Dual images in reversible data hiding with adaptive color space variation using wavelet transforms

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
K. Upendra Raju ◽  
N. Amutha Prabha

PurposeSteganography is a data hiding technique used in the data security. while transmission of data through channel, no guarantee that the data is transmitted safely or not. Variety of data security techniques exists such as patch work, low bit rate data hiding, lossy compression etc. This paper aims to increase the security and robustness.Design/methodology/approachThis paper describes, an approach for multiple images steganography that is oriented on the combination of lifting wavelet transform (LWT) and discrete cosine transform (DCT). Here, we have one cover image and two secret images. The cover image is applied with one of the different noises like Gaussian, Salt & Pepper, Poisson, and speckle noises and converted into different color spaces of YCbCr, HSV, and Lab.FindingsDue to the vast development of Internet access and multimedia technology, it becomes very simple to hack and trace secret information. Using this steganography process in reversible data hiding (RDH) helps to prevent secret information.Originality/valueWe can divide the color space converted image into four sub-bands of images by using lifting wavelet transform. By selecting lower bands, the discrete cosine transform is computed for hiding two secret images into the cover image and again one of the transformed secret images is converted by using Arnold transform to get the encrypted/embedded/encoded image. To extract the Stego image, we can apply the revertible operation. For comparing the results, we can calculate PSNR, SSIM, and MSE values by applying the same process for all color spaces of YCbCr, HSV, and Lab. The experimental results give better performance when compared to all other spaces.

Author(s):  
Rahul Dixit ◽  
Amita Nandal ◽  
Arvind Dhaka ◽  
Vardan Agarwal ◽  
Yohan Varghese

Background: Nowadays information security is one of the biggest issues of social networks. The multimedia data can be tampered with, and the attackers can then claim its ownership. Image watermarking is a technique that is used for copyright protection and authentication of multimedia. Objective: We aim to create a new and more robust image watermarking technique to prevent illegal copying, editing and distribution of media. Method : The watermarking technique proposed in this paper is non-blind and employs Lifting Wavelet Transform on the cover image to decompose the image into four coefficient matrices. Then Discrete Cosine Transform is applied which separates a selected coefficient matrix into different frequencies and later Singular Value Decomposition is applied. Singular Value Decomposition is also applied to the watermarking image and it is added to the singular matrix of the cover image which is then normalized followed by the inverse Singular Value Decomposition, inverse Discrete Cosine Transform and inverse Lifting Wavelet Transform respectively to obtain an embedded image. Normalization is proposed as an alternative to the traditional scaling factor. Results: Our technique is tested against attacks like rotation, resizing, cropping, noise addition and filtering. The performance comparison is evaluated based on Peak Signal to Noise Ratio, Structural Similarity Index Measure, and Normalized Cross-Correlation. Conclusion: The experimental results prove that the proposed method performs better than other state-of-the-art techniques and can be used to protect multimedia ownership.


2015 ◽  
Vol 10 (11) ◽  
pp. 1127
Author(s):  
Nidaa Hasan Abbas ◽  
Sharifah Mumtazah Syed Ahmad ◽  
Wan Azizun Wan Adnan ◽  
Abed Rahman Bin Ramli ◽  
Sajida Parveen

Author(s):  
Mourad Talbi ◽  
Med Salim Bouhlel

Background: In this paper, we propose a secure image watermarking technique which is applied to grayscale and color images. It consists in applying the SVD (Singular Value Decomposition) in the Lifting Wavelet Transform domain for embedding a speech image (the watermark) into the host image. Methods: It also uses signature in the embedding and extraction steps. Its performance is justified by the computation of PSNR (Pick Signal to Noise Ratio), SSIM (Structural Similarity), SNR (Signal to Noise Ratio), SegSNR (Segmental SNR) and PESQ (Perceptual Evaluation Speech Quality). Results: The PSNR and SSIM are used for evaluating the perceptual quality of the watermarked image compared to the original image. The SNR, SegSNR and PESQ are used for evaluating the perceptual quality of the reconstructed or extracted speech signal compared to the original speech signal. Conclusion: The Results obtained from computation of PSNR, SSIM, SNR, SegSNR and PESQ show the performance of the proposed technique.


Sign in / Sign up

Export Citation Format

Share Document