Performance Analysis of Image Steganography Using Discrete Wavelet Packet Transform and Beta Blending For Highly Secured Communication
Performance Analysis of Image Steganography Using Discrete Wavelet Packet Transform and Beta Blending For Highly Secured Communication
Abstract
Secured transmission of information over the unreliable wireless channel is a profound research work in the
field of wireless communication. In spite of the availability of various algorithms and their implementations,
yet there is a need for improved methods of transfer of information. Steganography is one such technique
through which secured data transfer is made possible. By hiding the highly sensitive information in
embedding inside the cover image, using image steganography information sharing is authenticated. In this
work, the cover image is decomposed and proper sub image is chosen using discrete wavelet packet
transform and the sensitive information is hidden at the transmitter section. The wireless channel behavior is
mimicked by introducing noises and the detection and recovery of the hidden information at the receiver is
carried out. The performance is analyzed with standard metrics like Mean Square Error (MSE) and Peak
Signal to Noise Ratio (PSNR). The PSNR achieved is 92.5% which is sufficient enough for image
steganography techniques. By incorporating transform based techniques other than DWT, the performance
could be improved.
1. Introduction
Steganography, which is defined as covered writing, is derived from the Greek word steganos, where
stego stands for cover and grafia for writing. The right information must be communicated at the appropriate
time and exclusively to the intended audience. Information is a valuable asset that has to be protected from
theft and alteration. The sharing and preservation of personal information is made difficult by the constantly
changing danger environment, which is supported by effective attack vectors. The amount of security
vulnerabilities is growing, and handling this sensitive information by illiterate or ignorant handlers can be
challenging. Steganography is utilized to hide sensitive information by embedding it in a Cover Image (CI)
in order to secure authentic information. While information is being transmitted via the internet.
Steganography is a way of safeguarding hidden information in carriers like a video, audio, digitalimage, or t
ext that is used to protect online privacy. Image steganography, or the incorporation ofsensitive information
into the CI through pixel value changes, creates a stego-image.
A. Contribution: Beta blending based image steganography using WPT is proposed in this work.
B. Organization: Section 2 describes existing systems; Section 3 details the proposed method. Sections 4
explain results and section 5 provides conclusion and future scope.
2. Existing Systems
Aya Jaradat et al. [1] suggested an optimization based on Particle Swarm Optimization as a method
for locating the ideal pixel location in the cover image to mask the payload image. An improved version of
the Least Significant Bit (LSB) was suggested by Mansoor Fateh et al. [2]. Two bits of the payload are
placed in two CI pixels once the payload is transformed into a bit-stream. In the method introduced by J. B.
Eseyin and K. A. Gbola-Gade[3], Information protection based on the Residue Number System (RNS),
Chinese Remainder Theorem (CRT), and encryption using the RSA method were discussed in detail.
One of the most effective adaptive patterns, enhances the inverted LSB's embedding performance
according the method proposed by Supriadi Rustad et al. [4]. In the method proposed by Nabanita
Mukherjee (Ganguly) et al. [5], the method of hiding a byte of data is explained in detail. Genetic
Algorithm (GA) based method was proposed by Pratik D. Shah and Rajankumar S. Bichkar [6] to modify
the payload and embedding in the LSBs of the cover image. For image steganography, Atta R et al.
[7] suggested the Advanced Exploiting Modification Direction (AEMD).
To boost concealing capacity, edge pixels have more bits buried than non-edge pixels. Using
adaptive LSB, Abdel Raouf and Ashraf [8] devised an information-hiding method based on the human
visual system. Color image steganography employing an adaptive fuzzy inference as a classifier and LSB
was proposed by Tang L et al.[9]. Huffman Encoding (HE) and PSO were suggested as an image
steganography technique by Sharma N. and Usha Batra [10]. A color image steganography for the wireless
medium was suggested by Asmaa A. E. et al. [11]. The Discrete Cosine Transform (DCT) and DWT are the
foundation of the method used in this work.
Image steganography utilizing LSB and PVD was proposed by Aditya Kumar Sahu and Gandharba
Swain [12]. A Pixel-based Adaptive Directional Pixel Value Differencing (P- ADPVD) approach for image
steganography was proposed by M. Hassaballah et al [13]. Payload is hidden using the Pixel-of-Interest
(POI) technique. The identification of people using biometric traits was proposed by Douglas, Bailey,
Leeney, and Curran [14]. To increase security, image steganography is employed. A painting-assisted
reversible steganography using a histogram shifting technique and partial differential equations (PDE) for
embedding was proposed by Chuan Qinet et al. [15].
The BCH equations were proposed by Rongyue Zhang et al [16].(BCH)code for steganography.
For large capacity and security, H S Manjunatha Reddy and K B Raja[17] recommended employing DWT i
mage steganography.
Initialize a Initialize b
Normalization Normalization
Preprocessing Preprocessing
DWT DWT
Fusion Encryption
IDWT
Multiply by 255
Stego image
DWT
Subtraction
IDWT
Decryption
Retrieval image
3. Proprosed Method
The proposed model of image steganography based DWT using alpha blending technique for secure
communication is as shown in the above flow chart
Cover Image (CI): Describes the medium that conceals the secret information. We employ prepared photos
of various types, live webcam images, and cover images of various dimensions. i.e., black-and-white and
color photos. The original information to be transmitted is referred to as the payload image (PI). It uses a
payload picture with various size and formats. Normalization is the division of all CI and PI pixels into
groups of pixels with the highest possible value. Pre-processing: In pre-processing, scaling operations are
carried out. All of the CI and PI pixels in this work are multiplied by the strength factors and, respectively.
Where 𝛽= (1- 𝛼), SI is Stego image and α, βare the strength scaling factors
Wavelet Packet Transforms is a powerful signal representation tool. When DWT is applied to the image,
first the High-Pass Filter (H) and the Low-Pass Filter (L) are used for each row, and then they are down-
sampled by 2 to get the row’s high-and low-frequency information. Later, H and L filters are applied again
for each high-and low-frequency column component, and then they are down-sampled by 2. The four sub-
bands generated are, i.e., the LL, HL, LH, and HH bands. The complete information is available in the LL-
band at the third level for implementation, the two-dimensional WPT is used.
In this case, where the 2 ×2 Haar transform (H2) equation is considered to maintain the regional details,
which is given by Eq. (2) as,
4. Results
Mean Square Error (MSE): The distortion of the image is measured using MSE [ 40 , 41 ]. Summation of
square of the error between SI and CI which is determined using Eq. (3)
M𝐒𝐄 = [1 𝐑 ∗ ] Σ𝐢 =1 𝐍 Σ𝐣 =1 ( 𝐒𝐈 − 𝐂𝐈 ) 2 -(3)
Where CI is cover image pixels. SI is stego image pixels. R is row and C is column, R ∗ C represents the
dimension of image.
Peak Signal to Noise Ratio (PSNR): PSNR is the statistical differ- ence between SI and CI, to measure the
quality of the image by com- paring SI with the CI [42] . It is measured in dB, and it is given by the Eq. (4)
𝐏𝐒𝐍𝐑 = 20 𝐥𝐨𝐠 [ (2 𝐤 − 1 )√𝐌𝐒𝐄 ] - (4) Where, k is the number of bits required to represent the pixel for 8-
bit grayscale image.
PSNR is given by Eq. (5).
𝐏𝐒𝐍𝐑 = 20 𝐥𝐨𝐠 [ 255 √𝐌𝐒𝐄 ] -(5)
Where p contains the normalized histogram counts, n is the number of grayscale values, the result is
expressed in bits.
𝛼 CI PI MSE PSNR N1 N2
0.9 circuit lena 0.1401 65.2003 2.9163 2.9163
0.8 circuit lena 0.1402 65.1969 2.9167 2.9163
0.4 circuit lena 0.1404 65.1837 2.9149 2.9163
0.1 circuit lena 0.1406 65.1740 2.7843 2.9163
Table 1 shows CI and PI of dimension 512 ×512 have experimented with values of 𝛼varying from 0.1 to
0.999. For 𝛼= 0.1, MSE is 0.1406 and PSNR is 65.1740, and for 𝛼= 0.999, MSE and PSNR are 0.1401 and
65.2036, respectively.
Table 2 shows the PSNR value of color CI and grayscale PI. The color image of Baboon as CI and the
grayscale image of Barbara are taken for testing at 𝛼=0.999. The PSNR obtained is 65.2036, the MSE is
0.1401, and the entropy of stego and the cover image is 2.9163 and 2.9163, respectively.
Table 3 shows the PSNR value of CI as a grayscale image and PI as a color image. The grayscale image of
Goldhill as CI and the color image of Lena are taken for testing at 𝛼=0.999. The PSNR obtained is
661.5224, the MSE is 0.2140, and the entropy of the stego and cover image is 3.0553 and 3.0562,
respectively.
Table 4 shows the PSNR value of the grayscale CI and PI. The grayscale images rice.png as CI and
testpat1.png as the grayscale image PI are taken for testing at 𝛼=0.999. The PSNR obtained is 63.8647, the
MSE is 0. 0.1634, and the entropy of the stego and cover image is 3.0765 and 3.0713, respectively.
MATLAB is used to create the suggested method for image steganography for performance analysis using
an alpha blending-based Haar DWT for secure communication. A stego picture is created when the payload
image is embedded into the CI. The predefined grayscale, colour pictures from the database, and live images
are all taken into consideration in this work for experimentation in various dimensions. The recovered secret
and stego images' result parameter, or PSNR, is high, showing that there isn't much of a distinction between
them and the transmitted images.
Table 2 shows the PSNR value of grayscale CI and color PI. The grayscale image of Baboon as CI and
color image PI as Barbara, the PSNR obtained is 65.2036, MSE is 0.1401. Table 3 shows the PSNR value
of CI as a grayscale image and PI as a color image. The grayscale image Goldhill as CI and the color image
Lena, the PSNR obtained is 61.5224, and the MSE is 0.2140. Table 4 shows the PSNR value of the
grayscale CI and PI. The grayscale image rice as CI and testpat1 as PI, the PSNR obtained is 63.8647, and
the MSE is 0.1632. Table 5 shows the PSNR value for the colors CI and PI. With the pepper as CI and the
onion as PI, the PSNR obtained is 66.5025, and the MSE is 0.1206.
Future Scope:
To enhance future outcomes, experiments will be conducted on image steganography using the most
recent encryption methods, various mother wavelets, various capacities, various alpha values for grayscale
and colour images, and additional image formats.
Bibliography
[1] Aya Jaradat, Eyad Taqieddin, Moad Mowafi, A high-capacity image steganography method using chaotic
particle swarm optimization, Secur. Commun. Netw. 2021 (2021) Article ID 6679284.
[2] Mansoor Fateh, Mohsen Rezvani, Yasser Irani, A new method of coding for steganog- raphy based on LSB
matching revisited, Secur. Commun. Netw. 2021 (2021) Article ID 6610678.
[3] J.B. Eseyin, K.A. Gbolagade, Data hiding in digital image for efficient information safety based on
residue number system, AJRCoS 8 (4) (2021) 35–44.
[4] Supriadi Rustad, De Rosal Ignatius Moses Setiadi, Abdul Syukur, Pulung Nurtan- tio Andono, Inverted
LSB image steganography using adaptive pattern to improve imperceptibility, J. King Saud Univ. -
Comput. Inf. Sci. (2021) ISSN 1319-1578.
[5] Nabanita Mukherjee (Ganguly), Goutam Paul, Sanjoy Kumar Saha, Two-point FFT-based high
capacity image steganography using calendar based message en- coding, Inf. Sci. 552 (2021) 278–290
ISSN 0020-0255.
[6] Pratik D.Shah, Rajankumar S Bichkar, Secret data modification based image steganography
technique using genetic algorithm having a flexible chromosome structure, Eng. Sci. Technol. Int. J. 24
(3) (2021) 782–794 ISSN 2215-0986.
[7] R. Atta, M. Ghanbari, I. Elnahry, Advanced image steganography based on exploit- ing modification
direction and neutrosophic set, Multimedia Tools Appl. (2021)
21751–21769.
[8] Ashraf Abdel Raouf, A new data hiding approach for image steganography based on visual color
sensitivity, Multimedia Tools Appl. (2021) 23393–23417.
[9] L. Tang, D. Wu, H. Wang, et al., An adaptive fuzzy inference approach for color image steganography,
Appl. Soft Comput. (2021) 10987–11004.
[10] N. Sharma, Usha Batra, An enhanced Huffman-PSO based image optimization al- gorithm for image
steganography, Genetic Programm. Evolvable Mach. (2021)
189–205.
[11] A.E. Asmaa, F.E. Abdelsamie, A.E. Abdelnaiem, An efficient image steganography approach over
wireless communication system, Wireless Personal Communication.110 (2020) 321–337.
[12] Aditya Kumar Sahu, Gandharba Swain, An improved method for high hiding capac- ity based on
LSB and PVD, in: Digital Media Steganography, Academic Press, 2020, pp. 41–64. ISBN
9780128194386.
[13] M. Hassaballah, Mohamed Abdel Hameed, Saleh Aly, A.S. AbdelRady, A color image
steganography method based on ADPVD and HOG techniques, in: Digital Media Steganography,
Academic Press, 2020, pp. 17–40. ISBN 9780128194386.
[14] M. Douglas, K. Bailey, M. Leeney, K. Curran, An overview of steganography tech- niques applied to
the protection of biometric data, Multimedia Tools Appl. (2017)
17333–17373.
[15] Chuan Qin, Chin-Chen Chang, Ying-Hsuan Huang, Li-Ting Liao, An inpainting-as- sisted
reversible steganographic scheme using a histogram shifting mechanism, IEEE Trans. Circuits Syst.
Video Technol. 23 (7) (2013) 1109–1118.
[16] Rongyue Zhang, Vasiliy Sachnev, Magnus Bakke Botnan, Hyoung Joong Kim, Jun Heo, An
efficient embedder for BCH coding for steganography, IEEE Trans. Inf. Theory 58 (12) (2012) 7272–
7279.
[17] H.S. Majunatha Reddy, K.B. Raja, High capacity and security steganography using discrete
wavelet transform, Int. J. Comput. Sci. Secur. (IJCSS) 3 (6) (2012) 462–472.