Keywords

1 Introduction

Digital data transmission over the internet is the most popular source to share secrete information now days. Advanced medium has acquired a lot of significance nowadays and is turning into the dependable mechanism for the exchange of data. With the improvement and induction of web to everybody, it has become simpler and conceivable to copy and to disseminate the computerized data misguidedly. Carefully communicated information can be unimaginative with no deficiency of information and its quality too, which is a major issue to the security, credibility and ownership to the proprietor of the information [1].

From history of numerous years, individuals have been attempting to foster best in class procedures for secret correspondence. The three strategies related to security systems are interlaced; steganography, watermarking and cryptography. Both the procedures of cryptography and steganography used for treatment of data and information to encode and cover them exclusively. Both the systems are extensively known and used. Steganography covers the presence of information however cryptography calculates a message with the objective that it can’t be seen. In explicit cases, sending the code information draws the thought, while the hidden information doesn’t. The foundation of a stenographical mixed structure can be assessed through key parts like intangibility and breaking point. Impalpability shows the difficulty to choose the mysterious message. The other measure limit shows the best proportion of secret message or data that can be concealed securely, and strength, which implies that how fine the steganography system counterattacks the extraction of introduced data. The structure of steganography is displayed in Fig. 1, according to the steganography subdivision; four main categories play important role with their special characteristics. The most common and oldest techniques come in spatial domain categories. Least significant bit replacement and matching are the most popular methods in this category. The spatial domain is easy to use but it has also had drawbacks in information security upcoming techniques like frequency domain, spread spectrum, and other feature extraction techniques strengthen the security of data in image steganography.

Fig. 1.
figure 1

Flowchart of steganography techniques.

The paper is subdivided in sections: Sect. 2 contains the introduction about transform domain, Sect. 3 contains wavelet family introduction, and Sect. 4 include the conclusion of the transform domain techniques.

2 Literature Survey on Transform Domain Techniques

The image steganography used transform domain method very frequently; in transform domain method first step is to transform the cover image into different domain. In the second step transformed coefficients used to hide the secret information. The transform domain transformed back into spatial domain to get stego image. The main characteristic of transform domain is use of signal processing operations. There are different kind of transform domain method are available, let’s look into them one by one.

2.1 Discrete Cosine Transform

One of the main current conversations in picture improvement is the Discrete Cosine Transform (DCT) strategy. A DCT is another well-known strategy utilized in light of the fact that it is quick and powerful. The essential capacity of DCT is to change signals from the spatial portrayal into the frequency portrayal [2]. Many fields those are not related to the scientific field also use the DCT for their application development common applications are picture editing, picture formation. One of the important applications in the field of DSP is video conferencing. The DCT is used in change for data pressure. DCT is an even change, which has a fair course of action of reason work [3].

Fig. 2.
figure 2

Segment of an image in 8 × 8 pixel blocks using DCT.

See Fig. 2, if the image contains red, green and blue components then at the time of sampling they are divided in blocks. In \(8 \times 8\) pixel array starts at the upper right at \((\mathrm{0,0})\) and finish at the lower right at \((\mathrm{7,7})\). At the point \((x, y)\) the data value is \(f (x,y).\) Here \(x\) and \(y\) represent the coordinate in image blocks.

2.2 Discrete Wavelet Transform

The digital images use DWT, there are many DWTs are available. According to the properties of wavelet application appropriate wavelet are selected from DWT family. The essential work design of DWT is deterioration picture in 4 sub-groups named as: LL, HL, LH and HH. The LL sub band contains the main components of the picture. So according to the image embedding requirement sub band are used to store the secret information. There are many types of wavelets are available let’s take a look in Sect. 3 how they are work and how they are different to each other [4].

2.3 Discrete Fourier Transform

In the field of advanced sign preparing discrete fourier transform (DFT) is very important tool. In image steganography DFT can be used in three possible ways. First, by using the DFT signal’s frequency spectrum calculation which is directly examine the encoded frequency, phase, and amplitude of the image sinusoids signal. Second, DFT able to discover a framework’s motivation reaction and framework’s recurrence reaction, as well as the other way around. Third, DFT help in more elaborate signals intermediate steps. The DFT is exceptionally helpful symmetrical changes and have been viewed as the critical advances for signal handling in symmetrical recurrence division multiplexing correspondence frameworks [5].

Fig. 3.
figure 3

Transform DFT data from time domain to the frequency domain.

According to the Fig. 3, if DFT apply on N tests of time-space the outcome likewise is of length N tests, yet the data it contains is of the frequency domain representation.

3 Wavelet Family

3.1 Haar Wavelet

Haar wavelet is the oldest wavelet in wavelet family, the simplicity of the haar wavelet makes it more popular. It is also known as symmetric wavelet in mathematical operation it is known as haar transform. The haar transform give a generalized model for all other wavelet transform. In mathematics, haar create sequence of rescaled square shapes. The main advantage of using haar is simplicity, speed, memory efficiency and disadvantage is that it is in contiguous [6].

Fig. 4.
figure 4

Haar wavelet.

Figure 4 show the haar transform, consider transforming the single seismic trace. The trace consists two zones, a weak zone on the left side, and a strong zone on the right side.

3.2 Daubechies Wavelet

Daubechies wavelets are the most notable wavelets. They address the foundations of wavelet signal getting ready and are used in various applications. These are similarly called Maxflat wavelets as their repeat responses have most noteworthy equity at frequencies 0 and π. Daubechies and haar wavelet are almost similar the main contrast between them comprises in how these scaling signs and wavelets are characterized. The debaucheries family wavelet knows with name dbN see (Fig. 5), where db is surname and N is the order of wavelet [6].

Fig. 5.
figure 5

Daubechies wavelet family.

3.3 Coiflets

Coiflets designed by Ingrid Daubechies, at the request of Ronal Coifman, to have scaling function with vanishing moments. It means the Coiflet wavelet can use the wavelet with the greater number of vanishing moments for analysis resulting in a sparse representation. The reconstruction part needs smoother wavelet support. The Coiflets family wavelet knows with name coifN see (Fig. 6), where coif is surname and N is the order of wavelet [7].

Fig. 6.
figure 6

Coiflets wavelet family.

3.4 Symlet

Symlet wavelets are the changed variation of Daubechies wavelets with extended balance. They are similarly estimations and moderately maintained wavelets The scaling channels utilized are close immediate stage channels and the effect of Symlet is practically same as those of the Daubechies wavelets. The Symlet wavelet and scaling activity for demands are as show below in Fig. 7:

Fig. 7.
figure 7

Symlet wavelet function and scaling functions.

The Symlet wavelets are otherwise called Daubechies’ smallest disproportionate wavelets however they are more symmetric.

3.5 Biorthogonal Wavelet

In image and signal reconstruction linearity is the important aspect. The biorthogonal wavelet gives more control over image reconstruction than an orthogonal wavelet. The image is reconstructed similar with the help of filters impulse response. The reverse biorthogonal wavelet constructed with the help of pair of biorthogonal wavelets [8].

Fig. 8.
figure 8

Biorthogonal wavelet.

The resulting spline biorthogonal wavelets for \((p=4, \widehat{p}=4)\) is illustrated in Fig. 8.

3.6 Reverse Biorthogonal Wavelet

The reverse biorthogonal wavelet otherwise called rbio, it is a sort of wavelet which is corresponded to a wavelet change. It isn’t basically symmetrical yet using reverse biorthogonal wavelet, gives an open door in arranging in any system appear differently in relation to even wavelets, for case, the possibility in fostering the symmetric wavelet limits [9].

3.7 Meyer Wavelet

Meyer wavelet is a classic wavelet, it has many good properties. The haar and daubechies wavelet are support orthogonal wavelets but with the help of meyer wavelet they are able to reconstruct perfect image quality. This is achieved due to the properties of meyer wavelet like induction vastly, perfection, lessens quickly and its range is limited, meyer wavelet is gainful to mathematical ascertain, so it applies generally in designing majors [10].

Fig. 9.
figure 9

Meyer wavelet.

Figure 9, shown the meyer wavelet, its smoothness, sufficient decay, vanishing mean and oscillatory behavior with diverse oscillation scan can be seen from the figure.

3.8 Curvelet Transform

The curvelet transform is analysis tool which is used in multiscale geometric objects. The objects include the curve inside of it. The curvelet development motive is to improve the traditional transformations work on curves and edges. The best result of curvelet came if the image contains the curves. The previous research on curvelet proof that the curvelet small scale coefficient better than wavelet’s high frequency coefficients. The curvelet implement in image steganography by two methods:

  1. (i)

    Using Wrapping Method.

  2. (ii)

    Using Fast Fourier Transformation algorithm (FFT).

The recommended technique for curvelet varies by the spatial lattice decision. The job of spatial network decision is too used the decipher curvelet coefficients at each scale and point. The result of both methods is in form of curvelet coefficient table. The coefficient table listed the curvelet coefficient according to the spatial location, angle and scaling factor [11]. Type of Curvelet Transform:

Continuous-Time Curvelet Transform.

The Curvelet work on two-measurement information type like picture. The hub of these two measurements addresses spatial variable and recurrence space variable x, ω separately. Recurrence space has two polar directions r and θ [12]. The curvelet change characterized in two windows these windows notice the materialness conditions. The windows know as spiral window {W(r)}, and precise window {V (t)}. The mathematical representation of this window is:

$$\mathop{\sum}\nolimits_{j= -\infty }^{\infty }{W}^{2}\left({2}^{j}r\right)=1, r\in \left(\frac{3}{4}, \frac{3}{2}\right),$$
(1)
$$\mathop{\sum}\nolimits_{j= -\infty }^{\infty }{V}^{2}\left(t - l\right)= 1, t\in \left(-\frac{1}{2},\frac{1}{2}\right).$$
(2)

The radial window and angular window support the polar “wedge”, represented as Uj. The representation of Uj in fourier domain is:

$${U}_{j }\left(r,\theta \right)= 2^{-3 j \big/ 4}\, W\left({2}^{-j}r\right)V\left(\frac{{2}^{\lfloor j/2\rfloor \theta }}{2\pi }\right)$$
(3)
Fig. 10.
figure 10

Curvelet tiling of space and frequency [2].

Figure 10, induced tiling of the frequency plane and spatial cartesian grid associated with a given scale and orientation.

Fast Discrete Curvelet Transform via Wrapping.

The wrapping based curvelet is the new innovation in the field of curvelet change. The wrapping based curvelet change is a multiscale pyramid; the pyramid contains many sub groups. The sub groups are arranged on various sizes of various directions and positions in the recurrence space. The 2D picture is utilized in wrapping of fourier examples as information. The picture cluster is as cartesian exhibit f [m, n], where the scope of m lies between 0 to M and n lie between 0 to N. Here, the M and N are the elements of the cluster [11].

$${c}^{D }\left(j,l,{k}_{1, }{k}_{2}\right)= \mathop{\sum}\nolimits_{0\le n<N}^{0\le m<M}f\left[m,n\right]{\upphi }_{j,l,{k}_{1},{k}_{2}}^{D} \left[m,n\right]$$
(4)

According to the Eq. (4), the output collected in to the curvelet coefficients \({c}^{D }\left(j,l,{k}_{1, }{k}_{2}\right)\) indexed by scale \(j\), an orientation \(l\) and spatial location parameters \({k}_{1}\) and \({k}_{2}\).

Fig. 11.
figure 11

5-level fast discrete curvelet transform via wrapping.

Figure 11, illustrates the whole image represented in spectral domain in the form of rectangular frequency tiling by combining all frequency responses of curvelets at different scales and orientation.

3.9 Tetrolet Transform

The tetrolet transform work on the basic structure of Haar filter. The Haar filter divided the 2D image in four blocks according to the low pass and high pass filter. The size of the block in Haar is 2 × 2 square, but in tetrolet the image divided in 4 × 4 blocks in horizontal and vertical direction. The block is not overlapping each other because the image is also not overlap. Each block divided fit for another block available in the subdivision [13]. Sometime the size of image not able to divide in four parts in that case tetrolet transform uses the zero-padding [14]. There are five shapes see (Fig. 12) available to represent the tetrolet transform they are named as:

  1. 1.

    Square-O-Type

  2. 2.

    Rectangle-I-Type

  3. 3.

    T-Type

  4. 4.

    S-Type

  5. 5.

    L-type

Fig. 12.
figure 12

5-shapes of the tetrominores [15].

After the locating work of tetrominores, the pixels of 4 × 4 blocks are rearranged according to TT rules see (Fig. 13). The image is reform by the tetrominores with the help of haar wavelet transform.

Fig. 13.
figure 13

A combination of tetrominores for a 4 × 4 pixel block [15].

The decomposition of the tetrolet complete in four steps, the steps are as follows [16]:

  1. 1.

    Divide the 2D image into 4 × 4 blocks.

  2. 2.

    For each block find the sparsest tetrolet representation.

  3. 3.

    Low and high pass coefficients rearrange into 2 × 2 block into every subdivide block.

  4. 4.

    The high- pass part or tetrolet coefficients store.

Repeat step 1 to 4 to the low-pass image.

4 Wavelet Selection

Selection of correct wavelet depend upon different wavelets analysis tests. Different wavelet properties also show impact on wavelet selection such as orthogonality, compact support, symmetry, and vanishing moment. The wavelet family with its properties presented in the following Table 1.

Table 1. The wavelet family with its properties.

Were Nr, Nd, and N are the orders: r for reconstruction and d for decomposition [17].

5 Comparative Study Between DCT, DWT, and DFT

The 32 × 32 binary image resolutions used as an secret. This image will embed on image with 65536 total pixel amount, since 1 pixel of binary image will embed on 8 × 8 image sub-block. Figure 14(a) is used as a secret image and Fig. 14(b) as a cover image.

Fig. 14.
figure 14

(a) Secrete image, (b) Cover image [18].

Table 2 shows the results of embedding secrete image to the Low Frequency (LF), Middle Frequency MF, and Highest Frequency (HF) of cover image.

Table 2. PSNR results of image watermark in DCT, DFT, and DWT [18].

6 Comparative Study Between Daubechies and Cofilet Wavelet

The properties of different wavelet discuss in Table 1, according to the properties Daubechies and Confilet wavelet have many similarities but the vanishing point of Confilet is more than Daubechies wavelet. In this section, the results are obtained at 3rd level of decomposition [19]. The MATLAB tool is used to obtain the results. The result analyzed on Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), and Signal to Noise Ratio (SNR) factors. Here, two images taken for result analysis as shown in Fig. 15 (a-b).

Fig. 15.
figure 15

(a) Lena image (b) Barbara image.

Table 3. Result comparison between Daubechies and Coiflet wavelet filters [19].

Table 3, clearly represent the Coiflet wavelet give better result for both images. The selection of correct wavelet gives better result on different comparison factors. The graphical representation of result show in Fig. 16, and Fig. 17.

Fig. 16.
figure 16

Comparison between Daubechies and Coiflet result on Lena image.

Fig. 17.
figure 17

Comparison between Daubechies and Coiflet result on Barbara image.

7 Conclusion

In this paper, we have surveyed a transform domain image steganography technique, which is used for texture retrieval of image. This work is based on the adaptability of transform domain according to image geometry in frequency domain. The main focus of this paper is on wavelet method for image steganography, according to the study haar wavelet is the oldest one which create base for other wavelet techniques. The older wavelet is very easy to use because they break the image in four squares according to the low and high pass filters but this structure also makes them common. The curvelet and tetrolet wavelet introduce new feature in the traditional wavelet family. Curvelet give better results if your image contains the curves because the curvelet work on angular concept, at the same place on the off chance that we talk about the tetrolet, tetramines adjusts as indicated by picture math. In this way, there is no need of taking explicit bearings, rather picture calculation is thought about. We trust that this study will assist analysts with choosing the best calculation and component extraction techniques to meet their necessities.