Abstract

In recent years information hiding has got much attention as it acts as an alternate option for secured communication. The Secret content would get imbedded with the image using various possible image embodiment techniques, in which the Least Significant Bit (LSB) substitution is one of the preferred content embodiment strategy; however, asserting the quality and the originality of the content embedded image (stego) is yet a grievous concern in the field of Information Security. In this article, a proficient Scrambling Based Haar Wavelet Transform (SBHWT) approach has been sought to ensure the novelty of the stego-image that supports the safe transfer of data over the channel. In this process, the image is scrambled using a Sudoku pattern, and then streams of the secret content are embedded into the image blocks based on the proposals of the Bishop Traversal logic of chess. The content embodiment is attempted using normal LSB substitution and DNA pattern based substitution. Next, the image is descrambled to recover the original image, which is then subjected to Haar wavelet transformation for image resolution reduction. The resultant reduced image is channelized to the recipient and the inverse action of the SBHWT is made in order to get back the secret code stream. The experimental results demonstrate that the projected SBHWT approach is less predictable and exclusive in its pattern.

Highlights

  • The fortification of private content has become a primary concern in the field of information security as a result of recent developments in digital communication

  • The sudoku pattern is applied to the image blocks and as a result, a scrambled image is created, in which the secret code stream is embedded by following the Bishop Tour traversal scheme, as illustrated in Fig. 3, which locates the pels over the image

  • 6 Conclusion The projected Scrambling Based Haar Wavelet Transform (SBHWT) approach offers an efficient scheme for pels identification in an image for content embedding and its extraction process

Read more

Summary

Introduction

The fortification of private content has become a primary concern in the field of information security as a result of recent developments in digital communication. Random and raster scan schemes are to be utilized in the LSB based content embedding procedure to hide the secret code in the pixels of the image. Yang et al present a LSB substitution strategy that uses a raster scan method to improve stego-images This practice involves processing the secret code before the content is embedded. By following the pattern of Queen positioning in an 8 × 8 chessboard, Manikandan et al [29] present another LSB with Queen tour based embedding scheme In this proposed paper, the authors propose and demonstrate a novel method for image scrambling and wavelet transformation, as well as a Bishop tour practice based on chess game for embedding content. A subset of ‘M’ × ‘M’ matrices of Sudoku puzzle are perimetrically generated [34]

Steganography with Wavelet
The Characteristics of Haar Wavelet
Proposed System
Fashions Behind the Substitution
Algorithm
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call