Image steganography enables secure communication whether even intimating the enemy regarding the occurrence of communication. Steganography and cryptography play a vast role in rendering effective security for the secret data. However, when the presence of the secret message is revealed then, the secret message is disclosed, which is the major drawback of the existing strategies. Thus, the paper proposes an effective image sharing and steganography method using the Haar wavelet. There are two phases in this research: encoding and decoding phase. In the first phase, the encoding phase, where the secret message is embedded in the input image using the proposed Haar wavelet-based steganography, while in the decoding phase, the secret message is uncovered. In the decoding phase, the Lagrange's interpolation is applied that decodes the secret message from the stego or embedded image. The great significance of the method is that the greater degree of security is rendered against the security attacks and is a robust strategy for combining the secret sharing of messages and steganography. The analysis of the proposed method with respect to the existing methods is enabled using the 500 stego images acquired from the UCID database. The comparative analysis of the proposed method based on the metrics, such as Peak Signal-To-Noise Ratio (PSNR) and Structural Similarity (SSIM) index reveals that the proposed method acquired a maximal PSNR and SSIM of 57.142 dB and 0.9991, respectively.
Chang, C.C., Hsieh, Y.P., Lin, C.H., “Sharing secrets in stego images with authentication”, Pattern. Recogn, Vol. 41, No. 10, pp. 3130–3137,2008.
Lin, P.-Y., Chan, C.-S. “Invertible secret image sharing with steganography. Pattern. Recognition Letters”, Vol.31, No. 13, pp. 1887–1893, 2010,
Khosravi, M.J., Ghandali, S., “A secure joint wavelet based steganography and secret sharing method”, 7th International Conference on Information Assurance and Security (IAS), pp. 222–227, 2011.
Mohammad Javad Khosravi and Ahmad Reza Naghsh-Nilchi, "A novel joint secret image sharing and robust steganography method using wavelet", Multimedia Systems,Vol. 20, pp. 215–226, 2014.
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P., “Image quality assessment: from error visibility to structural similarity”, IEEE Trans. Imag. Process Vol. 13, pp. 600–612, 2004.
Noopa Jagadeesh, Aishwarya Nandakumar, P. Harmya, and S.S. Anju, " Secret Image Sharing Using Steganography with Different Cover Images", ACC 2011, Part II, CCIS 191, pp. 490–497, 2011.
Alexandre Santos Brandao ; David Calhau Jorge, "Artificial Neural Networks Applied to Image Steganography", IEEE Latin America Transactions, vol.14 , no.3, pp.1361 - 1366, 2016.
Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C., “Improvements of image sharing with steganography and authentication”, J. Syst.Softw. Vol. 80, No. 7, pp. 1070–1076, 2007.
Provos, N., Honeyman, P., “Hide and seek: an introduction to steganography”, IEEE. Secur. Priv. Mag, Vol. 1, No. 3, pp. 32–44, 2003.
Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication, J. Syst. Softw. Vol. 80, No. 7, pp. 1070–1076, 2007.
Fridrich, J., Goljan M., and Rui, D., “Detecting LSB steganography in color and gray-scale images”, IEEE. Multimed. Mag. pp. 22–28, 2001.
Ayidh Alharbi ) and M-Tahar Kechadi, "A Steganography Technique for Images Based on Wavelet Transform", International Conference on Future Data and Security Engineering FDSE 2017: Future Data and Security Engineering pp 273-281, 2017.
Hamad A. Al-Korbi, Ali Al-Ataby, Majid A. Al-Taee, and Waleed Al-Nuaimy, " Highly Efficient Image Steganography Using Haar Dwt For Hiding Miscellaneous Data", Jordanian Journal of Computers and Information Technology (JJCIT), ISSN: 2413-9351, Vol. 2, No. 1, April 2016.
Xin Wang, "Moving window-based double haar wavelet transform for image processing," in IEEE Transactions on Image Processing, vol. 15, no. 9, pp. 2771-2779, Sept. 2006.
B. Salzberg, "A Modification of Fletcher's Checksum," IEEE Transactions on Communications, vol. 31, no. 2, pp. 295-296, February 1983.
P. Meng, L. Hang, W. Yang, Z. Chen and H. Zheng, "Linguistic Steganography Detection Algorithm Using Statistical Language Model," 2009 International Conference on Information Technology and Computer Science, Kiev, 2009, pp. 540-543.
K. Joshi, R. Yadav and S. Allwadhi, "PSNR and MSE based investigation of LSB," 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), New Delhi, 2016, pp. 280-285.
Y. Zhou, M. Yu, H. Ma, H. Shao and G. Jiang, "Weighted-to-Spherically-Uniform SSIM Objective Quality Evaluation for Panoramic Video," 2018 14th IEEE International Conference on Signal Processing (ICSP), Beijing, China, 2018, pp. 54-57.