An Improved RDWT-based Image Steganography Scheme with QR Decomposition and Double Entropy

This paper introduces an improved RDWT-based image steganography with QR decomposition and double entropy system. It demonstrates image steganography method that hides grayscale secret image into grayscale cover image using RDWT , QR decomposition and entropy calculation. The proposed scheme made us...

Full description

Saved in:
Bibliographic Details
Main Authors: Ng, Ke-Huey, Liew, Siau-Chuin, Ernawan, Ferda
Format: Article
Language:English
Published: The Science and Information (SAI) Organization Limited 2020
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/28052/7/An%20Improved%20RDWT-based%20Image%20Steganography%20Scheme.pdf
http://umpir.ump.edu.my/id/eprint/28052/
https://dx.doi.org/10.14569/IJACSA.2020.0110327
https://dx.doi.org/10.14569/IJACSA.2020.0110327
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.ump.umpir.28052
record_format eprints
spelling my.ump.umpir.280522020-04-28T07:28:49Z http://umpir.ump.edu.my/id/eprint/28052/ An Improved RDWT-based Image Steganography Scheme with QR Decomposition and Double Entropy Ng, Ke-Huey Liew, Siau-Chuin Ernawan, Ferda QA76 Computer software This paper introduces an improved RDWT-based image steganography with QR decomposition and double entropy system. It demonstrates image steganography method that hides grayscale secret image into grayscale cover image using RDWT , QR decomposition and entropy calculation. The proposed scheme made use of the human visual system (HVS) in the embedding process. Both cover and secret image are being segmented into non-overlapping blocks with identical block size. Then, entropy values generated from every image block will be sorted from the lowest value to the highest value. The embedding process starts by embedding the secret image block with lowest entropy value into the cover image block with lowest entropy value. The process goes on until all image blocks have been embedded. Embedding secret image into cover image according to the entropy values causes differences that HVS can less likely to detect because of the small changes on image texture. By applying the double entropy system, proposed scheme managed to achieve a higher PSNR value of 60.3773 while previous work gave a value of 55.5771. In terms of SSIM value, proposed scheme generated a value of 0.9998 comparing to previous work’s value of 0.9967. The proposed scheme eliminated the false-positive issue and required low computational time of only 0.72 seconds for embedding and 1.14 seconds for extraction process. Also, it has shown better result compared to previous work in terms of imperceptibility. The Science and Information (SAI) Organization Limited 2020 Article PeerReviewed pdf en cc_by_4 http://umpir.ump.edu.my/id/eprint/28052/7/An%20Improved%20RDWT-based%20Image%20Steganography%20Scheme.pdf Ng, Ke-Huey and Liew, Siau-Chuin and Ernawan, Ferda (2020) An Improved RDWT-based Image Steganography Scheme with QR Decomposition and Double Entropy. International Journal of Advanced Computer Science and Applications (IJACSA), 11 (3). pp. 222-231. ISSN 2156-5570(Online) https://dx.doi.org/10.14569/IJACSA.2020.0110327 https://dx.doi.org/10.14569/IJACSA.2020.0110327
institution Universiti Malaysia Pahang
building UMP Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Pahang
content_source UMP Institutional Repository
url_provider http://umpir.ump.edu.my/
language English
topic QA76 Computer software
spellingShingle QA76 Computer software
Ng, Ke-Huey
Liew, Siau-Chuin
Ernawan, Ferda
An Improved RDWT-based Image Steganography Scheme with QR Decomposition and Double Entropy
description This paper introduces an improved RDWT-based image steganography with QR decomposition and double entropy system. It demonstrates image steganography method that hides grayscale secret image into grayscale cover image using RDWT , QR decomposition and entropy calculation. The proposed scheme made use of the human visual system (HVS) in the embedding process. Both cover and secret image are being segmented into non-overlapping blocks with identical block size. Then, entropy values generated from every image block will be sorted from the lowest value to the highest value. The embedding process starts by embedding the secret image block with lowest entropy value into the cover image block with lowest entropy value. The process goes on until all image blocks have been embedded. Embedding secret image into cover image according to the entropy values causes differences that HVS can less likely to detect because of the small changes on image texture. By applying the double entropy system, proposed scheme managed to achieve a higher PSNR value of 60.3773 while previous work gave a value of 55.5771. In terms of SSIM value, proposed scheme generated a value of 0.9998 comparing to previous work’s value of 0.9967. The proposed scheme eliminated the false-positive issue and required low computational time of only 0.72 seconds for embedding and 1.14 seconds for extraction process. Also, it has shown better result compared to previous work in terms of imperceptibility.
format Article
author Ng, Ke-Huey
Liew, Siau-Chuin
Ernawan, Ferda
author_facet Ng, Ke-Huey
Liew, Siau-Chuin
Ernawan, Ferda
author_sort Ng, Ke-Huey
title An Improved RDWT-based Image Steganography Scheme with QR Decomposition and Double Entropy
title_short An Improved RDWT-based Image Steganography Scheme with QR Decomposition and Double Entropy
title_full An Improved RDWT-based Image Steganography Scheme with QR Decomposition and Double Entropy
title_fullStr An Improved RDWT-based Image Steganography Scheme with QR Decomposition and Double Entropy
title_full_unstemmed An Improved RDWT-based Image Steganography Scheme with QR Decomposition and Double Entropy
title_sort improved rdwt-based image steganography scheme with qr decomposition and double entropy
publisher The Science and Information (SAI) Organization Limited
publishDate 2020
url http://umpir.ump.edu.my/id/eprint/28052/7/An%20Improved%20RDWT-based%20Image%20Steganography%20Scheme.pdf
http://umpir.ump.edu.my/id/eprint/28052/
https://dx.doi.org/10.14569/IJACSA.2020.0110327
https://dx.doi.org/10.14569/IJACSA.2020.0110327
_version_ 1665895001875283968
score 13.149126