Wavelet transform based steganography technique to hide audio signals in image

被引:33
|
作者
Hemalatha, S. [1 ]
Acharya, U. Dinesh [1 ]
Renuka, A. [1 ]
机构
[1] Manipal Univ, Dept Comp Sci & Engn, Manipal Inst Technol, Manipal 576104, Karnataka, India
关键词
Information security; Steganography; Wavelet transform; PSNR; SSIM; UIQI; SNR; SPCC;
D O I
10.1016/j.procs.2015.03.207
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security is one of the most important factors to be considered when secret information has to be communicated between two parties. Cryptography and steganography are the two techniques used for this purpose. Cryptography scrambles the information, but it reveals the existence of the information. Steganography hides the actual existence of the information so that anyone else other than the sender and the recipient cannot recognize the transmission. In steganography the secret information to be communicated is hidden in some other carrier in such a way that the secret information is invisible. In this paper an image steganography technique is proposed to hide audio signal in image in the transform domain using wavelet transform. The audio signal in any format (MP3 or WAV or any other type) is encrypted and carried by the image without revealing the existence to anybody. When the secret information is hidden in the carrier the result is the stego signal. In this work, the results show good quality stego signal and the stego signal is analyzed for different attacks. It is found that the technique is robust and it can withstand the attacks. The quality of the stego image is measured by Peak Signal to Noise Ratio (PSNR), Structural Similarity Index Metric (SSIM), Universal Image Quality Index (UIQI). The quality of extracted secret audio signal is measured by Signal to Noise Ratio (SNR), Squared Pearson Correlation Coefficient (SPCC). The results show good values for these metrics. (C) 2015 The Authors. Published by Elsevier B.V.
引用
收藏
页码:272 / 281
页数:10
相关论文
共 50 条
  • [1] Audio-to-image wavelet transform based audio steganography
    Santosa, RA
    Bao, P
    [J]. PROCEEDINGS ELMAR-2005, 2005, : 209 - 212
  • [2] An Efficient Audio Steganography Technique to Hide Text in Audio
    Rajput, Shital P.
    Adhiya, Krishnakant P.
    Patnaik, Girish K.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [3] A Modified High Capacity Image Steganography Technique Based on Wavelet Transform
    Al-Ataby, Ali
    Al-Naima, Fawzi
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2010, 7 (04) : 358 - 364
  • [4] Robust Image Steganography Technique Based on Redundant Discrete Wavelet Transform
    Singh, Siddharth
    Siddiqui, Tanveer J.
    [J]. 2012 2ND INTERNATIONAL CONFERENCE ON POWER, CONTROL AND EMBEDDED SYSTEMS (ICPCES 2012), 2012,
  • [5] A Steganography Technique for Images Based on Wavelet Transform
    Alharbi, Ayidh
    Kechadi, M-Tahar
    [J]. FUTURE DATA AND SECURITY ENGINEERING, 2017, 10646 : 273 - 281
  • [6] Adaptive Digital Audio Steganography Based on Integer Wavelet Transform
    Ahmad Delforouzi
    Mohammad Pooyan
    [J]. Circuits, Systems & Signal Processing, 2008, 27 : 247 - 259
  • [7] Adaptive digital audio steganography based on integer wavelet transform
    Delforouzi, Ahmad
    Pooyan, Mohammad
    [J]. CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2008, 27 (02) : 247 - 259
  • [8] New adaptive capacity of audio steganography based on the wavelet transform
    Pan, Feng
    Shen, Jun-wei
    Zhang, Yao
    [J]. INFORMATION TECHNOLOGY, 2015, : 257 - 261
  • [9] Adaptive digital audio steganography based on integer wavelet transform
    Delforouzi, Ahmad
    Pooyan, Mohanunad
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 283 - 286
  • [10] A Secure Image Steganography Technique Using Integer Wavelet Transform
    Hemalatha, S.
    Renuka, A.
    Acharya, U. Dinesh
    Kamath, Priya R.
    [J]. PROCEEDINGS OF THE 2012 WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2012, : 755 - 758