[BACK]
Computers, Materials & Continua
DOI:10.32604/cmc.2022.023116
images
Article

DWT-SVD Based Image Steganography Using Threshold Value Encryption Method

Jyoti Khandelwal1, Vijay Kumar Sharma1, Dilbag Singh2,* and Atef Zaguia3

1School of Computing and Information Technology (SCIT), Manipal University Jaipur, Jaipur, 302004, India
2School of Electrical Engineering and Computer Science, Gwangju Institute of Science and Technology, Gwangju,61005, Korea
3Department of Computer Science, College of Computers and Information Technology Taif University, 11099,Saudi Arabia
*Corresponding Author: Dilbag Singh. Email: dggill2@gmail.com
Received: 28 August 2021; Accepted: 16 November 2021

Abstract: Digital image steganography technique based on hiding the secret data behind of cover image in such a way that it is not detected by the human visual system. This paper presents an image scrambling method that is very useful for grayscale secret images. In this method, the secret image decomposes in three parts based on the pixel's threshold value. The division of the color image into three parts is very easy based on the color channel but in the grayscale image, it is difficult to implement. The proposed image scrambling method is implemented in image steganography using discrete wavelet transform (DWT), singular value decomposition (SVD), and sorting function. There is no visual difference between the stego image and the cover image. The extracted secret image is also similar to the original secret image. The proposed algorithm outcome is compared with the existed image steganography techniques. The comparative results show the strength of the proposed technique.

Keywords: Image steganography; threshold value; sorting; discrete wave transformation; singular value decomposition; color band division; permutation

1  Introduction

Nowadays, the internet's coverage area encompasses the entire globe; the internet allows us to connect people from all over the world. The internet is used not only on Earth, but also in space, where it is mandatory. In this technical and digital environment, the security of information is a high-responsibility job. Information system security is the broad area that introduces the advantages and disadvantages of data digitalization. The challenges of information system security can be concluded in three terms: Confidentiality, Integrity, and Availability, some of which are called CIA [1,2]. The meaning of data confidentiality means not disclosed to unauthorized individuals, integrity means maintaining accuracy and completeness of the data and availability means information must be available when needed. The digital information transmission technique must be an efficient worker for the information system security channels.

Steganography, watermarking, and cryptography are well-known methods for secure information transmission. The roles of these methods are different according to the point of view of utilization [3]. The steganography method uses the technique of hiding information. Watermarking uses two different approaches; one is visible watermarking, and the other is invisible watermarking. Cryptography believes in the direct change in secret data. We are only considering steganography here. Steganography is the art of hiding digital data behind other digital data. The perfect steganography method passes all the channels of steganalysis. The steganalysis process tries to identify the secret information which is hidden behind the front surface. The steganography process is completed by the different types of cover objects like text, audio, images, and videos [4]. By using a different type of cover object, the secret information is transferred from one place to another.

Image steganography is the well-known steganography process. It uses an image to create a cover image behind which the secret data is hidden and securely transmitted over the internet or other transmission medium. The digital image is a collection of pixels. The pixel value is crucial in the filled with image steganography [5]. Image steganography is accomplished by two broad image steganography techniques, known as spatial domain and transform domain. The traditional image steganography method is a spatial domain technique. In the spatial domain, to hide the secret data in the cover image, the pixel value modification directly takes place. The well-known spatial domain image steganography technique is the least significant bit (LSB). The direct operation on the pixel value makes this method not reliable. The transform domain image steganography method works on the amplitude, phase, and frequency of the signal. The transform domain image steganography method is divided into two broad categories: discrete cosines transform (DCT) and discrete wavelets transform (DWT). The transform domain image steganography method was inspired by the fast fourier transformation (FFT). Image steganography based on the wavelet is more secure and robust as compared to the other techniques [6,7].

The fourier transform provides the frequency spectrum of the real signal, but all the frequency channels are not covered by the fourier transform. Due to this, the original time resolution of the real signal is missed. The wavelet comes as a solution for fourier transform drawbacks. The wavelet has a family of mother wavelets, but the fourier transform has only one kind of transformation [8]. The main categories of mother wavelets are continuous wavelet transform (CWT) and discrete wavelet transform (DWT). The CWT sets the scaling and translation as arbitrary, but DWT restricts them.

The information system security strengthens the image steganography technique so that secret images can be hidden behind the cover image properly [9]. The image steganography process starts with the selection of the correct steganography technique, but direct embedding of data is the old method. According to the new approach, the secret image is first scrambled by a different scrambling method then embedded into the cover image. The scrambling method changes the position [10] of the secret image pixels, and makes it invisible to the human visual system. This information system security concept provides the security against attackers available on the network.

2  The Steganography Method

In the proposed image steganography method, the cover image is a 256 × 256 Lena grayscale image. The secret information is a Pepper grayscale image of size 256 × 256. To transfer the secret image invisible to the human visual system, the secret image is embedded into the cover image using the concepts of DWT, scrambling the colour channel based on a threshold value, and singular value decomposition (SVD) methods. These method combinations provide improved security, and the extracted secret image quality is not too much affected.

2.1 Discrete Wavelet Transformation

The wavelet fluctuation breaks down the difference of a period series and, subsequently, gives an examination of change. A wavelet transformation can be either continuous or discrete. The DWT is more widely used. The dwt2 order plays out a solitary two-dimensional wavelet disintegration concerning either a specific wavelet or specific wavelet deterioration channels you indicate [11].

Fig. 1 shows the part that plays out an online DWT on the information signal. The approximation output and multidimensional output belong to the low and high-frequency components of the signal, respectively. Before applying DWT to the signal, the signal is sampled by the sampling parameter which is defined by the user. Additionally, the anti-aliasing function and type of wavelet from the DWT family are also selected by the user. The simulation time depends upon the sampling frequency, wavelet type, and the number of levels required [12,13].

images

Figure 1: Discrete wavelet transforms input and output parameters

As shown in Fig. 2, the DWT image decomposition method divided the two-dimensional plain image into four equal parts. Each part contains the information about the original image according to the filter applied. By using their filter characteristics, the LL, LH, HL, and HH represent the different varieties of filtering. By using their filter characteristics, the plain two-dimension image breaks into multiple parts [14]. The decomposed part is used to hide the secret data according to the user, requiring the selection of a filter area.

images

Figure 2: Discrete wavelet transform two-level decomposition

2.2 Scrambling

Detailed information scrambling improves the confidence of data transmission. The pixel changes place according to the applied method. The scrambling method is different from the cryptography method. In the cryptography method, the original value is replaced by the new value, which may exist or not exist in the present data. The scrambling method assures the sender that the hidden data can only be extracted by the authorized receiver [15,16]. The image is a 2-Dimensional data set that contains the pixel value by using the different scrambling methods. The image is created in the form of an unreadable data set by the attacker present in the transmission channel. The images are of two types: one is grayscale and the other is a colour image. In the colour image, three colour channels are available, which are known as red, green, and blue, but in the grayscale image, only one-color channel is available. In a Gray Scale image, the colour channel is divided based on the threshold value. The division of a grayscale image is broadly classified into three parts: Dark Pixels, Middle Pixels, and Bright Pixels.

The division of grayscale images according to the threshold value of pixels is shown in Fig. 3. According to the intensity of the pixels available in the image, the grayscale image was divided into three parts. These three-part pixel values are used to create the scrambled secret image.

images

Figure 3: Division of grayscale image in three different parts using the threshold value

The scrambling process flow is represented in Fig. 4. First, the input secret image is converted into a one-dimensional array. The converted one-dimensional array is sorted by the sort function of MATLAB, a sort function used to arrange data in ascending and descending order [17]. The sorting function used in the proposed scrambling algorithm is:

[v, ix]=sort(A)(1)

images

Figure 4: Scrambling process to make secret image scrambled before inbuilt into the cover image

The sorting function is also able to return the array indices. If the array A is an M x N matrix, then each column of ix is a permutation vector of the corresponding column of A. The returned indices preserve the original ordering, which is used as a key at the time of secret image extraction.

Proposed Scrambling Algorithm:

1.    Convert the image 2 D array in 1 D array using two coefficient v and ix they are storing the value and index location respectively.

2.    Sort step 1 generated 1 D image array.

3.    Select initial Minimum, Maximum, and Threshold value, typically the mean 8-bit value of the original image

4.    Divide the original image into three portions;

a)   Dark Pixels = (Minimum Value of Image Array + Maximum Value of Image Array)/2 <Threshold Value.

b)   Middle Pixels = (Value >= (Minimum Value of Image Array + Maximum Value of Image Array)/2) & (Value <= Threshold Value));

c)   Bright Pixels = Value > Threshold Value);

Combine the scrambled channel data and create a scrambled secret image.

The peppers’ secret image pixel maximum intensity value is 233, the minimum value is 1, and the mean value is 120.93, calculated by the max, min, and mean functions. Let's put the value and understand the algorithm properly:

1.    On the basis of secret image here the mean value is 120.93 take it as 121 Threshold value.

2.    Divide the original image into three portions; (Here grayImage variable contain the secret image)

a)   DarkPixels = grayImage (grayImage < 117);

b)   MiddlePixels = grayImage ((grayImage >= 117) & (grayImage <= 121));

c)   BrightPixels = grayImage (grayImage > 233);

Combine DarkPixels, MiddlePixels & BrightPixels Scrambled channel and create scrambled secret image.

The outcome of the scrambling process is shown in Fig. 5. For the embedding process now, this scrambled secret image is used.

images

Figure 5: Original and scrambled secret pepper image

2.3 Singular Value Decomposition

To acquire understanding of the singular value decomposition (SVD), treat the columns of an n × d grid as n focuses in d-dimensional space and think about the issue of tracking down the best k-dimensional subspace for the arrangement of focuses [18]. In terms of direct polynomial math, the SVD is a factorization of a genuine and complex matrix. We can consider what we did in that deterioration as separating the first changes into three changes. Assuming we increase the furthest right network by any vector, and duplicate the center lattice by that item, and afterward increase the furthest left grid on the right-hand side by that item, we would see that beginning vector be changed multiple times. That interaction would be comparable to increasing the beginning vector by the first lattice [19,20].

We can likewise say that, in that unique change framework, which we'll call A, we planned a bunch of symmetrical vectors, or vectors at right points to one another (1, 0), and (0, 1) onto a bunch of non-symmetrical vectors (0,–2), and (1,–3) as shown in Fig. 6. We don't need to duplicate every vector by the change lattice each in turn. We can duplicate the arrangement of vectors, as a lattice, by changing the grid, as so.

images

Figure 6: Original matrix subdivision using the concept of SVD

Similarly, the calculation of SVD of matrix A factorized the two-dimensional matrix into three matrices, A = UDVT, where columns U and V are orthonormal and matrix D is diagonal with the positive real entries [11]. A matrix contains orthonormal columns, which means each orthonormal column represents an UTU = I.

2.4 Secret Image Embedding Algorithm

The following steps explain the embedding process:

1.    Apply DWT on the Cover image (C).

2.    Apply SVD on the Cover image LL filter Decomposition part.

3.    Cover the Secret image (S) two-dimensional array into a one-dimensional array.

4.    Apply Sort Function on the one-dimensional converted array, sort function store value, and location of the pixel.

5.    Calculate the Max, Min, and Threshold value and apply the channel division according to the range defined in the proposed scrambling algorithm:

a)   Dark Pixels = (Minimum Value of Image Array + Maximum Value of Image Array)/2 <Threshold Value.

b)   Middle Pixels = (Value >= (Minimum Value of Image Array + Maximum Value of Image Array)/2) & (Value <= Threshold Value));

c)   Bright Pixels = Value > Threshold Value);

Combine the color channel and covert one-dimensional secret image array into a two-dimensional scrambled image (SS).

Apply the SVD on the Scrambled secret image (SS) and insert the secret image (SSS) into the cover image using alpha blending.

Take the inverse of the embedded image (AG) and generate the stego image (I).

Fig. 7, represents the entire flow of the algorithm used for embedding secret image inside the cover image, and the result comes out in the form of a stego image.

images

Figure 7: Secret image embedding flowchart

2.5 Secret Image Extraction Algorithm

The extraction algorithm consists of eight steps as follows:

1.    Apply DWT and SVD on the Stego image (I).

2.    Covert the extracted image (ID) two-dimensional array into a one-dimensional array.

3.    Apply the sorting function which contains the extracted secret image pixel value and location.

4.    Rearrange the one-dimensional sorted array according to the location key array generated at the time of secret image embedding process.

5.    Convert the one-dimensional array into an extracted two-dimensional secret image.

6.    Rotate the extracted secret image 270-degree angle.

7.    Apply Flip Function on output image come from step 6.

8.    Show the extracted secret image (S).

Fig. 8, represents the entire flow of the algorithm used for extracting secret images from the stego image, and the result comes out in the form of a secret image which is most similar to the original secret image.

images

Figure 8: Secret image extraction flowchart

3  Experimental Results

This section includes the outcome of the proposed algorithm. The image steganography outcome comes from the combination of the wavelet transform in the form of the discrete wavelet transform, linear matrix division in the form of singular value decomposition, and the scrambling method. The motive for using this technique is to provide secret image security between transmission channels [21]. Secret image security depends upon secret data invisibility in the transmission channel. The secret image embedding process is complete by using DWT, SVD, scrambling, sorting, array dimension conversation, and inverse DWT of the image.

The secret image is extracted at the end by an authorized user by using DWT, SVD, rotation, location key, and flipping processes. The programming implementation also shows the peak signal to noise ratio (PSNR) and mean square error (MSE) comparative results in terms of the original cover image and stego cover image.

The image steganography quality depends upon the quality of the stego image. According to the previous research done on the grayscale image, the PSNR value of the stego image must be greater than 37 dB. If the value of PSNR is greater than 37 dB, then the approximation of successful transmission of secret data can be considered [22].

As we show in Figs. 9a9d, the standard well-tested Lena grayscale image was taken for the cover image and the Pepper grayscale image was taken as a secret image. The PSNR and MSE of the stego image are 37.72 dB, and 11.00 respectively, for alpha value 0.05. After that, the results of PSNR were less than 37 dB. The programming result is acceptable to the human visual system.

images

Figure 9: The secret image embedding and extracting outcome

Tab. 1 presents the results of PSNR and MSE values for different alpha values, and we can see that for different alpha they all are reasonable output in visual quality.

images

Fig. 10 shows the impact of alpha value on the PSNR and MSE values. Here the term alpha shows the transparency of colour when the secret image is embedded into the cover image. In most of the graphics, the alpha values lie between 0% to 100%. A value of 0% denotes full transparency. It means the secret image is fully visible, but if the value is equal to 100%, it means that the colour channels are completely opaque. So according to the requirement, an intermediate value is selected to blend the secret image with the cover image pixels. The value of alpha is decided based on the stego image PSNR value. The value of stego image PSNR must not be less than 37 dB according to the human visual system analysis. In the proposed work, the alpha value of 0.01 to 0.05 is provided as the accepted outcome.

images

Figure 10: Performance visualization of proposed image steganography method in terms of PSNR and MSE for the different alpha value

The Structural Similarity Index Measure (SSIM) method is used for predicting image quality. The quality measurement by SSIM is done by finding the similarity between two images. The PSNR and MSE methods were used to find the absolute errors, but the SSIM is a prediction-based model which considers image degradation as a perceived change in structural information.

The first, comparative study of the proposed work check is based on the SSIM value generated by the previous work [23]. The test images shown in Figs. 11a11d, used in the previous work are Cameraman, House, and Boats as a cover image and Peppers image as a secret image, the proposed work tested for given tested images. The result is generated for the comparative structural difference between the stego image and the original cover image. Every cover value is tested for different alpha values and results are recorded in Tab. 2.

images

Figure 11: Test images: (a) Cameraman (b) House (c) Boats (d) Pepper10

images

According to Tab. 2 and Figs. 12a12c, the proposed work stego image generated of boats, cameraman and house for α = 0.01, 0.05 and 0.1; there is no structural difference between stego image and original cover image. Also, for α = 0.2 and 0.3 the structural difference is much less and better than previous image steganography technique.

images

Figure 12: Comparative SSIM visualization of proposed work and [23] for the different cover image and alpha value

The second, comparative study of the proposed work checked for PSNR value generated by the previous work [24]. The tested images shown in Figs. 13a and 13b, used in the previous work, were the City as a cover image, and the Baboon Image as a secret image. The proposed work is tested for given test images. The previous work employs the transform domain family's traditional discrete cosine transform (DCT) .The elliptic curve cryptography (ECC) is used for scrambling and the SegNet deep neural network is used to improve the steganography capacity. The result is generated for the PSNR difference between the stego image and the original cover image. The results generated from the proposed work are included in Tab. 3 and calculated for different alpha values.

images

Figure 13: Test images: (a) City (b) Baboon

images

According to the result discussion part of previous work [24], the higher PSNR value for the tested stego image is 42.00 dB. In the proposed work, the stego image difference from the original cover image is calculated for various alpha values. The average value of PSNR on different alpha values shows a better result as compared to the previous work [24].

4  Conclusions

In this study, the image steganography algorithm for hiding the secret image behind the grayscale cover image based on DWT, SVD, and division of grayscale image based on the threshold value is suggested. The threshold value-based image division gives the secret image scrambled view. The scrambled secret image provides the robustness necessary for the entire image steganography method [25]. The imperceptibility level of the stego image is analyzed based on PSNR, MSE, and SSIM values [26]. The comparative studies also show the successful completion of the proposed work. According to the result, there is no structural loss in the image quality of the stego image.

Acknowledgement: This work was supported by Taif university Researchers Supporting Project Number (TURSP-2020/114), Taif University, Taif, Saudi Arabia.

Funding Statement: This work was supported by Taif university Researchers Supporting Project Number (TURSP-2020/114), Taif University, Taif, Saudi Arabia.

Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

References

 1.  J. Qin, Y. Luo, X. Xiang, Y. Tan and H. Huang, “Coverless image steganography: A survey,” IEEE Access, vol. 7, pp. 171372–171394, 2019. [Google Scholar]

 2.  N. Subramanian, O. Elharrouss, S. Al-Maadeed and A. Bouridane, “Image steganography: A review of the recent advances,” IEEE Access, vol. 9, pp. 23409–23423, 2021. [Google Scholar]

 3.  S. Mukherjee, S. Roya and G. Sanyala, “Image steganography using Mid position value technique,” Procedia Computer Science, vol. 132, pp. 461–468, 2018. [Google Scholar]

 4.  M. H. Mahdi, A. A. Abdulrazzaq, M. S. Mo- Rahim, M. S. Taha, H. N. Khalid et al., “Improvement of image steganography scheme based on LSB value with Two control random parameters and multi-level encryption,” IOP Conference Series: Materials Science and Engineering, vol. 518, no. 5, pp. 052002, 2019. [Google Scholar]

 5.  S. Tyagi, R. K. Dwivedi and A. K. Saxena, “High-capacity steganography protected using shamir's threshold scheme and permutation framework,” International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol. 8, no. 9S, pp. 784–795, 2019. [Google Scholar]

 6.  H. Arora, C. Bansal and S. Dagar, “Comparative study of image steganography techniques,” in Int. Conf. on Advances in Computing, Communication Control and Networking (ICACCCN), Greater Noida (UPIndia, pp. 982–985, 2018. [Google Scholar]

 7.  M. Douglas, K. Bailey, M. Leeney and K. Curran, “Using SVD and DWT based steganography to enhance the security of watermarked fingerprint images,” Telkomnika, vol. 13, no. 2, pp. 125–132, June 2015. [Google Scholar]

 8.  S. Hemalatha, U. Acharya and A. Renuka-Priya Kamath “A novel colorImage steganography using discrete wavelet transform,” in Proc. of the Second Int. Conf. on Computational Science Engineering and Information Technology, Coimbatore, UNK India, pp. 223–226, 2012. [Google Scholar]

 9.  A. S. Ansari, M. S. Mohammadi and M. T. Parvez, “A Multiple-format steganography algorithm for color images,” IEEE Access, vol. 8, pp. 83926–83939, 2020. [Google Scholar]

10. N. Subramanian, O. Elharrouss, S. Al-Maadeed and A. Bouridane, “Image steganography: A review of the recent advances,” IEEE Access, vol. 9, pp. 23409–23423, 2021. [Google Scholar]

11. G. Prabakaran, R. Bhavani and K. Kanimozhi, “Dual transform based steganography using wavelet families and statistical methods,” in 2013 Int. Conf. on Pattern Recognition, Informatics and Mobile Engineering, Salem, India, pp. 287–293, 2013. [Google Scholar]

12. P. Yadav and S. Dhall, “Comparative analysis of steganography technique for information security,” International Journal of Mathematical Sciences and Computing, vol. 6, no. 4, pp. 42–69, 2020. [Google Scholar]

13. H. A. Ilgin and A. Akbulut, “An artifact reduction method for block-based video coding,” Communications Faculty of Sciences University of Ankara Series A2-A3: Physical Sciences and Engineering, vol. 62, no. 1, pp. 1–13, 2020. https://doi.org/10.33769/aupse.657684. [Google Scholar]

14. M. S. Subhedar and V. H. Mankar, “High-capacity image steganography based on discrete wavelet transform and singular value decomposition,” in Proc. of the 2014 Int. Conf. on Information and Communication Technology for Competitive Strategies-ICTCS’14, Udaipur, Rajasthan, India, no. 63, pp. 1–7, 2014. [Google Scholar]

15. N. M. Makbol, B. E. Khoo and T. H. Rassem, “Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics,” IET Image Processing, vol. 10, no. 1, pp. 34–52, 2016. [Google Scholar]

16. X. Ye, X. Chen, M. Deng and Y. Wang, “A SIFT-based DWT-SVD blind watermark method against geometrical attacks,” in 7th Int. Congress on Image and Signal Processing, Dalian, China, pp. 323–329, 2015. [Google Scholar]

17. J. Liu, Y. Ke, Z. Zhang, Y. Lei, J. Li et al., “Recent advances of image steganography with generative adversarial networks,” IEEE Access, vol. 8, pp. 60575–60597, 2020. [Google Scholar]

18. V. K. Sharma, D. K. Srivastava and P. Mathur, “Efficient image steganography using graph signal processing,” IET Image Processing, vol. 12, no. 6, pp. 1065–1071, 2018. [Google Scholar]

19. D. Tripathi and S. Sharma, “A robust 3-SWT multiple image steganography and contrast enhancement technique,” in Int. Conf. on Inventive Computation Technologies (ICICT), Coimbatore, India, pp. 1–6, 2016. [Google Scholar]

20. P. Singh, A. Agarwal and J. Gupta, “Image watermark attacks: Classification & implementation,” International Journal of Electronics & Communication Technology (IJECT), vol. 4, no. 2, pp. 95–100, 2013. [Google Scholar]

21. X. Li, S. T. Kim and I. K. Lee, “Robustness enhancement for image hiding algorithm in cellular automata domain,” Optics Communications, vol. 356, no. 1, pp. 186–194, 2015. [Google Scholar]

22. V. A. Kumar, C. Dharmaraj and C. S. Rao, “A hybrid digital watermarking approach using wavelets and LSB,” International Journal of Electrical and Computer Engineering (IJECE), vol. 7, no. 5, pp. 2483–2495, 2017. [Google Scholar]

23. F. K. Zaidan, “Digital image steganography scheme based on DWT and SVD,” Diyala Journal of Engineering Sciences, vol. 13, no. 4, pp. 10–17, 2020. [Google Scholar]

24. X. Duan, D. Guo, N. Liu, B. Li, M. Gou et al., “A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network,” IEEE Access, vol. 8, pp. 25777–25788, 2020. [Google Scholar]

25. D. Bagri and R. K. Kapoor, “Robustness against sharp and blur attack in proposed visual cryptography scheme,” International Journal of Advance Research, Ideas and Innovations in Technology, vol. 2, no. 4, pp. 1–8, 2016. [Google Scholar]

26. S. Mokhnache, T. Bekkouche and D. Chikouche, “A robust watermarking scheme based on DWT and DCT using image gradient,” International Journal of Applied Engineering Research, vol. 13, no. 4, pp. 1900–1907, 2018. [Google Scholar]

images This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.