. K. Al-Asmari, M. A. Al-Qodah, and A. S. Salama, “Wavelet-pixel value differencing technique for digital images data hiding,” in Proceedings of the IEEE International Conference on System Engineering and Technology (ICSET '11), pp. 15–18, June 2011. View at Scopus
  16. Z. Wang and A. C. Bovik, “A universal image quality index,” IEEE Signal Processing Letters, vol. 9, no. 3, pp. 81–84, 2002. View at Publisher · View at Google Scholar · View at Scopus
  17. Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, “Image quality assessment: from error visibility to structural similarity,” IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600–612, 2004. View at Publisher · View at Google Scholar · View at Scopus
  18. N. I. Wu and M. S. Hwang, “Data hiding: current status and key issues,” International Journal of Network Security, vol. 4, no. 1, pp. 1–9, 2007. View at Google Scholar · View at Scopus
  19. X. Zhang and S. Wang, “Efficient data hiding with histogram-preserving property,” Telecommunication Systems, vol. 49, no. 2, pp. 179–185, 2012. View at Publisher · View at Google Scholar · View at Scopus
  20. J. Fridrich, M. Goljan, and R. Du, “Detecting LSB steganography in color and gray-scale images,” IEEE Multimedia Magazine, vol. 8, no. 4, pp. 22–28, 2001. View at Publisher · View at Google Scholar · View at Scopus