Text-Image Steganography
Tamanna Jagga1, Jyoti Mann2
1Tamanna Jagga, Department of Electronics and Communication, S.P.I.E.T., Sonipat, (Haryana), India.
2Jyoti Mann, Department of Electronics and Communication, S.P.I.E.T., Sonipat, (Haryana), India.
Manuscript received on 20 July 2014 | Revised Manuscript received on 25 July 2014 | Manuscript published on 30 July 2014 | PP: 1-6 | Volume-3 Issue-3, July 2014 | Retrieval Number: B1095053214/2014©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Steganography hides the existence of secret information rather than hiding its meaning only. The main aim of steganography is to increase the steganographic capacity and enhance the imperceptibility or undetectability. However, steganographic capacity and imperceptibility are at odds with each other. It is not possible to simultaneously maximize the security and capacity of a steganographic system. Increasing steganographic capacity and enhancing stego image quality are still challenges. Since peak signal-to-noise ratio (PSNR) is extensively used as a quality measure of stego images, the reliability of PSNR for stego images is evaluated in the work described. The proposed work is compared with the existing method using PSNR, NCC, SC as comparison parameters. Proposed technique reduces the requirement to keep record of cover images for secret information extraction. Otherwise for each information received, the receiver should also have the cover image saved with him, which he should recall everytime for each information extraction. Proposed technique is used for the extraction of secret information for which cover image has to be recovered by noise removal methods. In the proposed technique I have tried to obtain the secret image from stego image without having cover image. Soft thresholding and bilateral filtering are the methods used to obtain cover image. Experimental results shows that there’s a trade – off between stego image and secret image extracted. It is seen that as we increase the value of alpha, stego image degrades, but secret image improves. The secret image obtained is in visually acceptable form. Results shown are objective and subjective in nature.
Keywords: Alpha blending, Arnold transformation, Bilateral Filtering, DWT, Steganography, Soft Thresholding.
Scope of the Article: Image Processing and Pattern Recognition