Image steganography using contourlet transform and matrix decomposition techniques

被引:0
|
作者
Mansi S. Subhedar
Vijay H. Mankar
机构
[1] Pillai HOC College of Engineering and Technology,
[2] Government Polytechnic,undefined
来源
关键词
Image steganography; Contourlet transform; Singular value decomposition; QR factorisation; Non-negative matrix factorisation; Universal steganalysis;
D O I
暂无
中图分类号
学科分类号
摘要
This paper presents the transform domain image steganography schemes using three popular matrix factorization techniques and contourlet transform. It is known that security of image steganography is mainly evaluated using undetectability of stego image when steganalyzer examines it in order to detect the presence of hidden secret information. Good imperceptibility only suggests eavesdropper’s inability to suspect about the hidden information; however stego image may be analyzed by applying certain statistical checks when it is being transmit- ted through the channel. This work focusses on improving undetectability by employing ma- trix decomposition techniques along with transform domain image steganography. Singular value decomposition (SVD), QR factorization, Nonnegative matrix factorization (NMF) are employed to decompose contourlet coefficients of cover image and secret is embedded into its matrix factorized coefficients. The variety of investigations include the effect of matrix decomposition techniques on major attributes of image steganography like imperceptibility, robustness to a variety of image processing operations, and universal steganalysis perfor- mance. Better imperceptibility, large capacity, and poor detection accuracy compared to existing work validate the efficacy of the proposed image steganography algorithm. Compa- rative analysis amongst three matrix factorization methods is also presented and analyzed.
引用
收藏
页码:22155 / 22181
页数:26
相关论文
共 50 条
  • [1] Image steganography using contourlet transform and matrix decomposition techniques
    Subhedar, Mansi S.
    Mankar, Vijay H.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (15) : 22155 - 22181
  • [2] Adaptive image steganography using contourlet transform
    Fakhredanesh, Mohammad
    Rahmati, Mohammad
    Safabakhsh, Reza
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2013, 22 (04)
  • [3] Human visual system based color image steganography using the contourlet transform
    Abdul, W.
    Carre, P.
    Gaborit, P.
    [J]. MEDIA FORENSICS AND SECURITY II, 2010, 7541
  • [4] Contourlet Transform based Image Watermarking using QR Decomposition
    Mitra, Priyanka
    Gunjan, Reena
    Gaur, M. S.
    [J]. INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEM DESIGN, 2013, 8760
  • [5] Effective payload and improved security using HMT Contourlet transform in medical image steganography
    S. Jeevitha
    N. Amutha Prabha
    [J]. Health and Technology, 2020, 10 : 217 - 229
  • [6] Effective payload and improved security using HMT Contourlet transform in medical image steganography
    Jeevitha, S.
    Prabha, N. Amutha
    [J]. HEALTH AND TECHNOLOGY, 2020, 10 (01) : 217 - 229
  • [7] Using contourlet transform and cover selection for secure steganography
    Sajedi, Hedieh
    Jamzad, Mansour
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (05) : 337 - 352
  • [8] Using contourlet transform and cover selection for secure steganography
    Hedieh Sajedi
    Mansour Jamzad
    [J]. International Journal of Information Security, 2010, 9 : 337 - 352
  • [9] Performance Evaluation of Image Steganography based on Cover Selection and Contourlet Transform
    Subhedar, Mansi S.
    Mankar, Vijay H.
    [J]. 2013 INTERNATIONAL CONFERENCE ON CLOUD & UBIQUITOUS COMPUTING & EMERGING TECHNOLOGIES (CUBE 2013), 2013, : 172 - +
  • [10] Optimized support vector neural network and contourlet transform for image steganography
    V. K. Reshma
    R. S. Vinod Kumar
    D. Shahi
    M. B. Shyjith
    [J]. Evolutionary Intelligence, 2022, 15 : 1295 - 1311