z-logo
open-access-imgOpen Access
Steganographic Scheme based on Message-Cover matching
Author(s) -
Youssef Taouil,
El Bachir Ameur
Publication year - 2018
Publication title -
international journal of electrical and computer engineering
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.277
H-Index - 22
ISSN - 2088-8708
DOI - 10.11591/ijece.v8i5.pp3594-3603
Subject(s) - steganography , cover (algebra) , least significant bit , computer science , permutation (music) , matching (statistics) , embedding , integer (computer science) , set (abstract data type) , field (mathematics) , scheme (mathematics) , algorithm , image (mathematics) , theoretical computer science , wavelet , artificial intelligence , arithmetic , mathematics , statistics , mechanical engineering , mathematical analysis , physics , acoustics , pure mathematics , engineering , programming language , operating system
Steganography is one of the techniques that enter into the field of information   security, it is the art of dissimulating data into digital files in an imperceptible way that does not arise the suspicion. In this paper, a steganographic method based on the Faber-Schauder discrete wavelet transform is proposed. The embedding of the secret data is performed in Least Significant Bit (LSB) of the integer part of the wavelet coefficients. The secret message is decomposed into pairs of bits, then each pair is transformed into another pair based on a permutation that allows to obtain the most matches possible between the message and the LSB of the coefficients. To assess the performance of the proposed method, experiments were carried out on a large set of images, and a comparison to prior works is accomplished. Results show a good level of imperceptibility and a good trade-off imperceptibility-capacity compared to literature.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here