Open Access Open Access  Restricted Access Subscription Access

Text Data Hiding and Extraction of Image using Discrete Wavelet Transform

Shashank Gupta, Rachit Jain

Abstract


Now a days with the wide use of multimedia is increasing to a large extent, the visual information that contains the high quality and low complexity digital images plays a very vital role in daily life applications such as satellite television, magnetic resonance imaging, computed tomography, geographical information systems and astronomy and many other areas. Main purpose of this paper is to investigate or develop new concepts to design digital image security system with good capacity and minimum a limited distortion in image quality. We investigate to develop the system that can accept all kinds of images that is grayscale images with the minimum complexity and highest PSNR (Peak Signal to Noise Ratio) value.

Keywords: Multimedia, digital images, digital image security, steganography, grayscale images, PSNR

Cite this Article
Shashank Gupta, Rachit Jain. Text Data Hiding and Extraction of Image using Discrete Wavelet Transform. Journal of Multimedia Technology & Recent Advancements. 2015; 2(3): 1–6p.


Full Text:

PDF

References


Wawryn K, Wirski R, Suszynski R. 2D Image Processing for Auto-Guiding System. IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS). 2011; 1–4p.

Khan SA, Nazir M, Akram S, et al. Gender Classification using Image Processing Techniques: A Survey. IEEE 14th International Multi Topic Conference. 2011; 25–30p.

Akshmi JK, Punithavalli M. A Survey on Skeletons in Digital Image Processing. IEEE International Conference on Digital Image Processing. 2009; 260–269p.

Yan Haixia, He Xin, Wei Zhonghui Liu Yanjun. A Digital Image Processing System Based on DSP. IEEE International Conference on Information Engineering and Computer Science (ICIECS). 2010; 1–4p.

Alam FI, Islam MM. An Investigation into Image Hiding Steganography with Digital Signature Framework. IEEE International Conference on Informatics, Electronics & Vision (ICIEV). 2013; 1–6p.

Altaay AAJ, Sahib S, Zamani M. An Introduction to Image Steganography Techniques. International Conference on Techniques Advance Computer Science Applications and Technologies (ACSAT). 2012; 122–126p.

Mehdi Hussain, Mureed Hussain. A Survey of Image Steganography Technique. International Journal of Advanced Science and Technology. 2013; 54: 113–124p.

Vladimir Banoci, Gabriel Bugar, Dusan Levicky. A Novel Method of Image Steganography in DWT Domain. IEEE International Conference on Radioelektronika. 2011; 1–4p.

Shaveta Mahajan, Arpinder Singh. A Review of Methods and Approach for Secure Stegnography. International Journal of Advanced Research in Computer Science and Software Engineering. 2012; 2(10): 67–70p.

Maninder Singh Rana, Bhupender Singh Sangwan, Jitendra Singh Jangir. Art of Hiding: An Introduction to Steganography. International Journal of Engineering and Computer Science. 2012; 1(1): 11–22p.

Sajasi S, Eftekhari-Moghadam AM. A High Quality Image Hiding Scheme based Upon Noise Visibility Function and an Optimal Chaotic Based Encryption Method. IEEE Conference of AI & Robotics and 5th Robo Cup Iran Open International Symposium (RIOS). 2013; 1–7p.

Xu Hongsheng, Jun Lie Xu. An Efficient Image Encryption and Hiding Method Applied by Double Random Phase Encoding. IEEE Fifth International Conference on Computational and Information Science (ICCIS). 2013; 302–305p.

Xikai Xu, Jing Dong, Wei Wang, Tieniu Tan. Video Stega-Analysis Based on the Constraints of Motion Vectors. IEEE 20th International Conference on Image Processing (ICIP). 2013; 4422–4426p.

Kanwar A, Upadhyay P. An Appearance Based Approach for Gait Identification Using Infrared Imaging. IEEE International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT). 2014; 719–724p.

Kumar H, Srivastava A. A Secret Sharing Scheme for Secure Transmission of Colour Images. IEEE International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT). 2014; 857–860p.

Baykara M, Das R. A Steganography Application for Secure Data Communication. International Conference on Electronics, Computer and Computation (ICECCO). 2013; 309–313p.

Beenish Mehboob, Rashid Aziz Faruqui. A Stegnography Implementation. International Symposium on Biometrics and Security Technologies ISBAST. 2008; 1–5p.

Uday Kanth KP, Vidyasagar D. An Efficient Implimentation of LSB Sreganography using DWT Technique. IRF International Conference. 2014.

Masud Kairm SM, Rahman MS, Hossain MI. A New Approach for LSB based Image Steganography using Secret Key. IEEE 14th International Conference on Computer and Information Technology (ICCIT). 2011; 286–291p.

Sumeet Kaur, Savina Bansal, Bansal RK. Steganography and Classification of Image Steganography Techniques. International Conference on Computing for Sustainable Global Development (INDIACom). 2014; 870–875p.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/