Hiding Coded Speech in Color Images using Zaslavsky-Map and AMBTC Technique
DOI:
https://doi.org/10.29304/jqcm.2023.15.3.1272Keywords:
AMBTC, DCT, DWT, Zaslavsky map, speech hidingAbstract
The idea of hiding information is to shield a powerful message in public records. The present application-based hidden information is sensitive information disguised in many testing sectors, such as watermarking, fingerprinting, and steganography, which is the art of covered or hidden writing, which is covert contact with coded communications to hide the presence of a document on a communication channel from hostile attackers. This paper presents hiding speech in a coded image, depending on the quantization and discrete wavelet transformation (DWT). The proposed method used the discrete wavelet transform on a three-color band of covered images. Moreover, the term AMBTC which refers to “Absolute Moment Block Truncation Coding” is used for hiding information. The secret information is a short speech (representing a password for example) embedded based on the quantization level modification technique, which will be hidden in a codded image. The three color-bands of the image are transformed using discreet wavelet transform all decomposed regions are used for hiding except the Low-Low band is kept without any change to get high quality of the stego-image with respect to original image. In the bitmap, the secret bits of a speech data are replaced. The experimental results produced an average of PSNR for tested images is about 35.0. Secret speech is compressed using discrete cosine transform (DCT) about (35%-40%), and the result is converted to a binary form that will be embedded in a color image.
Downloads
References
[2] M. Hariri, R. Karimi, and M. Nosrati, "An introduction to steganography methods," World Applied Programming, vol. 1, no. 3, pp. 191-195, 2011.
[3] A. Febryan, T. W. Purboyo, and R. E. Saputra, "Steganography Methods on Text, Audio, Image, and Video: A Survey," International Journal of Applied Engineering Research, vol. 12, no. 21, pp. 10485-10490, 2017.
[4] M. Dhaundiyal and S. Nikumbh, "Color image steganography based on wavelet transform," Int J Comput Appl, pp. 31-34, 2014.
[5] S. A. Seyyedi and R. K. Sadykhov, "Digital Image Steganography Concept and Evaluation," International Journal of Computer Applications, vol. 66, no. 5, 2013.
[6] N. Hamid, A. Yahya, R. B. Ahmad, and O. M. Al-Qershi, "Image steganography techniques: an overview," International Journal of Computer Science and Security (IJCSS), vol. 6, no. 3, pp. 168-187, 2012.
[7] M. J. Joshi, Z. H. Shah, and K. N. Brahmbhatt, "Watermarking in DCT-DWT Domain," International Journal of Computer Science and Information Technologies, vol. 2, no. 2, pp. 717-720, 2011.
[8] Hamza, R., & Titouna, F. (2016). A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Information Security Journal: A Global Perspective, vol.25, No.4-6, pp162–179.
[9] W. Hong, T. S. Chen, Z. Yin, B. Luo, and Y. Ma, "Data hiding in AMBTC images using quantization level modification and perturbation technique," Multimedia tools and applications, vol. 76, no. 3, pp. 3761-3782, 2017.
[10] O. A. Alkishriwo, "An image encryption algorithm based on chaotic maps and discrete linear chirp transform," arXiv preprint arXiv:1807.02647, 2018.
[11] T. T. Xia; J. Lin; C. C. Chang; T. C. Lu" Reversible data hiding scheme based on the AMBTC compression technique and Huffman coding", International Journal of Computational Science and Engineering, Vol. 22, No. 4, 2020.
[12] Gaata, Methaq Talib, Younis, Muhanad Tahrir, Hasoon, Jamal N. and Mostafa, Salama A.. "Hessenberg factorization and firework algorithms for optimized data hiding in digital images" Journal of Intelligent Systems, vol. 31, no. 1, 2022, pp. 440-453. https://doi.org/10.1515/jisys-2022-0029