Volume 20 No 8 (2022)
Download PDF
A Novel Image Steganography Method using Optimal Pixel Selection with Discrete Wavelet Transform
Sivasankari, Krishnaveni Sakkarapani
Abstract
Data security comprises of concealing secret image, documents, audio or video on any other files
with an intention of preserving the secret data from the attacker. Several works available in the
literature reported that the steganography have the risk of secret information being repossessed by
anunidentifiedperson. Therefore, an effective encryption-based image steganography technique is
essential. This paper presents a new Optimal Pixel Selection with Discrete Wavelet Transform (DWT)
based Image Steganography Method called OPSDWT-ISM. The presented OPSDWT-ISM model
involves both encryption and steganography processes. Primarily, the discrete wavelet transform
(DWT) technique is applied for the image decomposition process. Afterward, the optimal pixel points
will be chosen using butterfly optimization algorithm (BOA). At the same time, the secret image is
also decomposed into three individual R, G, and B elements which are then encrypted using data
encryption standard (DES), blowfish, and Arnold cat map techniques respectively. Finally, the
encrypted images are embedded to the chosen pixel points of the cover image. At the receiver side,
inverse DWT process is employed followed by decryption and extraction for the retrieval of secrete
image. A detailed experimentation analysis showcased the betterment of the presented model over
the existing methods under distinct dimensions.
Keywords
Data security, Steganography, Encryption, DWT, Pixel selection
Copyright
Copyright © Neuroquantology
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.