Efficient Image Steganogrphic Algorithms Utilizing Transforms: Wavelet and Contourlet with Blowfish Encryption

Full Text (PDF, 560KB), PP.15-24

Views: 0 Downloads: 0


Saddaf Rubab 1,* Younus Javed 1

1. Department of Computer Engineering, College of Electrical & Mechanical Engineering, National University of Sciences & Technology (NUST), Islamabad, Pakistan

* Corresponding author.

DOI: https://doi.org/10.5815/ ijcnis.2015.02.02

Received: 11 May 2014 / Revised: 4 Sep. 2014 / Accepted: 15 Oct. 2014 / Published: 8 Jan. 2015

Index Terms

Steganography, PSNR, blowfish, Huffman, DCT, DWT


Steganography is a means to hide the existence of information exchange. Using this technique the sender embeds the secret information in some other media. This is done by replacing useless data in ordinary computer files with some other secret information. The secret information could be simple text, encoded text or images. The media used as the embedding plane could be an image, audio, video or text files. Using steganography ensures that no one apart from the sender and the receiver knows about the existence of the message. In this paper, a steganography method based on transforms used i.e. Wavelet and Contourlet. Devised algorithm was used against each transform. Blowfish Encryption method is also embedded to double the security impact. The major advantage of applying transforms is that the image quality is not degraded even if the number of embedded characters is increased. The proposed system operates well in most of the test cases. The average payload capacity is also considerably high.

Cite This Paper

Saddaf Rubab, Younus Javed, "Efficient Image Steganogrphic Algorithms Utilizing Transforms: Wavelet and Contourlet with Blowfish Encryption", International Journal of Computer Network and Information Security(IJCNIS), vol.7, no.2, pp.15-24, 2015. DOI:10.5815/ijcnis.2015.02.02


[1]Aamer Nadeem et al, "A Performance Comparison of Data Encryption Algorithms", IEEE 2005.
[2]National Institute of Standards and Technology, “Data Encryption Standard (DES)”, FIPS PUB 46-3, 1999 October 25.
[3]NIST, “Report on the Development of the Advanced Encryption Standard (AES)”, October 2, 2000.
[4]David A. Huffman, “A Method for the Construction of Minimum - Redundancy Codes”, Proceedings of the I.R.E., September 1952, pp 1098–1102.
[5]M. Kharrazi, H. T. Sencar, N. Memon, Image Steganography: Concepts and Practice, Lecture Note Series, Institute for Mathematical sciences, National University of Singapore, 2004.
[6]W. Pennebaker and J. Mitchell. “JPEG STILL IMAGE DATA COMPRESSION STANDARD". van Nostrand Reinhold, 1993.
[7]L. Marvel “Image Steganography for Hidden Communication". Ph.D. Dissertation, Univ. of Delaware, Dept of EE, 1999.
[8]Robert T. McKeon “Strange Fourier Steganography in Movies”, Proceedings of IEEE EIT 2007.
[9]R. Gonzalez and R. Woods, “Digital Image Processing”, Sec. Edition. pp 373-374.
[10]S. Mallat, “A theory for multiresolution signal decomposition: the wavelet representation”, IEEE Pattern Anal. and Machine Intell., vol. 11, No. 7, pp 674-693, 1989.
[11]M. Do and M. Vetterli, “The contourlet transform: An efficient directional multiresolution image representation,” IEEE Transactions on Image Processing, vol. 14, no. 12, pp. 2091–2106, Dec. 2005.
[12]M. V. V. Velisavljevic, B. Beferull-Lozano and P. Dragotti, “Directionlets: anisotropic multi-directional representation with separable filtering,” IEEE Transactions on Image Processing, vol. 15, no. 7, pp. 1916 – 1933, Jul. 2006.
[13]E. J. Cand`es and D. L. Donoho, “Curvelets-a surprisingly effective nonadaptive representation for objects with edges,” Curve and Surface Fitting, 1999.
[14]E. L. Pennec and S. Mallat, “Sparse geometric image representation with bandelets,” IEEE Transactions on Image Processing, vol. 14, no. 4, pp. 423–438, Apr. 2005.
[15]Amitava Nag, Sushanta Biswas, Debasree Sarkar & Partha Pratim Sarkar, “A Novel Technique for Image Steganography Based on DWT and Huffman Encoding”, International Journal of Computer Science and Security, (IJCSS), Volume (4): Issue (6).
[16]M. F. Tolba, M. A. Ghonemy, I. A. Taha, and A. S. Khalifa, “USING INTEGER WAVELET TRANSFORMS IN COLORED IMAGE-STEGANOGRAPHY”, IJICIS Vol. 4 No. 2, July 200.
[17]Bo Yang and Beixing Deng, “Steganography in Gray Images Using Wavelet” ISCCSP 2006.
[18]S.Mallat and F.Falzon, “Analysis of low bit rate image transform coding,” IEEE Transactions on Signal Processing, vol. 46, no. 4, pp. 1027–1042, Apr. 1998.
[19]P. J. Burt and E. H. Adelson, “The laplacian pyramid as a compact image code,” IEEE Transactions on Communications, vol. 31, pp. 532–540, Apr. 1983.
[20]Hedieh SAJEDI, Mansour JAMZAD, “ContSteg: Contourlet-Based Steganography Method”, Wireless Sensor Network, 2009, 3, 163-17.
[21]M. N. Do, “Contourlets and sparse image expansions,” Ph.D. dissertation, Department of Electrical and Computer Engineering University of Illinois, Urbana IL, 2003.
[22]Ali Al-Ataby1 and Fawzi Al-Naima2, “A Modified High Capacity Image Steganography Technique Based on Wavelet Transform”, The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010.
[23]Hedieh Sajedi Mansour Jamzad, Using contourlet transform and cover selection for secure steganography Published online: 5 August 2010 ? Springer-Verlag 2010.