Abstract
The assurance of secret data transmitted over the Internet and confining its access to explicit grouped information has become a significant security and protection issue. To hide the presence of such information, a robust and blind color image steganography algorithm, using fractal cover images, Singular Value Decomposition (SVD), Integer Wavelet Transform (IWT), and Discrete Wavelet Transform (DWT) is proposed in this paper. The proposed algorithm conceals the color secret image intelligently inside a fractal cover image thus creating a unique stego-image that is virtually a replica of the original cover image. The novelty of this proposed blind image hiding method lies in the fact that a small file size of a unique fractal image can be used to conceal a large amount of information payload. The fractal cover images can be implemented without debasing its quality to make the shrouded information sufficiently strong against image processing attacks. The algorithm possesses features like robustness, imperceptibility, security, and greater hiding capacity due to the application of fractal compression, DWT-SVD, and IWT-SVD hybrid transform schemes. The secret image is inserted in U and V components of the fractal cover with a scaling factor based on the HVS model and a stego-image with sufficiently large keyspace is created. Furthermore, the proposed work compares the performance analysis and security offered by IWT- SVD and DWT- SVD hybrid combinations for different fractal covers using certain metrics like PSNR (Peak Signal to Noise Ratio), MSE (Mean Square Error), SSIM (Structural Similarity Index), BRISQUE (Blind/ Reference less Image Spatial Quality Evaluator) score and Bits per pixel (BPP). The results prove that image degradation is very less (less than 0.6%) in the proposed algorithm even when the secret image file size is more than double the file size of the fractal cover image which also saves the bandwidth and storage requirements.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Journal of King Saud University - Computer and Information Sciences
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.