Abstract




 
   

IJE TRANSACTIONS C: Aspects Vol. 28, No. 12 (December 2015) 1720-1727   

PDF URL: http://www.ije.ir/Vol28/No12/C/4-2151.pdf  
downloaded Downloaded: 143   viewed Viewed: 2132

  SINGULAR VALUE DECOMPOSITION BASED STEGANOGRAPHY TECHNIQUE FOR JPEG2000 COMPRESSED IMAGES
 
G. Kasana, K. Singh and S. Singh Bhatia
 
( Received: June 18, 2015 – Accepted: December 24, 2015 )
 
 

Abstract    In this paper, a steganography technique for JPEG2000 compressed images using singular value decomposition in wavelet transform domain is proposed. In this technique, DWT is applied on the cover image to get wavelet coefficients and SVD is applied on these wavelet coefficients to get the singular values. Then secret data is embedded into these singular values using scaling factor. Different compression rates are considered for JPEG2000 images after embedding the secret images. GA is used to optimize the value of SF. Maximum capacity of the proposed technique is 25% of cover image size and maximum PSNR values between cover and its stego image is more than the PSNR of existing techniques. Embedding capacity of proposed technique is also higher than the embedding capacity of existing techniques. Also, PSNR between secret image and extracted image is high and hence the visual quality of the extracted secret image is good enough to the human visual system. Steganalysis tests are performed on the stego images to show imperceptibility of proposed technique.

 

Keywords    DWT, SVD, PSNR, GA, SF, JPEG2000.

 

چکیده    در این مقاله، یک روش پنهان نگاری برای فشرده سازی تصاویر JPEG2000 با استفاده از تجزیه مقدار منفرد در دامنه تبدیل موجک ارائه شده است. در این روش، تبدیل موجک گسسته (DWT) در عکس روی جلد اعمال می شود تا ضرایب موجک به دست آید و تجزیه مقدار منفرد (SVD) روی این ضرایب موجک اعمال شد تا مقادیر منفردشان حاصل گردد. بیت داده های پنهان با استفاده از فاکتور مقیاس بندی در این مقادیر منفرد قرار داده می شوند. نرخ فشرده سازی مختلف نیز برای تصاویر JPEG2000 پس از تعبیه تصاویر مخفی در نظر گرفته می شود. از الگوریتم ژنتیک (GA) برای بهینه سازی مقدارSF استفاده می شود. حداکثر ظرفیت روش پیشنهادی 25٪ از اندازه عکس روی جلد است و حداکثر ارزش PSNR بین پوشش و تصویر stego بیشتر از PSNR تکنیک های موجود است. ظرفیت جاسازی روش پیشنهادی نیز بالاتر از ظرفیت جاسازی تکنیک های موجود است. همچنین، PSNR بین تصویر مخفی و تصویر استخراج شده بالا است و از این رو کیفیت بصری تصویر مخفی استخراج شده به اندازه کافی برای سیستم بینایی انسان خوب است. تست Steganalysis در تصاویر stego غیر محسوس بودن روش پیشنهادی را نشان می دهد.

References   

1.        Leon, S. J., Linear Algebra with Applications, Prentice Hall, New Jersey (Chapter 7), (1998).

2.        Seo, Y., Kim, M. S., Park, H., Jung, H. Y., Chung, H. Y., Huh, Y. and Lee, J. D., “ A secure watermarking for JPEG2000”,  IEEE, (2001), 530-533.

3.        Noda, H., Spaulding, J., Shirazi, M. N. and Kawaguchi, E., “Application of bit plane decomposition steganography to JPEG2000 encoded images”, IEEE Signal Processing Letters, Vol. 9, (2002), 410-413.

4.        Su, P. C. and Kuo, J., “Steganography in JPEG2000 compressed images”, IEEE Transactions on Consumer Electronics, Vol. 49. (2003), 824-832.

5.        Hai-ying, G., Yin, X. and Guo-qiang, L., “A steganographic algorithm for JPEG2000 images”, IEEE computer society, International Conference on Computer Science and Software Engineering, (2008), 1263-1266.

6.        Zhang, L., Wang, H., and Wu, R., “A high capacity steganography scheme for JPEG2000 baseline system”, IEEE Transactions on Image Processing, Vol.18, (2009), 1797-1803.

7.        Liu, R. and Tan, T., “An SVD based watermarking scheme for protecting rightful ownership”, IEEE Transactions on multimedia, Vol. 4, (2002), 121-128.

8.        Ganic, E. and Eskicioglu, A. M., “Robust embedding of visual watermarks using DWT-SVD”, Journal of Electronic Imaging, Vol. 14, (2005), 043004.

9.        Chang, C. C., Tsai, P. C. and Lin, C., “SVD based digital watermarking scheme”, Pattern Recognition Letters, Vol. 26 (2005), 1577-1586.

10.     Chandra, D. S., “Digital image watermarking using singular value decomposition”, Proceedings of the 45th Midwest Symposium on Circuits and Systems, Vol. 3, (2002), 264-267.

11.     Aslantas, V., “A singular value decomposition-based image watermarking using genetic algorithm”, International Journal of Electronics and Communications, Vol. 62, (2008), 386-394.

12.     Abdallah, H. A., Hadhoud, M. M. and Shaalan A. A., “An efficient SVD image steganographic approach”, IEEE, (2009), 257-262.

13.     Hu, W. C., Chen, W. H. and Yang, C. Y., “Robust image watermarking based on discrete wavelet transform-discrete cosine transform-singular value decomposition”, Journal of Electronic Imaging, Vol. 21, (2012), 1-7.

14.     Kasana, G., Singh, K. and Bhatia, S. S., “Steganography technique for JPEG2000 compressed images using histogram in Wavelet Domain”, International Journal of Security and its Applications, Vol. 8, No.6, (2014),  211-224.

15.     Ling, H. C., Raphael, C., Phan, W. and Heng, S. H., “On the security of ownership watermarking of digital images based on singular value decomposition”, Journal of Electronic Imaging, Letters, (2011), 1-2.

16.     JASPER software, www.ece.uvic.ca/~frodo/jasper/

17.     Ishida, T., Yamawaki, K., Noda, H. and Niimi, M., “Performance improvement of JPEG2000 steganography using QIM”, Journal of Communication and Computer, Vol. 6, (2009), 1-5.

18.     Ishida, T., Yamawaki, K., Noda, H. and   Niimi, M., “An Improved QIM-JPEG2000 Steganography and Its Evaluation by Steganalysis”, Journal of Information Processing, Vol. 17, (2009), 267-272.

19.     Goudia, D., Chaumont, M., Puech, W. and Said, N. H., “A Joint Trellis Coded Quantization Data Hiding Scheme in the JPEG2000 Part-2 Coding Framework”, 19th European Signal Processing Conference, Sept, (2011), 1110-1114.

20.     Hassanpour H. and Asadi S. R. “Image Enhancement using pixel wise gamma correction”, International Journal of Engineering –Transaction B: Applications, Vol. 24, No. 4,(2011), 301-312.

21.     Hassanpour H. and Ghadi A. R. “Image Enhancement via Reducing Impairment Effects on Image Components”, International Journal of Engineering–Transaction B: Applications Vol. 26, No. 11, (2013), 1267-1274.

22.     Guo Z., Wang S., Yue X., Jiang  D. and Li K. “Elite opposition –based Artificial Bee Colony algorithm for global optimization”, International Journal of Engineering –Transaction C:Aspects, Vol. 28, No. 9,(2015),1268-1275.


Download PDF 



International Journal of Engineering
E-mail: office@ije.ir
Web Site: http://www.ije.ir