Académique Documents
Professionnel Documents
Culture Documents
a.chawla@live.com, 22ps30690@gmail.com
3. PROPOSED METHOD
20
ISSN 2319-7080
represented by:
M = 89 121 137
107
124 139
116
127 150
3. 3. 1. Encoding Process:
Wavelets are functions defined over a finite interval and
During encoding process that the cover image and scrambled
having an average value of zero. The basic idea of the
secret image (i.e. with key) was reassigned by DWT transform
wavelet transform is to represent any arbitrary function (t) as
and then by alpha blending process. Next, IDWT was performed
a superposition of a set of such wavelets or basis functions.
to reform the stego image. This secure stego image was transfer
These basis functions or baby wavelets are obtained from a
to any communication media. The secret key and alpha blending
single prototype wavelet called the mother wavelet, by
operation gives more security in our model. The schematic
dilations or contractions (scaling) and translations (shifts).
representation of encoding process was given in Figure 3.1.
The wavelet-based transform uses a I-D sub band
decomposition process in which a I-D set of sample is
converted into the low- pass sub band (Li) and high-pass sub
band (Hi). Where i represents level of decomposition. The
low-pass sub band represents a down sampled lowresolution version of the original image. The high-pass sub
band represents residual information of the original image.
In 2-D sub band decomposition, the entire process is carried
www.ijcsce.org
21
ISSN 2319-7080
www.ijcsce.org
22
ISSN 2319-7080
Where
23
ISSN 2319-7080
COMPARISON OF VARIOUS QUALITY MEASUREMENTS ON COVER IMAGES AND STEGO IMAGE WITH SECRET-IMAGES
peppers.tiff
(256*256)
Koala.tiff
(1024*768)
penguin.tiff
(1024*768)
bike.tiff
(630*420)
car.tiff
(2560*1600)
lenna.tiff
(256*256)
penguin.tiff
(1024*768)
Koala.tiff
(1024*768)
car.tiff
(2560*1600)
bike.tiff
(630*420)
peppers.tiff
(256*256)
Koala.tiff
(1024*768)
penguin.tiff
(1024*768)
bike.tiff
(630*420)
car.tiff
(2560*1600)
MSE
NC
NCC
AD
SC
MD
NAE
Elapsed
Time
0.039
0.789931
0.04 33.0867
28.30
0.9657 1.0351
4.8374
0.9329 9.32
0.04
33.774
27.27
0.9756 1.0246
4.6587
0.04 31.8379
42.59
0.9611 1.0396
5.7713
0.04 30.2062
62.01
0.9665 1.0341
7.2387
0.04
30.777
54.37
0.9709 1.0295
6.5244
0.1 25.1279
176.86
0.1 25.8152
170.44
0.1 23.8791
266.18
0.1 22.2474
387.56
0.1 22.8182
339.83
5. CONCLUSION
This work deals with the techniques for steganography in
discrete wavelet transform as associated to gray scale image.
One thing in this techniques is that it also works for Colored
images. A new and secure steganography method for
embedding secret image into cover image without producing
any major change and without changing any algorithm for
colored and grayscale has been proposed. In addition, this
method gives more capacity and high security to transfer
images in communication field. And also with Low Noise in
Stego Image. In future this method can be tested with other
wavelet transform techniques with various image quality
measurements and with more fast simulation.
6. ACKNOWLEDGMENT
The authors would like to thank the anonymous reviewers
whose suggestions significantly improved the focus quality
clarity, and readability of this paper. And also heartly
thankful to the college, by which the stage for this kind of
www.ijcsce.org
24
ISSN 2319-7080
REFERENCES
[I] Prabakaran. G and Bhavani.R A Modified Secure Digital
Image Steganography Based on Discrete Wavelet
Transform international publish, 2012.
[2]
www.ijcsce.org
25