Secret Key Steganography technique based on three-layered DWT and SVD algorithm

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2016 by IJETT Journal
Volume-35 Number-9
Year of Publication : 2016
Authors : Priyanka Chouksey, Dr. Prabhat Patel
DOI :  10.14445/22315381/IJETT-V35P288


Priyanka Chouksey, Dr. Prabhat Patel"Secret Key Steganography technique based on three-layered DWT and SVD algorithm", International Journal of Engineering Trends and Technology (IJETT), V35(9),440-445 May 2016. ISSN:2231-5381. published by seventh sense research group

Steganography is a technique of hiding secret messages in another data (which can be a video, an audio, an image or a text) to protect unauthorized access. Regardless of years of research in the area of data hiding, it is still a very challenging task. A combination of DWT decomposition and singular value decomposition (SVD) is proposed to achieve effective hiding of secret information into an image. The proposed technique finds out the pixels to hide secret data (Text) by performing two approaches successively. The first approach (DWT) decomposes the cover image iteratively to find the high frequency components of it, since human eyes are less sensitive to high frequency. The second approach (SVD) again decomposes the high frequency components of cover image to find singular value matrix where secret data can be hide securely. The BER has been used as a comparison parameter for proposed work and previous work. In addition to this, noise is also added before transmitting the data hided image called ‘Stego’ image. The BER between retrieve data and original data is simulated.


[1] Navneet Kaur, Sunny Behal, A Survey on various types of Steganography and Analysis of Hiding Techniques, Volume 11, Number 8, PP 388-392 ISSN 2231-5381
[2] Neil F. Johnson: “Exploring Steganography: Seeing the Unseen”, George Mason University, IEEE Computer, pp. 26-34, Feb 1998.
[3] Raman Maini and Himanshu Aggarwal, “A Comprehensive Review of Image Enhancement Techniques”, Journal of Computing, Vol. 2, Issue 3, March 2010, ISSN 2151-9617.
[4] Belmeguenaï Aïssa, Derouiche Nadir, Redjimi Mohamed, Image Encryption Using Stream Cipher Algorithm with Nonlinear Filtering Function, 978-1- 61284-383-4/11/2011 IEEE.
[5] Sandra Bazebo Matondo, Guoyuan Qi, Two-Level Image Encryption Algorithm Based on Qi Hyper- Chaos, 2012 Fifth International Workshop on Chaosfractals Theories and Applications, 978-0-7695-4835- 7/12 $26.00 © 2012 IEEE, DOI 10.1109/IWCFTA.2012.47
[6] Tanmay Bhattacharya , Nilanjan Dey and S. R. Bhadra Chaudhuri, A Novel Session Based Dual Steganographic Technique Using DWT and Spread Spectrum, International Journal of Modern Engineering Research (IJMER), Vol.1, Issue1, pp-157- 161 ISSN: 2249-6645
[7] Krishna Rao Kakkirala and Srinivasa Rao Chalamala, Block Based Robust Blind Image Watermarking Using Discrete Wavelet Transform, 2014 IEEE 10th International Colloquium on Signal Processing & its Applications (CSPA2014), 7 - 9 Mac. 2014, Kuala Lumpur, Malaysia.
[8] Po-Yueh Chen and Hung-Ju Lin “A DWT Based Approach for Image Steganography”. International Journal of Applied Science and Engineering 2006. 4, 3: 275-290.
[9] Image Steganography using DWT and Blowfish Algorithms IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278- 8727Volume 8, Issue 6 (Jan. - Feb. 2013), PP 15-19
[10] Incremental Singular Value Decomposition Algorithms for Highly Scalable Recommender Systems University of Minnesota, Minneapolis, MN 55455, USA
[11] Berry, M. W., Dumais, S. T., and O?Brian, G. W. (1995). Using Linear Algebra for Intelligent Information Retrieval. SIAM Review, 37(4).
[12] [Deerwester, S., Dumais, S. T., Furnas, G. W., Landauer, T. K., and Harshman, R. (1990). Indexing by Latent Semantic Analysis. Journal of the American Society for Information Science, 41(6)

Steganography, DWT, Singular Value Decomposition, BER and SNR, Stego image.