Robust Steganography Algorithm Text in the Image Using A Spread Spectrum Method

Author

Master's student, Shahid Sattari University of Aviation Sciences and Technology

Abstract

Due to the epidemic growing of telecommunication systems and new services, the demand for radio
frequency spectrum has greatly increased to the extent that the radio frequency spectrum has been a vital
source of value to radio communications.
Therefore, managing the efficient use of the frequency spectrum of the different technologies and different
services is very difficult. In the past, this was done by assigning a frequency spectrum for each service, But
another way to solve this problem is based on the characteristics of a modulation that shares the frequency
band without significant interference. This method is called spread spectrum modulation.
Spread spectrum steganography method uses a spread spectrum communication concept in which a narrowband
signal is transferred into a pseudo-noise signal. This method shows a very high ability to withstand
adverse interactions.
It also has security advantages of the encryption based on the keys used in the production of different strings
pseudo-random orthogonal - such as Gold strings.
To spread the message signal spectrum, the Hadamard matrix is used with appropriate statistical properties
of low cross-correlation.
In this paper we have studied Steganography by Hadamard matrix and it is compared with a simple method.

Keywords


[1] Joseli Mayer, Anderson Vieria Silveria Silverio, Jose Carlos M.
Bermudez, ―On the Design of Pattern Sequences for Spread
Spectrum Image Watermarking‖ International
Telecommunications Symposium- ITS 2002.
[2] Gary C. Kessler, An Overview of Steganography for the
Computer Forensics Examiner, Burlington, Vermont, June
2011.
[3] T. Morkel, J.H.P. Eloff, M.S. Olivier, An Overview Of Image
Steganography, Proceedings of the Fifth Annual Information
Security South Africa Conference(ISSA2005), Sandton, South
Africa, June/July 2005.
[4] A. Cheddad, J. Condell, ―Digital Image Steganography: Survey
and Analysis of Current Methods‖ Signal Processing, Vol.90,
Issue3, pp.727-752, 2010.
[5] Mrs. Kavitha, K. Kadam, ―Steganography Using Least
Signicant Bit Algorithm‖ Vol. 2, Issue 3, May-Jun 2012, pp.
338-341.
[6] Atallah M. Al-Shatnawi, ―A New Method in Image
Steganography with.
[7] Improved Image Quality‖ Applied Mathematical Sciences, Vol.
6, no. 79, pp. 3907 - 3915, 2012.
[8] E. Hussein, ― A Comparative Study of Digital Watermarking
Techniques in Frequency Domain‖ International Journal of
Computer Applications, Volume 52– No.20, pp.43-50, August
2012.
[9] G.L. Varco and W.Puech, ―DCT-based data hiding for securing
ROI of color image,‖ in proc. Of the IEEE International
Conference on Image Processing(ICIP), Genova,Italy,
vol.2,no.2,pp. 1086-1089, 2005.
[10] Avisha Khanna et al,"Lossless Compression based on Curvelet-
IWT" Int.J.Computer Technology & Applications,Vol 3 (1), pp.
431-436, feb. 2012.
[11] E. Candes, L. Demanet, D. Donoho , L.Ying, "Fast Discrete
Curvelet Transforms", Caltech, March 2006.
[12] P.Tao, S. Dexter, A. M. Eskicioglu, "Robust Digital Image
Watermarking in Curvelet Domain", Dept. of Computer
Science, Graduate Center & Brooklyn College, City University
of NewYork, 2006.
[13] L. Ying, L. Demanet and Emmanuel Cand`es, " 3D Discrete
Curvelet Transform", Applied and Computational Mathematics,
MC 217-50, Caltech, Pasadena, 2007.
[14] A. Mertins, " Wavelet, Filter Banks, Time Frequency
Transforms and Applications", translated by: Dr. M. H. Moradi,
Amir Kabir University, 2006. (in Persian)
[15] V. Natarajan, ―Blind Image Steganalysis Based on Contourlet
Transform‖ International Journal on Cryptography and
Information Security (IJCIS),Vol.2, No.3, September 2012.
[16] S. Masaebi, ―A New Approach for Image Hiding Based on
Contourlet Transform‖, International Journal of Electrical and
Computer Engineering (IJECE) Vol.2, No.5, pp. 699-708,
October 2012.
[17] P-P. Niu, et al, ―A novel color image watermarking scheme in
nonsampled contourlet-domain‖ ELSEVIER Expert Systems
with Applications38, pp.2081-2098, 2011.
[18] D. Liu, ―An Adaptive Watermarking Scheme Based on
Nonsubsampled Contourlet Transform for Color Image
Authentication‖ IEEE computer society, 2008.
[19] T. Bhattacharya, N. Dey, ―A Novel Session Based Dual
Steganographic Technique Using DWT and Spread Spectrum‖
International Journal of Modern Engineering Research
(IJMER), Vol.1, Issue1, pp.157-161, 2012.
[20] C. Xie, Y.Cheng, Y. Chen, ―Spread-Spectrum Steganalysis and
PN Sequence Estimation‖ IEEE 3rd International Congress on
Image and Signal Processing (CISP 2010), pp. 4143-4147,
2010.
Volume 2, Issue 3 - Serial Number 3
February 2020
Pages 77-83
  • Receive Date: 10 November 2013
  • Revise Date: 04 July 2023
  • Accept Date: 19 September 2018
  • Publish Date: 22 November 2014