Please use this identifier to cite or link to this item:
Title: Design of image steganographic systems for covert communication
Researcher: Manjunatha Reddy, H S
Guide(s): Raja K B
Keywords: Image Steganographic Systems
Electronics and Communication
Upload Date: 1-Apr-2014
University: Jawaharlal Nehru Technological University, Anantapuram
Completed Date: 28/03/2013
Abstract: The Steganography is a technique of embedding secret information in newlinethe cover object to generate stego object, which is almost same as newlinecover object. The Steganography does not attract intruders as in the case of cryptography technique. The steganography techniques, advantages, limitations, applications and definitions are discussed in detail in chapter one. The detailed literature survey of existing related works on spatial, transform and hybrid domain steganographic techniques are discussed in chapter two. The Wavelet based Non LSB steganographic technique is proposed in chapter three. The DWT/IWT is applied on cover image. The payload MSB bit pairs are converted into 2*2 matrix using identity matrix. The 2*2 HH subband of cover image is multiplied with 2*2 payload matrix to obtain modified HH band. The inverse wavelet transform is used on modified HH band to derive stego image. The PSNR value of projected algorithm is high as compared to existing algorithms. The secure steganography with scramble payload using LWT is discussed in chapter four. The secret image is decomposed into four equal parts and integer LWT is used on two parts. The transform domain coefficient values and pixel intensity values are converted into binary and index reversal is applied. The cube root is applied on each decimal value of index reversal bits to convert 8 - bits into 3 - bits length. The scramble 3 - bits of payload are implanted into XD subband of cover medium to obtain stego object. The Decision Factor ix Based Manipulation (DFBM) is applied on stego object for further scrambling of stego XD band. The inverse lifting wavelet transform is used on stego object to generate stego image. The payload is more secure, since index reversal, cube root and DFBM are used. The value of PSNR is high as compared to existing algorithms. In chapter five adaptive steganography using LWT is presented. The secret image is decomposed into two equal parts and LWT is used on one part.
Pagination: xiv, 131p.
Appears in Departments:Department of Electronics and Communication

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File81.05 kBAdobe PDFView/Open
02_certificates.pdf80.03 kBAdobe PDFView/Open
03_acknowledgments.pdf53.85 kBAdobe PDFView/Open
04_content.pdf63.38 kBAdobe PDFView/Open
05_preface.pdf52.9 kBAdobe PDFView/Open
06_list of tables, figures.pdf100.43 kBAdobe PDFView/Open
07_chapter 1.pdf208.95 kBAdobe PDFView/Open
08_chapter 2.pdf133.69 kBAdobe PDFView/Open
09_chapter 3.pdf217.27 kBAdobe PDFView/Open
10_chapter 4.pdf229.38 kBAdobe PDFView/Open
11_chapter 5.pdf189.44 kBAdobe PDFView/Open
12_chapter 6.pdf379.88 kBAdobe PDFView/Open
13_chapter 7.pdf96.58 kBAdobe PDFView/Open
14_refrences.pdf125.5 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.