SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1120
An Improved Technique for Hiding Secret Image on Colour Images
Using DWT, DCT, SVD
Amal Saroj1, Dr. S Saira Banu2
1 MPhil. Scholar, Department of Electronics and Communication Systems, Karpagam Academy of Higher Education
2Associate Professor, Department of Electronics and Communication Systems,
Karpagam Academy of Higher Education
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Information secret strategies have recently
become important in many cases. Digital audio, video and
images are increasingly different, but they have specific
references that may contain a late copyright notice or serial
number otherwise it will be unauthorized copies. Content of
Multimedia will have been attacked and unauthorized
reproduction of digital multimedia data by the hackers. To
detect and protect copyright ownership, digital reservoirs
have been built to respond to the growing demand for
intellectual property protection. In our work the digital
steganography algorithm is a hybrid scheme based on a
Discrete Wavelet Transform (DWT), Discrete Cosine
Transformation and (DCT) Singular Value Decomposition
(SVD). The cover image is Wavelet decomposed to two levels
and cosine transformed by one level. The Singular Value
Decomposed message image is then cosine transformed and
embedded with the cover image by replacing the least
prominent datas.
Key Words: Discrete Wavelet Transformations (DWT),
Discrete Cosine Transformations (DCT), Singular Value
Decompositions (SVD), Human Visual System (HVS), Peake
Signal to Noise Ratio (PSNR), Diamond Encoding and
Discrete Wavelet Transform (DE-DWT), XieBeni integrated
Fuzzy C-means clustering (XFCM), Particle Swarm
Optimization (PSO).
1. INTRODUCTION
Now a day’s the digital data transmission over the
wired and wireless channels are facing the big problem due
to the illegal access of the data. Dedicated communication
channels for each communication is impossible all time.
Shared media or wireless communication channels are
preferred for communicating digital multimedia data like
images and videos to reduce the cost of communication.
There arises the legal problem of piracy and copyright. In
this case, for achieving the secrecy and authenticity, several
cyphering methods are adopted like secret keying,
watermarking, and steganography etc. steganographic
technology can be applied for image, voice, video data. Here
we are illustrating an improved method for hiding an image
within an image without losing the data’s and also explained
the normalised correlation factor for the steganographic
images with various resolution secret images.
In order to achieve security several steganographicschemes
are applied in different studies.Multipletransformations are
getting most effective than a single transformation.
Steganography is not cryptography, but for secret privacy,
then multiply data encrypted by stenographer. Thegoal isto
create an image in the same way as a human eye but if
necessary it gives its constructive recognition than the
owner's key. Transform-domain technologycombinescover
image and secret images bycontrollingthesizeoftransform-
domains like DWT and DCT. More information and
vulnerabilities can be changed against common attacks-
Modified domain modes, but the cost of these procedures is
higher in the Transform-domain steganographic system.
1.1 HVS and DWT
A powerful analogy thatleadstothewidelyusedtechnique
– Human Visual System (HVS) images are Discrete Wavelet
Transformations (DWT). Discrete Wavelet Transformations
can be used as an effective version of Frequency models for
HVS. DWT is a transformational strategy by interrupting the
image at a new time and frequency band of Low frequency,
medium and high frequency input image. The Filterselection
depends on the type of signal analyzed. The following filters
like Haar, Daubechies, Biorthogonal, Meyer, Morlet, Mexican
Hat, Daubechies. Coiflets & Symlet can be used with Discrete
Wavelet Transformation,
Fig- 1: DWT Transformation
1.2 Two-dimensional DWT
DWT method can be used for decomposition of input
image to multi stage transform according to the frequency.
For a two-dimensional image two-dimensional DWT
transformation is used. The first level ofDWTiscomposedof
approximately equivalent length coefficient in column wise,
and the second is made of raw wise with a down sampling of
two, the third group combines vertical wavelet s coefficient,
and fourth has diagonal coefficient.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1121
Fig- 2: DWT Decomposition
1.2 DCT and SVD
For Discrete Cosine Transformation the functions of the
oscillation coefficient in various frequencies reveal a limited
sequence of data points in total. Discrete Cosine
Transformation works to highlight images within the areas
of different frequencies. During the quantisation, the
abstraction part is actually present lower mainstream
frequencies, only the most important frequencies are
preserved and retrieve to the original image. As a result,
some of the reconstructed pictures have been distorted.
When the compression level is adjusted,qualityofimagecan
be adjusted. But the human eye can only identify if the
distortion reaches to a certain level.
P(x,y) is the x, yth element of the image represented by
the matrix p. N represents the size of the block that the DCT
is done. The equation calculates one entry (ith, jth) of the
transformed image from pixel values of the original image
matrix. For the standard 8X8 block the compression uses
N=8 and x and y ranges from 0 t0 7. In the case of
steganography DCT is very much helpful because the non-
abstraction frequency region can be used for theinsertion of
stegano data.
Singular Value Decomposition is a method of changing
variables basically a group that exposes different
relationships on the original matrices. Also, we can say that,
SVD is a method of detection. Sorting levels of the
information points differ greatly. SVD identifies where most
are variable and find it and optimal measurementofkeydata
points using lower levels. So, SVD can be seen as a method
for reducing data. According to Singular Value
Decomposition, Let us consider an m x n matrix A converted
to a factorised form where U will be a unitary matrix of the
same size of A, is a rectangular diagonal matrix of same size.
V is also having the size of A and it will be a unitary matrix.
Here U (m n) and V (m n) are orthogonal matrices so that
and where I is the identity matrix.
2. LITERATURE SURVEY
The researchers incorporated various techniques for hiding
secret image on a cover image. The most common technique
for hiding data is the LSB substation algorithm which is a
lossy steganographic technique. Another technologies like
DWT, DCT, XCFM, SVDare applied forbetterqualityimage.In
all algorithms the correlation between the secret image and
the extracted images are tested with the normalized
correlation factor for identifying the quality of the received
image. Alexandru Isar1, et al [2] explained the statistical
analysis of 2D DWT as well as 1D DWT in their probability
density function and correlation factor for various datas.
Samer Atawneh, et al [4][5] describedthediamondencoding
algorithm for steganography and DWT technique is used for
better security.PSNRvaluesareanalysedfordifferentimages
in DE system nd DE-DWT system.
T.Morkel, et al [6] explains the different steganographic
techniques commonly used and the performance evaluation
procedures for different schemes in their paper. Mashruha
Raquib Mitashe, etal [1] XieBeni integrated Fuzzy C-means
clustering (XFCM) technique is applied inthisresearchwork.
Particle Swarm Optimization (PSO)isusedforprocessingthe
images, before entering to the steganographic process.
Discrete Wavelet Transform (DWT) is used for
steganography. A correlationcoefficientof0.9934isachieved
in this work. Hadis Tarrah, Qazvin, et al [3], a combination of
DWT and SVD is used for steganography. A PSNR value of 45
and Correlation value of 0.59 is achieved inthispaper(PSNR
> 30 gives high similarity). Anita Pradhan, et al [8], Sudha
Rawat, et al [9], This paper deals with the image
compression techniques and the comparison of different
steganographic schemes and their performance evaluations.
Samer Atawneh Hussein Al Bazar et al. [10] Illustrates the
new hybrid steganographic schemeusingDiamondencoding
and Discrete wavelet transform. The Distortion caused by
DWT is eliminated by DE algorithm and it improves the
security of the steganographic image. R. Shanthakumari and
Dr.S. Malliga [11] proposed new method in LSB substation
algorithm such that the substation of bits is with respect to
the size of secret data. Preservation of smoother and sharp
edges in the carrier data is maintained in this algorithm,
hence, they get better qualityimage witha betterPSNRvalue
up to 80. Vijay Kumar & Dinesh Kumar [12] reduces the
complexity while extracting secret image and improved the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1122
security of steganographic image by adding key in the
improved DWT algorithm. The researcher obtained a PSNR
value of 49.08 and Similarity ratio of about 0.9918. Vivek
Kapoor et al [13], Hemant Gupta et al Chaturvedi [14], Pooja
Yadav, et al [15] explains different LSB substation methods
for embedding secret data on to the video frames and
analysed the performance parameters PSNR andCorrelation
factor. Rajkumar R and Saira Banu. S [16][17] explained in
detail about the effect of noise in the quality of image and
proposed an algorithm for removing noise.
3. PROPOSED ALGORITHM
In this research steganography is achieved using a hybrid
steganographic scheme by applying DWT, DCT,SVDoncover
image as well as secret image.
Fig- 3: DWT Tree algorithm
The cover image is DWT transformed and we get the
coefficients LL, LH, HL, HH. The higher frequency part is
separated and again it will undergo the DWT
transformations. Then we will get the coefficients LL1, LH1,
HL1, HH1. After this second transformation the highest
frequency part is then cosine transformed using the DCT
function. As a result of this pre-process the secret image of
size one by quarter of the cover image istakenanditwillsplit
to three parts, two orthogonal unitary non-negativematrixU
and V and a diagonal matrix . All these matrices having the
size same as the secret image. Discrete cosine
transformations are appliedtothedecomposedsecretimage.
Separatecosine transformations are done for the matricesU,
V and . Cosine transformed portion of the cover image and
the secrete image are of same class and dimensions.
Embeding secret image on the cover image is now easy
because the image parts belongs to same class. High
frequency part of the cover image is very less sensitive to the
human eye, so that portion is replaced with the transformed
secret image. All inverse transformations are applied to the
cover image to make it viewable and it is transmitted over a
distance. In decoding session, the highest frequency part of
the steganographicimageisseparatedusingDWTtreeandby
applying cosine transformation the secret image parts
filtered out. Inverse cosinetransformationsareappliedtothe
filtered value, which are in the format of Singular value
decomposed and the values are multiplied using the formula
and hence the secret image is reconstructed.
Fig -4: Proposed algorithm for Steganography
Fig -5: Proposed algorithm for Message Extraction
3. EXPERIMENTAL RESULTS
Cover1 Message1 Stegano img Recovered
Cover1=1024X1024
Message1=256X256
Correlation factor = 1.000
Cover1 Message2 Stegano img Recovered
Cover1=1024X1024
Message1=256X256
Correlation factor = 1.000
Cover2 Message3 Stegano img Recovered
Cover1=1024X1024
Message1=256X256
Correlation factor = 1.000
Cover1 Message1 Stegano img Recovered
Cover1=1024X1024
Message1=307X307
Correlation factor = 0.9991
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1123
Cover1 Message1 Stegano img Recovered
Cover1=1024X1024
Message1=205X205
Correlation factor = 0.9994
Table- 1: Correlation for different message length
Message length Correlation
307 0.9991
256 1.0000
205 0.9994
Table- 2: Comparison of average correlation of
Steganographic methods
Method Average Correlation
LSB 0.7723
DWS 0.8408
DCWS 0.9124
PVD-MDR 0.9753
DWT 0.9804
DE-DWT 0.9887
EI-XOR 0.8988
DWT-SVD 0.9990
DWT-DCT-SVD 0.9995
3. CONCLUSIONS
This paper describes a method of hybrid steganographic
scheme using the combination of DWT, DCT and SVD. The
secret image is hiding inside the cover image by replacing
the HH1, HL1, LH1 portions of the cover image decomposed
by DWT tree transform. By using this method, the generated
cover image having less distortion which is not identified by
the human eye because the minute changes in the high
frequency values are less identified by human eye. The
performance is evaluated in the terms of normalized
correlation coefficient. In this research work, different
images with different resolutions are used for experiment.
The important feature of this work is that the correlation
coefficient for the secret image which is exactly one quarter
of the cover image is 1.000. which indicates, at the time of
extraction the data’s of secret image is cent percent
recovered when the secret image is 1/4th in size with
respect to the cover image. In other cases, the correlation
factor is less than unity and it is closely related to unity. The
average value of correlation is also very closed to unity,
indicates the better quality of the decoded image.
REFERENCES
[1] Mashruha Raquib Mitashe, Ahnaf Rafid Bin Habib,
Anindita Razzaque, Ismat Ara Tanima, Jia Uddin “An
Adaptive Digital Image WatermarkingSchemewithPSO,
DWT and XFCM”, Department of Computer Science and
EngineeringBRACUniversityDhaka,Bangladesh(2017).
[2] Alexandru Isar1, Sorin Moga2, and Xavier Lurton3 “A
Statistical Analysis of the 2D Discrete Wavelet
Transform”
[3] Hadis Tarrah Qazvin, Iran Sattar Mirzakuchaki,”
Performance Evaluation Parameters of Image
Steganography Techniques”, “A secure steganography
scheme Efficient Steganography Scheme based on
Logistic Map and DWT-SVD”, Electrical Engineering
Dept. Science & Research branch, Iran University of
Science & Technology 2017
[4] Secure and imperceptible digital image steganographic
algorithm based on diamond encoding in DWT domain,
Springer Science+Business Media New York 2016.
[5] Samer Atawneh, Hussein Al Bazar & Ammar Almomani
& Putra Sumari & Brij Gupta’ “Secure and imperceptible
digital image steganographic algorithm based on
diamond encoding in DWT domain”, Received: 18 June
2016 / Revised: 5 August 2016 / Accepted:1September
2016.
[6] T.Morkel, J.H.P.Eloff, M.S.Oliver, “An overview of image
steganography”, ICSA Research group, Department of
Computer Science,UniversityofPretoria,0002,Pretoria,
South Africa 2006.
[7] Proceedings of the International Conference on Data
Engineering and Communication Technology ICDECT
2016, Volume 1, Advances in Intelligent Systems and
Computing Volume 468.
[8] Anita Pradhan, Aditya Kumar Sahu, Gandharba Swain
K. Raja Sekhar Department of Computer Science &
Engineering, K L University Vaddeswaram-522502,
Guntur, Andhra Pradesh, India (2016).
[9] 10. Sudha Rawat, Ajeet Kumar Verma “Survey paperon
image compression techniques”, M.tech Babasaheb
bhimrao ambedkar university Department ofComputer
Science, Babasaheb bhimrao university, Lucknow, U.P
2017, IRJET,Impact Factor value: 5.181
[10] Samer Atawneh Hussein Al Bazar& AmmarAlmomani&
Putra Sumari & Brij Gupta, “Secure and imperceptible
digital image steganographic algorithm based on
diamond encoding in DWT domain”, Springer
Science+Business Media New York 2016
[11] R. Shanthakumari and Dr.S. Malliga,” Video
Steganography usingLSBmatchingrevisitedalgorithm”,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1124
IOSR Journal of ComputerEngineering,Volume16,Issue
6, Ver. IV (Nov – Dec. 2014), PP 01-06
[12] Vijay Kumar&DineshKumarSpringerScience+Business
Media, LLC 2017 A modified DWT-based image
steganography technique.
[13] Vivek Kapoor and Akbar Mirza,“AnEnhancedLSBbased
Video Steganographic System for Secure and Efficient
Data Transmission”, International Journal of Computer
Applications (0975 – 8887) Volume 121 – No.10, July
2015
[14] Hemant Gupta and Dr. Setu Chaturvedi, ”video
steganography through LSB based hybrid approach”,
International Journal of Engineering Research and
Development, Volume 6, Issue 12 (May2013),PP.32-42
[15] Pooja Yadav, Nischol Mishra and Sanjeev Sarma, ”video
steganography technique with encryption and LSB
substitution”, 2013, School Of Information Technology,
Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal,
India.
[16] R. Rajkumar and S. Saira Banu. “Impulse Noise Removal
using Enhanced Leading Diagonal Sorting Algorithm”,
August 2016 Indian Journal of Science and Technology,
Vol 9(32).
Rajkumar R and Saira Banu. S, “Impulse Noise Removal
Using Improved Leading Diagonal Sorting Algorithm”,
2016 IEEE International Conference on Advances in
Computer Applications (ICACA).

More Related Content

What's hot (18)

PDF
Comparison and improvement of image compression
IAEME Publication
 
PDF
M017427985
IOSR Journals
 
PDF
Journal_IJABME
Sarun Maksuanpan
 
PDF
Image Compression Using Wavelet Packet Tree
IDES Editor
 
PDF
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
csandit
 
PDF
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
csandit
 
PDF
A comprehensive survey of contemporary
prjpublications
 
PDF
Lq2419491954
IJERA Editor
 
PDF
Design and implementation of image compression using set partitioning in hier...
eSAT Journals
 
PDF
Maximizing Strength of Digital Watermarks Using Fuzzy Logic
sipij
 
PDF
Improved anti-noise attack ability of image encryption algorithm using de-noi...
TELKOMNIKA JOURNAL
 
PDF
Reflectivity Parameter Extraction from RADAR Images Using Back Propagation Al...
IJECEIAES
 
PDF
DCT and Simulink Based Realtime Robust Image Watermarking
CSCJournals
 
PDF
Cecimg an ste cryptographic approach for data security in image
ijctet
 
PDF
A robust combination of dwt and chaotic function for image watermarking
ijctet
 
PDF
A new approach on noise estimation of images
eSAT Publishing House
 
PDF
Gadljicsct955398
editorgadl
 
Comparison and improvement of image compression
IAEME Publication
 
M017427985
IOSR Journals
 
Journal_IJABME
Sarun Maksuanpan
 
Image Compression Using Wavelet Packet Tree
IDES Editor
 
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
csandit
 
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
csandit
 
A comprehensive survey of contemporary
prjpublications
 
Lq2419491954
IJERA Editor
 
Design and implementation of image compression using set partitioning in hier...
eSAT Journals
 
Maximizing Strength of Digital Watermarks Using Fuzzy Logic
sipij
 
Improved anti-noise attack ability of image encryption algorithm using de-noi...
TELKOMNIKA JOURNAL
 
Reflectivity Parameter Extraction from RADAR Images Using Back Propagation Al...
IJECEIAES
 
DCT and Simulink Based Realtime Robust Image Watermarking
CSCJournals
 
Cecimg an ste cryptographic approach for data security in image
ijctet
 
A robust combination of dwt and chaotic function for image watermarking
ijctet
 
A new approach on noise estimation of images
eSAT Publishing House
 
Gadljicsct955398
editorgadl
 

Similar to IRJET- An Improved Technique for Hiding Secret Image on Colour Images using DWT, DCT, SVD (20)

PDF
Hybrid DCT-DWT Digital Image Steganography
IRJET Journal
 
PDF
IRJET - Steganography based on Discrete Wavelet Transform
IRJET Journal
 
PDF
ADAPTIVE CONTOURLET TRANSFORM AND WAVELET TRANSFORM BASED IMAGE STEGANOGRAPHY...
International Journal of Technical Research & Application
 
PDF
Digital image hiding algorithm for secret communication
eSAT Journals
 
PDF
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
ijcisjournal
 
PDF
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
ijcisjournal
 
PDF
Significant Data Hiding through Discrete Wavelet Transformation Approach
Eswar Publications
 
PDF
Iaetsd design of image steganography using haar dwt
Iaetsd Iaetsd
 
PDF
High PSNR Based Image Steganography
rahulmonikasharma
 
DOCX
Implementation of digital image watermarking techniques using dwt and dwt svd...
eSAT Journals
 
DOCX
Implementation of digital image watermarking techniques using dwt and dwt svd...
eSAT Journals
 
PDF
Hiding data in images using steganography techniques with compression algorithms
TELKOMNIKA JOURNAL
 
PDF
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
Editor IJMTER
 
PDF
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
ijmpict
 
PDF
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
ijmpict
 
PDF
Frequency Domain Approach of Image Steganography
AM Publications,India
 
PDF
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
CSCJournals
 
PDF
IJREAMV03I022640.pdf
ssusere02009
 
PDF
1918 1923
Editor IJARCET
 
PDF
1918 1923
Editor IJARCET
 
Hybrid DCT-DWT Digital Image Steganography
IRJET Journal
 
IRJET - Steganography based on Discrete Wavelet Transform
IRJET Journal
 
ADAPTIVE CONTOURLET TRANSFORM AND WAVELET TRANSFORM BASED IMAGE STEGANOGRAPHY...
International Journal of Technical Research & Application
 
Digital image hiding algorithm for secret communication
eSAT Journals
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
ijcisjournal
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
ijcisjournal
 
Significant Data Hiding through Discrete Wavelet Transformation Approach
Eswar Publications
 
Iaetsd design of image steganography using haar dwt
Iaetsd Iaetsd
 
High PSNR Based Image Steganography
rahulmonikasharma
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
eSAT Journals
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
eSAT Journals
 
Hiding data in images using steganography techniques with compression algorithms
TELKOMNIKA JOURNAL
 
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
Editor IJMTER
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
ijmpict
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
ijmpict
 
Frequency Domain Approach of Image Steganography
AM Publications,India
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
CSCJournals
 
IJREAMV03I022640.pdf
ssusere02009
 
1918 1923
Editor IJARCET
 
1918 1923
Editor IJARCET
 
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
PDF
Kiona – A Smart Society Automation Project
IRJET Journal
 
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
PDF
Breast Cancer Detection using Computer Vision
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Ad

Recently uploaded (20)

PPTX
Stability of IBR Dominated Grids - IEEE PEDG 2025 - short.pptx
ssuser307730
 
PDF
PRIZ Academy - Process functional modelling
PRIZ Guru
 
PDF
June 2025 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
DOCX
Engineering Geology Field Report to Malekhu .docx
justprashant567
 
PPTX
Work at Height training for workers .pptx
cecos12
 
PDF
CLIP_Internals_and_Architecture.pdf sdvsdv sdv
JoseLuisCahuanaRamos3
 
PDF
Bayesian Learning - Naive Bayes Algorithm
Sharmila Chidaravalli
 
PPTX
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
 
PPT
FINAL plumbing code for board exam passer
MattKristopherDiaz
 
PDF
Module - 5 Machine Learning-22ISE62.pdf
Dr. Shivashankar
 
PPTX
Explore USA’s Best Structural And Non Structural Steel Detailing
Silicon Engineering Consultants LLC
 
PPTX
ASBC application presentation template (ENG)_v3 (1).pptx
HassanMohammed730118
 
PPTX
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
 
PPT
SF 9_Unit 1.ppt software engineering ppt
AmarrKannthh
 
PDF
Decision support system in machine learning models for a face recognition-bas...
TELKOMNIKA JOURNAL
 
PPTX
Computer network Computer network Computer network Computer network
Shrikant317689
 
PPTX
Functions in Python Programming Language
BeulahS2
 
PPTX
CST413 KTU S7 CSE Machine Learning Neural Networks and Support Vector Machine...
resming1
 
PDF
LLC CM NCP1399 SIMPLIS MODEL MANUAL.PDF
ssuser1be9ce
 
PPTX
Precooling and Refrigerated storage.pptx
ThongamSunita
 
Stability of IBR Dominated Grids - IEEE PEDG 2025 - short.pptx
ssuser307730
 
PRIZ Academy - Process functional modelling
PRIZ Guru
 
June 2025 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
Engineering Geology Field Report to Malekhu .docx
justprashant567
 
Work at Height training for workers .pptx
cecos12
 
CLIP_Internals_and_Architecture.pdf sdvsdv sdv
JoseLuisCahuanaRamos3
 
Bayesian Learning - Naive Bayes Algorithm
Sharmila Chidaravalli
 
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
 
FINAL plumbing code for board exam passer
MattKristopherDiaz
 
Module - 5 Machine Learning-22ISE62.pdf
Dr. Shivashankar
 
Explore USA’s Best Structural And Non Structural Steel Detailing
Silicon Engineering Consultants LLC
 
ASBC application presentation template (ENG)_v3 (1).pptx
HassanMohammed730118
 
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
 
SF 9_Unit 1.ppt software engineering ppt
AmarrKannthh
 
Decision support system in machine learning models for a face recognition-bas...
TELKOMNIKA JOURNAL
 
Computer network Computer network Computer network Computer network
Shrikant317689
 
Functions in Python Programming Language
BeulahS2
 
CST413 KTU S7 CSE Machine Learning Neural Networks and Support Vector Machine...
resming1
 
LLC CM NCP1399 SIMPLIS MODEL MANUAL.PDF
ssuser1be9ce
 
Precooling and Refrigerated storage.pptx
ThongamSunita
 

IRJET- An Improved Technique for Hiding Secret Image on Colour Images using DWT, DCT, SVD

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1120 An Improved Technique for Hiding Secret Image on Colour Images Using DWT, DCT, SVD Amal Saroj1, Dr. S Saira Banu2 1 MPhil. Scholar, Department of Electronics and Communication Systems, Karpagam Academy of Higher Education 2Associate Professor, Department of Electronics and Communication Systems, Karpagam Academy of Higher Education ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Information secret strategies have recently become important in many cases. Digital audio, video and images are increasingly different, but they have specific references that may contain a late copyright notice or serial number otherwise it will be unauthorized copies. Content of Multimedia will have been attacked and unauthorized reproduction of digital multimedia data by the hackers. To detect and protect copyright ownership, digital reservoirs have been built to respond to the growing demand for intellectual property protection. In our work the digital steganography algorithm is a hybrid scheme based on a Discrete Wavelet Transform (DWT), Discrete Cosine Transformation and (DCT) Singular Value Decomposition (SVD). The cover image is Wavelet decomposed to two levels and cosine transformed by one level. The Singular Value Decomposed message image is then cosine transformed and embedded with the cover image by replacing the least prominent datas. Key Words: Discrete Wavelet Transformations (DWT), Discrete Cosine Transformations (DCT), Singular Value Decompositions (SVD), Human Visual System (HVS), Peake Signal to Noise Ratio (PSNR), Diamond Encoding and Discrete Wavelet Transform (DE-DWT), XieBeni integrated Fuzzy C-means clustering (XFCM), Particle Swarm Optimization (PSO). 1. INTRODUCTION Now a day’s the digital data transmission over the wired and wireless channels are facing the big problem due to the illegal access of the data. Dedicated communication channels for each communication is impossible all time. Shared media or wireless communication channels are preferred for communicating digital multimedia data like images and videos to reduce the cost of communication. There arises the legal problem of piracy and copyright. In this case, for achieving the secrecy and authenticity, several cyphering methods are adopted like secret keying, watermarking, and steganography etc. steganographic technology can be applied for image, voice, video data. Here we are illustrating an improved method for hiding an image within an image without losing the data’s and also explained the normalised correlation factor for the steganographic images with various resolution secret images. In order to achieve security several steganographicschemes are applied in different studies.Multipletransformations are getting most effective than a single transformation. Steganography is not cryptography, but for secret privacy, then multiply data encrypted by stenographer. Thegoal isto create an image in the same way as a human eye but if necessary it gives its constructive recognition than the owner's key. Transform-domain technologycombinescover image and secret images bycontrollingthesizeoftransform- domains like DWT and DCT. More information and vulnerabilities can be changed against common attacks- Modified domain modes, but the cost of these procedures is higher in the Transform-domain steganographic system. 1.1 HVS and DWT A powerful analogy thatleadstothewidelyusedtechnique – Human Visual System (HVS) images are Discrete Wavelet Transformations (DWT). Discrete Wavelet Transformations can be used as an effective version of Frequency models for HVS. DWT is a transformational strategy by interrupting the image at a new time and frequency band of Low frequency, medium and high frequency input image. The Filterselection depends on the type of signal analyzed. The following filters like Haar, Daubechies, Biorthogonal, Meyer, Morlet, Mexican Hat, Daubechies. Coiflets & Symlet can be used with Discrete Wavelet Transformation, Fig- 1: DWT Transformation 1.2 Two-dimensional DWT DWT method can be used for decomposition of input image to multi stage transform according to the frequency. For a two-dimensional image two-dimensional DWT transformation is used. The first level ofDWTiscomposedof approximately equivalent length coefficient in column wise, and the second is made of raw wise with a down sampling of two, the third group combines vertical wavelet s coefficient, and fourth has diagonal coefficient.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1121 Fig- 2: DWT Decomposition 1.2 DCT and SVD For Discrete Cosine Transformation the functions of the oscillation coefficient in various frequencies reveal a limited sequence of data points in total. Discrete Cosine Transformation works to highlight images within the areas of different frequencies. During the quantisation, the abstraction part is actually present lower mainstream frequencies, only the most important frequencies are preserved and retrieve to the original image. As a result, some of the reconstructed pictures have been distorted. When the compression level is adjusted,qualityofimagecan be adjusted. But the human eye can only identify if the distortion reaches to a certain level. P(x,y) is the x, yth element of the image represented by the matrix p. N represents the size of the block that the DCT is done. The equation calculates one entry (ith, jth) of the transformed image from pixel values of the original image matrix. For the standard 8X8 block the compression uses N=8 and x and y ranges from 0 t0 7. In the case of steganography DCT is very much helpful because the non- abstraction frequency region can be used for theinsertion of stegano data. Singular Value Decomposition is a method of changing variables basically a group that exposes different relationships on the original matrices. Also, we can say that, SVD is a method of detection. Sorting levels of the information points differ greatly. SVD identifies where most are variable and find it and optimal measurementofkeydata points using lower levels. So, SVD can be seen as a method for reducing data. According to Singular Value Decomposition, Let us consider an m x n matrix A converted to a factorised form where U will be a unitary matrix of the same size of A, is a rectangular diagonal matrix of same size. V is also having the size of A and it will be a unitary matrix. Here U (m n) and V (m n) are orthogonal matrices so that and where I is the identity matrix. 2. LITERATURE SURVEY The researchers incorporated various techniques for hiding secret image on a cover image. The most common technique for hiding data is the LSB substation algorithm which is a lossy steganographic technique. Another technologies like DWT, DCT, XCFM, SVDare applied forbetterqualityimage.In all algorithms the correlation between the secret image and the extracted images are tested with the normalized correlation factor for identifying the quality of the received image. Alexandru Isar1, et al [2] explained the statistical analysis of 2D DWT as well as 1D DWT in their probability density function and correlation factor for various datas. Samer Atawneh, et al [4][5] describedthediamondencoding algorithm for steganography and DWT technique is used for better security.PSNRvaluesareanalysedfordifferentimages in DE system nd DE-DWT system. T.Morkel, et al [6] explains the different steganographic techniques commonly used and the performance evaluation procedures for different schemes in their paper. Mashruha Raquib Mitashe, etal [1] XieBeni integrated Fuzzy C-means clustering (XFCM) technique is applied inthisresearchwork. Particle Swarm Optimization (PSO)isusedforprocessingthe images, before entering to the steganographic process. Discrete Wavelet Transform (DWT) is used for steganography. A correlationcoefficientof0.9934isachieved in this work. Hadis Tarrah, Qazvin, et al [3], a combination of DWT and SVD is used for steganography. A PSNR value of 45 and Correlation value of 0.59 is achieved inthispaper(PSNR > 30 gives high similarity). Anita Pradhan, et al [8], Sudha Rawat, et al [9], This paper deals with the image compression techniques and the comparison of different steganographic schemes and their performance evaluations. Samer Atawneh Hussein Al Bazar et al. [10] Illustrates the new hybrid steganographic schemeusingDiamondencoding and Discrete wavelet transform. The Distortion caused by DWT is eliminated by DE algorithm and it improves the security of the steganographic image. R. Shanthakumari and Dr.S. Malliga [11] proposed new method in LSB substation algorithm such that the substation of bits is with respect to the size of secret data. Preservation of smoother and sharp edges in the carrier data is maintained in this algorithm, hence, they get better qualityimage witha betterPSNRvalue up to 80. Vijay Kumar & Dinesh Kumar [12] reduces the complexity while extracting secret image and improved the
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1122 security of steganographic image by adding key in the improved DWT algorithm. The researcher obtained a PSNR value of 49.08 and Similarity ratio of about 0.9918. Vivek Kapoor et al [13], Hemant Gupta et al Chaturvedi [14], Pooja Yadav, et al [15] explains different LSB substation methods for embedding secret data on to the video frames and analysed the performance parameters PSNR andCorrelation factor. Rajkumar R and Saira Banu. S [16][17] explained in detail about the effect of noise in the quality of image and proposed an algorithm for removing noise. 3. PROPOSED ALGORITHM In this research steganography is achieved using a hybrid steganographic scheme by applying DWT, DCT,SVDoncover image as well as secret image. Fig- 3: DWT Tree algorithm The cover image is DWT transformed and we get the coefficients LL, LH, HL, HH. The higher frequency part is separated and again it will undergo the DWT transformations. Then we will get the coefficients LL1, LH1, HL1, HH1. After this second transformation the highest frequency part is then cosine transformed using the DCT function. As a result of this pre-process the secret image of size one by quarter of the cover image istakenanditwillsplit to three parts, two orthogonal unitary non-negativematrixU and V and a diagonal matrix . All these matrices having the size same as the secret image. Discrete cosine transformations are appliedtothedecomposedsecretimage. Separatecosine transformations are done for the matricesU, V and . Cosine transformed portion of the cover image and the secrete image are of same class and dimensions. Embeding secret image on the cover image is now easy because the image parts belongs to same class. High frequency part of the cover image is very less sensitive to the human eye, so that portion is replaced with the transformed secret image. All inverse transformations are applied to the cover image to make it viewable and it is transmitted over a distance. In decoding session, the highest frequency part of the steganographicimageisseparatedusingDWTtreeandby applying cosine transformation the secret image parts filtered out. Inverse cosinetransformationsareappliedtothe filtered value, which are in the format of Singular value decomposed and the values are multiplied using the formula and hence the secret image is reconstructed. Fig -4: Proposed algorithm for Steganography Fig -5: Proposed algorithm for Message Extraction 3. EXPERIMENTAL RESULTS Cover1 Message1 Stegano img Recovered Cover1=1024X1024 Message1=256X256 Correlation factor = 1.000 Cover1 Message2 Stegano img Recovered Cover1=1024X1024 Message1=256X256 Correlation factor = 1.000 Cover2 Message3 Stegano img Recovered Cover1=1024X1024 Message1=256X256 Correlation factor = 1.000 Cover1 Message1 Stegano img Recovered Cover1=1024X1024 Message1=307X307 Correlation factor = 0.9991
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1123 Cover1 Message1 Stegano img Recovered Cover1=1024X1024 Message1=205X205 Correlation factor = 0.9994 Table- 1: Correlation for different message length Message length Correlation 307 0.9991 256 1.0000 205 0.9994 Table- 2: Comparison of average correlation of Steganographic methods Method Average Correlation LSB 0.7723 DWS 0.8408 DCWS 0.9124 PVD-MDR 0.9753 DWT 0.9804 DE-DWT 0.9887 EI-XOR 0.8988 DWT-SVD 0.9990 DWT-DCT-SVD 0.9995 3. CONCLUSIONS This paper describes a method of hybrid steganographic scheme using the combination of DWT, DCT and SVD. The secret image is hiding inside the cover image by replacing the HH1, HL1, LH1 portions of the cover image decomposed by DWT tree transform. By using this method, the generated cover image having less distortion which is not identified by the human eye because the minute changes in the high frequency values are less identified by human eye. The performance is evaluated in the terms of normalized correlation coefficient. In this research work, different images with different resolutions are used for experiment. The important feature of this work is that the correlation coefficient for the secret image which is exactly one quarter of the cover image is 1.000. which indicates, at the time of extraction the data’s of secret image is cent percent recovered when the secret image is 1/4th in size with respect to the cover image. In other cases, the correlation factor is less than unity and it is closely related to unity. The average value of correlation is also very closed to unity, indicates the better quality of the decoded image. REFERENCES [1] Mashruha Raquib Mitashe, Ahnaf Rafid Bin Habib, Anindita Razzaque, Ismat Ara Tanima, Jia Uddin “An Adaptive Digital Image WatermarkingSchemewithPSO, DWT and XFCM”, Department of Computer Science and EngineeringBRACUniversityDhaka,Bangladesh(2017). [2] Alexandru Isar1, Sorin Moga2, and Xavier Lurton3 “A Statistical Analysis of the 2D Discrete Wavelet Transform” [3] Hadis Tarrah Qazvin, Iran Sattar Mirzakuchaki,” Performance Evaluation Parameters of Image Steganography Techniques”, “A secure steganography scheme Efficient Steganography Scheme based on Logistic Map and DWT-SVD”, Electrical Engineering Dept. Science & Research branch, Iran University of Science & Technology 2017 [4] Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain, Springer Science+Business Media New York 2016. [5] Samer Atawneh, Hussein Al Bazar & Ammar Almomani & Putra Sumari & Brij Gupta’ “Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain”, Received: 18 June 2016 / Revised: 5 August 2016 / Accepted:1September 2016. [6] T.Morkel, J.H.P.Eloff, M.S.Oliver, “An overview of image steganography”, ICSA Research group, Department of Computer Science,UniversityofPretoria,0002,Pretoria, South Africa 2006. [7] Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1, Advances in Intelligent Systems and Computing Volume 468. [8] Anita Pradhan, Aditya Kumar Sahu, Gandharba Swain K. Raja Sekhar Department of Computer Science & Engineering, K L University Vaddeswaram-522502, Guntur, Andhra Pradesh, India (2016). [9] 10. Sudha Rawat, Ajeet Kumar Verma “Survey paperon image compression techniques”, M.tech Babasaheb bhimrao ambedkar university Department ofComputer Science, Babasaheb bhimrao university, Lucknow, U.P 2017, IRJET,Impact Factor value: 5.181 [10] Samer Atawneh Hussein Al Bazar& AmmarAlmomani& Putra Sumari & Brij Gupta, “Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain”, Springer Science+Business Media New York 2016 [11] R. Shanthakumari and Dr.S. Malliga,” Video Steganography usingLSBmatchingrevisitedalgorithm”,
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1124 IOSR Journal of ComputerEngineering,Volume16,Issue 6, Ver. IV (Nov – Dec. 2014), PP 01-06 [12] Vijay Kumar&DineshKumarSpringerScience+Business Media, LLC 2017 A modified DWT-based image steganography technique. [13] Vivek Kapoor and Akbar Mirza,“AnEnhancedLSBbased Video Steganographic System for Secure and Efficient Data Transmission”, International Journal of Computer Applications (0975 – 8887) Volume 121 – No.10, July 2015 [14] Hemant Gupta and Dr. Setu Chaturvedi, ”video steganography through LSB based hybrid approach”, International Journal of Engineering Research and Development, Volume 6, Issue 12 (May2013),PP.32-42 [15] Pooja Yadav, Nischol Mishra and Sanjeev Sarma, ”video steganography technique with encryption and LSB substitution”, 2013, School Of Information Technology, Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal, India. [16] R. Rajkumar and S. Saira Banu. “Impulse Noise Removal using Enhanced Leading Diagonal Sorting Algorithm”, August 2016 Indian Journal of Science and Technology, Vol 9(32). Rajkumar R and Saira Banu. S, “Impulse Noise Removal Using Improved Leading Diagonal Sorting Algorithm”, 2016 IEEE International Conference on Advances in Computer Applications (ICACA).