Secured image steganography based on Catalan transform

被引:1
|
作者
Mukhopadhyay, Souradeep [1 ]
Hossain, Sabbir [1 ]
Ghosal, Sudipta Kr [2 ]
Sarkar, Ram [1 ]
机构
[1] Jadavpur Univ, Dept Comp Sci & Engn, Kolkata 700032, India
[2] Nalhati Govt Polytech, Dept Comp Sci & Technol, Birbhum 731243, W Bengal, India
关键词
Catalan transform; Inverse Catalan transform; Steganography; PSNR; Payload; WAVELET TRANSFORM;
D O I
10.1007/s11042-020-10424-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Transform domain steganography methods are always preferable than spatial domain methods to the research community due to following advantages: better feature identification, improved security and higher robustness. In this paper, an integer sequence named Catalan Transform (CT) has been exploited in the image steganography domain. At the outset, the cover image is decomposed into 2 x 2 non-overlapping blocks in row major order. Then, each such block i.e., 4-pixel group is converted into transform domain using CT. Secret bits are embedded into the transformed components in varying proportions which facilitates us to achieve a payload in the range of 1 to 4 bpp. Inverse Catalan Transform (ICT) is applied over transformed cum embedded quadruples to generate the stego-pixels in spatial domain. Successive embedding operation over an entire image ensures the formation of stego-image. Experimental results confirm that the Peak Signal to Noise Ratio (PSNR) values obtained by the proposed method are always above the acceptable level (i.e., 30 dB) and at the same time, it outperforms many state-of-the-art methods. Other metrics such as Mean Squared Error (MSE), Structural Similarity Index Measure (SSIM), Normalized Cross Correlation (NCC) and Global histograms with similarity measure have also been computed which prove the effectiveness of the proposed scheme. The robustness of the stego-images has further been tested using the StegExpose tool and it is found that the tool is unable to detect the presence of secret data. The code of this work is available at: https://github.com/Souradeep150/Catalan-based-Steganography.
引用
收藏
页码:14495 / 14520
页数:26
相关论文
共 50 条
  • [1] Secured image steganography based on Catalan transform
    Souradeep Mukhopadhyay
    Sabbir Hossain
    Sudipta Kr Ghosal
    Ram Sarkar
    [J]. Multimedia Tools and Applications, 2021, 80 : 14495 - 14520
  • [2] A secured image steganography method based on ballot transform and genetic algorithm
    Sabbir Hossain
    Souradeep Mukhopadhyay
    Biswarup Ray
    Sudipta Kr Ghosal
    Ram Sarkar
    [J]. Multimedia Tools and Applications, 2022, 81 : 38429 - 38458
  • [3] A secured image steganography method based on ballot transform and genetic algorithm
    Hossain, Sabbir
    Mukhopadhyay, Souradeep
    Ray, Biswarup
    Ghosal, Sudipta Kr
    Sarkar, Ram
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (27) : 38429 - 38458
  • [4] Secured Image transmission with GA based Audio Steganography
    Bhowal, Krishna
    Sarkar, D.
    Biswas, S.
    Sarkar, P. P.
    [J]. 2011 ANNUAL IEEE INDIA CONFERENCE (INDICON-2011): ENGINEERING SUSTAINABLE SOLUTIONS, 2011,
  • [5] Performance analysis of image steganography using wavelet transform for safe and secured transaction
    Guru Vimal Kumar Murugan
    Ragupathy Uthandipalayam Subramaniyam
    [J]. Multimedia Tools and Applications, 2020, 79 : 9101 - 9115
  • [6] Performance analysis of image steganography using wavelet transform for safe and secured transaction
    Murugan, Guru Vimal Kumar
    Subramaniyam, Ragupathy Uthandipalayam
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (13-14) : 9101 - 9115
  • [7] Gabor Transform based Image Steganography
    Mythreyi, S.
    Vaidehi, V.
    [J]. IETE JOURNAL OF RESEARCH, 2007, 53 (02) : 103 - 112
  • [8] Cover Image Selection Technique for Secured LSB-based Image Steganography
    Molato, Mark Rennel D.
    Gerardo, Bobby D.
    [J]. 2018 INTERNATIONAL CONFERENCE ON ALGORITHMS, COMPUTING AND ARTIFICIAL INTELLIGENCE (ACAI 2018), 2018,
  • [9] Steganography using wavelet transform for secured data transmission
    Srinivasu L.N.
    Veeramani V.
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (07) : 9509 - 9527
  • [10] Image Segmentaion and Steganography for Secured Information Transmission
    Juneja, Mamta
    Sandhu, Parvinder Singh
    [J]. INFORMATION PROCESSING AND MANAGEMENT, 2010, 70 : 617 - 620