Image Steganogaraphy Based On Complex Double Dual Tree Wavelet Transform
Image Steganogaraphy Based On Complex Double Dual Tree Wavelet Transform
Sushil Kumar
Department of Mathematics,
Rajdhani college,University of Delhi,
New Delhi,India
e-mail: [email protected]
S. K. Muttoo
Department of Computer Science,
University of Delhi,
Delhi, India
e-mail: [email protected]
Abstract— This paper investigate the applications of Dual Tree steganography such as DCT. DCT remained famous domain
Complex Wavelet Transforms to steganography and compares of embedding as it was the major compression technique in
it with other transform domains such as DWT, Wavelet-like earlier JPEG compression technique. Wavelet transform
transform domain, viz, Slantlet domain and Double Density replaced the DCT in the JPEG 2000 and also found to be
Dual Tree DWT domain. It is shown that Dual Tree Complex better option than DCT in terms of embedding capacity and
Wavelet Transform domain is better option than others as it robustness. However, DWT lacks directional selectivity for
offers better imperceptibily and high embedding capacity. It is diagonal features and shift invariance. The dual tree complex
also a well known fact that Complex Wavelet Transform not wavelet transform (DT-CWT) has a modest amount of
only provides shift invariance but also offers better directional redundancy, but it provides shift invariance and good
selectivity over the discrete wavelet transform. We present a directional selectivity. Kingsbury [6] introduced Dual-Tree
steganographic algorithm in four transform domains as Complex Wavelet Transform (DTCWT) and Selesnick [13-
mentioned above. The original string message is first 14] provided Double-Density DWT (DD DWT) and Dual-
converted into binary cell array with the help of self- Tree DWT (DT DWT) for complex analysis. They have
synchronizing variable length codes, viz., T-codes before the shown that DT-CWT has a modest amount of redundancy, but
embedding. We then embed the secret message in the it provides shift invariance and good directional selectivity.
insensitive middle and high sub-bands obtained from the cover The 2-D DT-CWT is based on two distinct scaling functions
image after applying these transforms on it. To see the visual and two distinct wavelets, whereas Double-Density DWT is
effect of data embedding in the Complex Wavelet Transform based on a single scaling function (low pass) and two distinct
domain, we use the most convenient and simple modified LSB wavelets (high pass). On the application of 2-D DD DWT , the
approach. The metric used for evaluating the visual quality of cover image is decomposed into nine sub-bands labeled LL,
stego-image is PSNR. The experimental results show that the LH1, LH2, H1L, H1H1, H1H2, H2L, H2H1, H2H2, respectively.
dual tree complex wavelet transform is better option than the The Double Density Dual-Tree DWT (DD DT DWT)
Wavelet, Wavelet-like transform, i.e., Slantlet transform and possesses simultaneously the properties of DT DWT and DD
Double Density Dual Tree DWT for data hiding in terms of DWT. The structure of DD DT DWT consists of two
visual quality and embedding capacity, though poor to oversampled iterated filter-bank that operate in parallel. Each
external attacks such as Gaussian. row of the cover image is first subjected to 1-D DD DT DWT
Keywords- DWT, SLT, DD DT-CWT, PSNR, BPP, JPEG 2000 decomposition in which one is real decomposition that uses
the real component of DD DT DWT and the other is an
I. INTRODUCTION imaginary decomposition. After the 1-level decomposition we
obtain four times wavelets than the ordinary 2-D DD DWT
The discrete wavelet transform (DWT) have been used as a decomposition.
popular tool to embed the message in the frequency In this paper we propose four high capacity data hiding
coefficients of high sub-bands obtained on applying it to the techniques based on the transforms, viz., Wavelet (wavcdf97),
original cover image. There are applications that demand high Slantlet, Double Density Dual Tree DWT and Double Density
capacity, e.g., in the advance research on network Dual Tree Complex Wavelet, respectively. We embed data
transmission security and lossless embedding such as in into insensitive Wavelet/Slantlet/DT-CWT sub-bands using
military, legal and medical imaging domains. The integer the modified LSB method. The embedding capacity can reach
wavelet transform provides better embedding capacity and to ¾ of the cover image (grayscale) in Wavelet and Slantlet
better imperceptibility than the earlier used transforms in domains and 6/7 and more of the cover image (grayscale) in
94
The proposed algorithm is implemented in four domains, viz.,
Wavelet domain, Slantlet domain, DD DT DWT and DT- 70
CWT domain. We have used 256 x 256 size images and
results are obtained by running the algorithm in Matlab 7.0
software. The summary of the results obtained for some of the
images is given in table 1. Figure 1 shows the comparison 65
between four transforms in terms of PSNR values vs BPP (bits
per pixel) rate. The results obtained show that DT-CWT
outperforms the other transforms in terms of visual quality and
60
embedding capacity.
ps nr
TABLE 1. COMPARISON OF DWT, SLT, DD DT DWTAND DT-CWT
METHODS(MESSAGE LENGTH=6000) 55
95
Wiener filtering, Median filtering, Mean filtering, JPEG [13] Selesnick I. W., “The double density DWT”, in: Wavelets in
compression, and AWGN attacks for image watermarking Signal and Image Analysis: From theory to Practics, A. Petrosian
based on Spread Spectrum and Quantization Index and F. G. Meyer, (Eds), Norwell, MA: Kluwer, 2001.
Modulation. We are working on finding a secure high
capacity steganographic algorithm in the DT-CWT domain [14] Selesnick I. W.,“The Double-density dual-tree DWT”, IEEE
that is robust to common attacks such as low-pass filtering, Trans. On Signal Processing, 52(5) (2004), 1304-1314.
JPEG compression and Gaussian noise.
[15] Selesnick I. W., R. Baraniuk, and N.G. Kingsbury, “The
dual-tree complex wavelet transform: A coherent framework for
multiscale signal and image processing”, IEEE Signal Proc.
Magazine, (2005) 123-151.
REFERENCES
[1] Alpert B., Coifman G.R., and Rokhlin V., “Wavelet-likebases [16] Sushil Kumar and S.K. Muttoo, “Distortionless data hiding
for the fast solution of second kind integral equations”,SIAM using Slantlet transform”, MINES 2009, Wuhan, China
J.Sci. Comput., 14: 159-184.http:///dx.doi.org/10.1137.0914010
[17] Thompson A. I. et al., “Watermarking for Multimedia
[2] Celik Mehmut Utku et al., “Lossless Generalized-LSBData Security using Complex Wavelets”, Communicated for
Embedding”, IEEE Transactions on image processing,vol. 14, publication.
No. 2, Feb. 2005.
[18] Titchener, M.R., “Generalised T-codes: extended
[3] Do M.N. and Vetterli M., “The Contourlet transform: An construction algorithm for self- synchronization codes”, IEEE
efficient directional multiresolution image representation”, IEEE Proc. Commun., Vol. 143, No.3, pp. 122-128, 1996
Trans. On Image Processing, 14(12), 2091-2106.
[19] Tolba, M.F.; Ghonemy, M.A.-S.; Taha, I.A.-H.; Khalifa,
[4] Joachim J. Eggers, R. Bauml and Bernd Girod, “A A.S., “High Capacity Image Steganography using Wavelet-Based
Communication approach to Image Steganography”, Proceedings Fusion” , Computers and Communications, 2004, Proceedings.
of SPIE., Security and Watermarking of Multimedia Contents IV, ISCC2004. Ninth International Symposium on Volume 1, Issue,
Vol. 4675,San Jose, CA, Jan., 2002. 28 June-1 July 2004, Vol.1, 430-435
[5] Johnson, N.F. and S. Jajodia, “Exploring steganography: [20] Ulrich G., “Robust Source Coding with Generalised T-
Seeing the unseen”, IEEE Computer, 31: 26-34, 1998 codes”, a thesis submitted in the University of Auckland, 1998.
[6] Kingsbury N.G.,“Image processing with complex wavelets”, [21] Zhang Tao and Xijian Ping, “A new approach to reliable
Philos. Trans. R. Soc. London A, Math. Phy. Sci., 357(1760) detection of LSB steganography in natural images”, Signal
(1999) 2543-2560 Processing, 83 (2003), 2085-2093,
www.ComputerScienceWeb.com
[7] Maitra M. and Chatterjee A., “A Slantlet transform based
intelligent system for magnetic resonance brain image
classification”, Biomedical Siganl Processing and Conrol, 1, pp.
299-306
96