A New Data Hiding Scheme Using Laplace Transformation in Frequency Domain Steganography

A New Data Hiding Scheme Using Laplace Transformation in Frequency Domain Steganography

Ayan Chatterjee, Nikhilesh Barik
DOI: 10.4018/IJHIoT.2020010101
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Today, in the age of wireless communication, network security is an important issue. Image steganography is a popular approach to make communication secure. Among two categories (spatial domain and frequency domain) of image steganography, frequency domain is more secured than the spatial domain. The proposed scheme develops a secret communication technique in frequency domain steganography. In steganography, the concept of Laplace transformation is used during embedding and extraction procedures of secret information in image files. As a result, all the conditions of information security are developed in high density. The efficiency and effectiveness of the scheme is evaluated by measuring the hacking chance from different statistical attacks by RS steganalysis and originality of actual cover image after inserting secret information by Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR).
Article Preview
Top

1. Introduction

Information security during wireless communication is an important requirement in now a day (Singla & Syal, 2012). Basically, information security is the protection of unauthorized access of information during communication. So, there should be some criterion(s) at the time of transaction of information (Singla & Syal, 2012; Khamrui & Mandal, 2013). The basic principles of information security are confidentiality, integrity and availability of information among authenticated users, i.e. among authenticated sender and receiver(s) (Khamrui & Mandal, 2013; Lin, 2014). From very beginning of wireless communication, different approaches of information security are gradually developed in different ways and in different decades. Also, it is the fact that different breaking strategies are developed gradually from the opposite point of view. Cryptography is one of the most basic approaches of information security. In the architecture of cryptography, the actual text message is converted to another text using some proper logic and secret key(s) (Lin, 2014; Wang et al., 2010). This changed text is sent through the insecure channel and using the corresponding logic and secret key(s), the information is retrieved by receiver. As a result, unauthenticated user can’t realize the meaning of actual text message. But the drawback of this approach is the existence of communication can be realized by unauthorized user (Nosrati & Karimi, 2012; Walia & Jain, 2010; Mishra & Bali, 2013). To reduce this problem, a new approach (Mazdak et al., 2009; Mehndiratta, 2015) steganography is developed. It is called also data hiding approach. In that approach, information is hidden in a cover medium, such as- image, audio/video etc. with minimum distortion of it. This embedded cover file is sent to the receiver side and receiver will extract that information using corresponding procedure and predefined secret keys. The beneficial side of this approach is unauthorized user can’t realize the existence of communication through insecure channel (Mihir, 2012; Gokul et al., 2012). The steganography approaches are divided in two major categories according to the nature of domain of cover medium (Nehru & Dhar, 2012). These are spatial domain steganography and frequency domain steganography. In spatial domain, pixels of cover medium are used directly for embedding secret data. The opportunity of spatial domain is that it is easy to implement. Also, in this scheme, quality of stego image is high due to less distortion of actual cover image. But it is less secured, because it can be easily accessed by unauthorized users. To shrink this problem, frequency domain steganography approach is developed. The architecture of frequency domain steganography is that at first domain of actual cover medium is converted to another domain using a particular transformation, such as- Discrete Cosine Transformation (DCT), Discrete Wavelet Transformation (DWT), Discrete Fourier Transformation (DFT), etc. (Singla & Syal, 2012; Wang et al., 2010; Diwesh et al., 2015). Secret data is inserted in the transformed domain. Then the changed domain is transformed inversely and that is taken as a stego image. In this paper, a new steganography approach in frequency domain is developed using Laplace transformation of exponential form. In Section 2, some related works are analyzed and efficiencies of those techniques are discussed. In Section 3, the algorithm of the proposed scheme is given followed by a proper elaborated discussion of the scheme. In Section 4, some experimental results are shown by evaluation of some proper parameters. At last, conclusion with future scope of the proposed scheme is drawn in Section 5.

Complete Article List

Search this Journal:
Reset
Volume 8: 1 Issue (2024)
Volume 7: 1 Issue (2023)
Volume 6: 2 Issues (2022): 1 Released, 1 Forthcoming
Volume 5: 2 Issues (2021)
Volume 4: 2 Issues (2020)
Volume 3: 2 Issues (2019)
Volume 2: 2 Issues (2018)
Volume 1: 2 Issues (2017)
View Complete Journal Contents Listing