A More Secure Information Hiding Technology for Digital Images Using DWT and DCT
Daqi Zhang,Shiru Qu,Baosheng Kang
DOI: https://doi.org/10.3969/j.issn.1000-2758.2007.03.012
2007-01-01
Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University
Abstract:Aim. To our knowledge, there does not exist any paper in the open literature dealing with information hiding technology using both DCT (Discrete Cosine Transformation) and DWT (Discrete Wavelet Transformation). We propose a novel information hiding technology that not only uses both DCT and DWT but also, more importantly, provides much better security than any other information hiding method we know. In the first two sections of the full paper, we explain our novel hiding technology in detail. In this abstract, we briefly describe the three main things we do in the first two sections; (1) DCT coefficients of the secret image are hidden into DWT domain of the public image; (2) to enhance the robustness of recovering algorithm, we choose the maximum value of the same position in detail coefficient matrixes in three directions at level N of the two-dimensional wavelet decomposition for the public image to form carrier for embedding the secret image or data; (3) we use the ZF-02 algorithm, whose initial private keys are generated by chaotic sequence, to scramble the partial DCT coefficients of the secret image for the purpose of enhancing the security of the hiding system. In the third section of the full paper, we give numerical simulation results, which are summarized in Table 1 and Figs.2 and 3, and then analyze them. In the fourth section of the full paper, we analyze the security performance of our novel hiding technology and find preliminarily that it possesses three advantages: (1) the scheme can eliminate the secret image's profile in the blended image, as shown in Fig.2; (2) the PSNR (Peak Signal to Noise Ratio) of the blended image and the recovered one are 38.9239 dB and 31.2503 dB respectively, as shown in Table 1; (3) the performance of this scheme is robust (shown in Fig.3), capable of resisting many attacks, especially compressing in DWT domain of the blended image.