**Scaling Factor Threshold Estimator in Different Color Models Using a Discrete Wavelet Transform for Steganographic Algorithm**

Blanca Esther Carvajal-Gámez, Erika Hernández Rubio and Amilcar Meneses Viveros

Additional information is available at the end of the chapter

http://dx.doi.org/10.5772/61729

#### **Abstract**

Two of the main problems with steganographic algorithms are insertion capability and minimization of distortion in the digital files where the hidden information is the information is inserted to hiding Digital filters are generally used as noise detectors, and they also suppress information outside the original information contained in the file. There are different types of filtering, one in the spatial domain and the other in the frequency domain or sometimes a combination of both domains to propose adaptive filters. One of the filters with greater application is the discrete wavelet transform (DWT) because it is easy to implement and has low computational complexity. The DWT computationally implemented in an image can be represented as a quadrature mirror filter, separating the frequency components: so high-high, high-low, low-high and low-low levels obtain different resolutions.

Using the scaling factor the DWT, adjusting the distortion of the image filtered help for noise detection, and eases the insertion of the data to hide. The DWT is applied to each new sub-image for does not generate a pattern of data distribution because each time an image is processed, it is often statistically and spatially changed.

Therefore, the steganographic algorithm can go through a stego-analyzer without data detection problem because the color palette is not affected. For this case study, the best result is when variable j = 10.

**Keywords:** Steganographic algorithm, digital filters, frequencial domain, spatial domain, discrete wavelet transform

© 2015 The Author(s). Licensee InTech. This chapter is distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

#### **1. Introduction**

Hiding information concerns the process of integrating information or data elements into music, video, and images [1]. The concept of information hiding had also been proposed to solve problems related to intellectual property protection that depends directly on a team of background work for its realization, and its distribution must be controlled, or even protection of personal information with a high degree of confidentiality such as agreements, contracts, or other information that should be secured. To send information to a file imperceptibly seems totally innocent, at first, and such a file is known as a carrier file or host file (known as a host image or cover image).These files are carriers of embedded information; they can be any digital files such as audio files, video files or image files. For intellectual property protection and for secure delivery of information on unprotected media, various techniques have been imple‐ mented that have given rise to the emergence of the science of encryption, watermarking, and steganography. For the first technique, the message will not make any sense unless acquired by the intended recipient or to whom the message is addressed, as this will be the interpretation of each of the written symbols within the message. For watermarking, this is related to protecting the authenticity of media messages exposed, susceptible to cloning or replication. With watermarks, its authenticity is guaranteed. Finally, we have steganography, which is the technique used to hide information in a seemingly innocent means to be sent over an unsecured medium or channel. A common example is the wireless medium, which is fully exposed and for anyone with enough malice to access information, it can be done without any problem. For the goals of steganography to be met, there are three considerations: (i) high capacity for integration, (ii) high quality of stego-image and (iii) full recovery of the inserted information. The images with the inserted information are called stego-image; the information must be inserted in areas that are statistically and perceptually not easy to locate on demand and stegotools such as analyzers. The stego-image should be, in theory and in practice, identical to the host image. The embedded information in the stego-image can only be removed by the receiver that has the primary key, otherwise, the information cannot be extracted. The stego-image is then sent to the intended recipient. The information contained in the host image is just a distraction to the receiver, so this is not so much of an interest in its full recovery, but the host image must have the minimum quality because any edge, contour,, color or misplaced pixels can cause some suspicion and is susceptible to the extraction of the hidden information without authorization from the transmitter. Most importantly, the hidden information must be fully recoverable. In today's advanced and modern world, steganography is vital because it is a support tool to copyright protection, for which the authentication processes allow distribution and legal use of different materials. A steganographic technique is usually evaluated in terms of the visual quality and the embedding capacity; in other words, an ideal steganographic scheme should have a large embedding capacity and excellent stego-object visual quality.

One of the main objectives of steganography is not sacrifice image quality as the carrier to be inserted to this data. And likewise keeping track information retrieved data. Because any disturbance visual may cause some reason for inspection of its content through histograms or specialized software.

The more reasonable way to deal with this trade-off situation is probably to strike a balance between the two [2, 3, 4].

The techniques implemented in steganography have evolved as needs related to security level and insertion capability have also increased, due to the growing trend in the digital distribution of files over public networks. There are several proposed techniques applied to steganography, including the space where the most representative method algorithm is the modification of the least significant bit (LSB) of the pixel, and from this algorithm, optimizations have emerged such as the LSBO, among others [5].

Subsequently, frequency techniques for image processing such as the discrete Fourier trans‐ form (DFT), discrete cosine transform of (DCT), and the discrete wavelet transform (DWT) have also emerged.

More recently, adaptive methods, take the qualities of the spatial domain and the frequency domain. These latest adjustments have yielded good results; however, few authors consider the three criteria for steganographic algorithms. In adaptive methods, statistical variations are considered image through variance, standard deviation, covariance, etc.

These statistics variations detected in images in conjunction with filtering images using the DWT techniques are useful and important to execute noise detectors within the image. These noisy areas are imperceptible to the human eye, so the eye does not see that some information have been inserted outside the original image. The human eye is less sensitive to detect certain imperfections contained in the processed images, these characteristics are due to the textures contained in the images that are shown as changes in intensity. These abrupt changes in intensity are contained in the high frequency band, which are obtained from the image processing by DWT [6].

In applications where the frequency domain is involved, depending on the nature of the image used as host, this image can be altered significantly when the digital filters applied act as noise detectors. Judging by whether the human vision sensitivity is considered in the design of the embedding algorithm, we can categorize the schemes into three types: (1) high embedding capacity schemes with acceptable image quality [2-4], (2) high image quality schemes with a moderate embedding capacity [2-4], and (3) high embedding efficiency schemes with a slight distortion [7,8]. This chapter explains how to reduce the effects of the filters on images using the scale factor proposed in this research. This scale factor will be working in the wavelet domain. Applying the scaling factor, the energy generated by the host image is preserved to approximate the original image, eliminating any visual disturbance. This chapter is divided into the following sections: Section 2. Materials and methods, Section 3. Theory and calcula‐ tions, Section 4. Discussion and Section 5. Conclusions.

### **2. Materials and methods**

**1. Introduction**

64 Wavelet Transform and Some of Its Real-World Applications

specialized software.

Hiding information concerns the process of integrating information or data elements into music, video, and images [1]. The concept of information hiding had also been proposed to solve problems related to intellectual property protection that depends directly on a team of background work for its realization, and its distribution must be controlled, or even protection of personal information with a high degree of confidentiality such as agreements, contracts, or other information that should be secured. To send information to a file imperceptibly seems totally innocent, at first, and such a file is known as a carrier file or host file (known as a host image or cover image).These files are carriers of embedded information; they can be any digital files such as audio files, video files or image files. For intellectual property protection and for secure delivery of information on unprotected media, various techniques have been imple‐ mented that have given rise to the emergence of the science of encryption, watermarking, and steganography. For the first technique, the message will not make any sense unless acquired by the intended recipient or to whom the message is addressed, as this will be the interpretation of each of the written symbols within the message. For watermarking, this is related to protecting the authenticity of media messages exposed, susceptible to cloning or replication. With watermarks, its authenticity is guaranteed. Finally, we have steganography, which is the technique used to hide information in a seemingly innocent means to be sent over an unsecured medium or channel. A common example is the wireless medium, which is fully exposed and for anyone with enough malice to access information, it can be done without any problem. For the goals of steganography to be met, there are three considerations: (i) high capacity for integration, (ii) high quality of stego-image and (iii) full recovery of the inserted information. The images with the inserted information are called stego-image; the information must be inserted in areas that are statistically and perceptually not easy to locate on demand and stegotools such as analyzers. The stego-image should be, in theory and in practice, identical to the host image. The embedded information in the stego-image can only be removed by the receiver that has the primary key, otherwise, the information cannot be extracted. The stego-image is then sent to the intended recipient. The information contained in the host image is just a distraction to the receiver, so this is not so much of an interest in its full recovery, but the host image must have the minimum quality because any edge, contour,, color or misplaced pixels can cause some suspicion and is susceptible to the extraction of the hidden information without authorization from the transmitter. Most importantly, the hidden information must be fully recoverable. In today's advanced and modern world, steganography is vital because it is a support tool to copyright protection, for which the authentication processes allow distribution and legal use of different materials. A steganographic technique is usually evaluated in terms of the visual quality and the embedding capacity; in other words, an ideal steganographic scheme should have a large embedding capacity and excellent stego-object visual quality.

One of the main objectives of steganography is not sacrifice image quality as the carrier to be inserted to this data. And likewise keeping track information retrieved data. Because any disturbance visual may cause some reason for inspection of its content through histograms or

To analyze structures within images of different sizes, shifting the window in Fourier trans‐ form (Gabor Transform [9]) is not suitable because it is subject to a fixed size value. Moreover, the calculation is complicated, because the DFT, obtains complex numbers, unlike the DWT [9], which operates only with real numbers. For analysis of images, it is necessary to use timefrequency windows with different times. Instead of choosing a fixed window (Gabor trans‐ form), with an analysis window g (t-u) constant size, a resizable window is chosen, that is, a wavelet, a Ψ∈L<sup>2</sup> function (IR), with an average equal to zero:

$$\int\_{a}^{a} \psi \left( t \right) dt = 0 \tag{1}$$

The DWT can decompose an image in different resolutions, each of which progressively decreases the size. This presents a certain analogy with the human eye, which draws, at each level, the information that it finds interesting. For example, consider a brick wall. If we observe it from a considerably large distance, we will see a global structure. As we approach the wall, we can look at the successive characteristic details: the divisions between bricks, each brick structure that define and detail the whole structure, losing resolution. Similarly, the DWT extracts information between successive resolutions. Consider the function checks || Ψ || = 1, and is focused on a neighborhood of t = 0. If the value of u and s in the function moves, a movement of the sampling window time-frequency is obtained:

$$
\psi\_{u,s}(t) = \frac{1}{\sqrt{2}} \psi\left(\frac{t - u}{s}\right). \tag{2}
$$

The DWT can be written as a convolution product:

$$\mathcal{M}f\left(\mathbf{x},s\right) = \bigcap\_{\circ} f\left(t\right) \frac{1}{\sqrt{2}} \boldsymbol{\nu}\left(\frac{t\cdot\mathbf{x}}{s}\right) \mathrm{d}s = f\,\overline{\boldsymbol{\nu}}\_{s}\left(\mathbf{x}\right). \tag{3}$$

where *ψ*¯*<sup>s</sup>* (*t*)= <sup>1</sup> 2 *ψ*\* ( *t s* ).

The DWT can find localized and structured images with an amplification procedure that progressively reduces the scale parameter. Generally, singularities and irregular structures often contain essential information about the image and refer to places that can be substituted for values, but at first glance, are not identifiable. In an image, intensity discontinuities indicate the presence of edges. It can be proven that the local regularity of a signal is characterized by the decay of the amplitude of the DWT over scales. Thus, the singularities and the edges are detected following the local maximum values of the DWT to finer scales detail. This image of singularities will become detailed as it moves [10]. To characterize the unique structures, it is necessary to quantify the local regularity of the image. For example, an image of n × m pixels generates additional images successively in blocks. All contours, large and small, are present in the original image and do not require any change of resolution to locate them. The issue is in identifying broad contours using conventional operators. It could be escalated to the operator, but what is more efficient is to scale the image because the use of an operator for large contours on a high-resolution image is very complicated from the point of view of computational efficiency. Therefore, it uses coding frequency sub-bands. Coding performs sub-band decomposition of an image or a signal band-limited components (band-pass filter), which gives a redundancy-free representation of an image; this makes it possible to reconstruct the original image without error. Give a band-limited image *x(n,m)* which satisfies [11]:

$$F\left(\mathbf{x}\left(n,m\right)\right) = \mathbf{X}\left(f\right) = \mathbf{0}\_{\prime}\left|f\right| \geq f\_{\text{max}}\,. \tag{4}$$

It is possible to split the image to make a uniform sampling

the calculation is complicated, because the DFT, obtains complex numbers, unlike the DWT [9], which operates only with real numbers. For analysis of images, it is necessary to use timefrequency windows with different times. Instead of choosing a fixed window (Gabor trans‐ form), with an analysis window g (t-u) constant size, a resizable window is chosen, that is, a

The DWT can decompose an image in different resolutions, each of which progressively decreases the size. This presents a certain analogy with the human eye, which draws, at each level, the information that it finds interesting. For example, consider a brick wall. If we observe it from a considerably large distance, we will see a global structure. As we approach the wall, we can look at the successive characteristic details: the divisions between bricks, each brick structure that define and detail the whole structure, losing resolution. Similarly, the DWT extracts information between successive resolutions. Consider the function checks || Ψ || = 1, and is focused on a neighborhood of t = 0. If the value of u and s in the function moves, a

> ( ) - , <sup>1</sup> . <sup>2</sup> *u s t u <sup>t</sup>*

 y

( ) () ( ) <sup>1</sup> - , . <sup>2</sup> *<sup>s</sup> t x Wf x s f t ds f x*

æ ö = = ç ÷

*s* y

The DWT can find localized and structured images with an amplification procedure that progressively reduces the scale parameter. Generally, singularities and irregular structures often contain essential information about the image and refer to places that can be substituted for values, but at first glance, are not identifiable. In an image, intensity discontinuities indicate the presence of edges. It can be proven that the local regularity of a signal is characterized by the decay of the amplitude of the DWT over scales. Thus, the singularities and the edges are detected following the local maximum values of the DWT to finer scales detail. This image of singularities will become detailed as it moves [10]. To characterize the unique structures, it is necessary to quantify the local regularity of the image. For example, an image of n × m pixels generates additional images successively in blocks. All contours, large and small, are present in the original image and do not require any change of resolution to locate them. The issue is in identifying broad contours using conventional operators. It could be escalated to the operator, but what is more efficient is to scale the image because the use of an operator for

 y

è ø ò (3)

æ ö <sup>=</sup> ç ÷

*s*

<sup>=</sup> ò (1)

è ø (2)

function (IR), with an average equal to zero:

¥

¥

movement of the sampling window time-frequency is obtained:

y

¥

¥

The DWT can be written as a convolution product:

y( )*t dt* 0

wavelet, a Ψ∈L<sup>2</sup>

66 Wavelet Transform and Some of Its Real-World Applications

where *ψ*¯*<sup>s</sup>*

(*t*)= <sup>1</sup> 2 *ψ*\* ( *t s* ).

$$\text{tr}\left(i\Delta\_{u,m}\right), i = 0, 2, \dots, N = 1 \quad f\_{\text{max}} \le f\_N = \frac{1}{2\Delta\_{u,m}}.\tag{5}$$

where *f*N is the Nyquist frequency. For the analysis of the frequency division at intervals within the DWT; you can use a range of frequencies, for this particular case; We employ the value of N / 2 x M / 2, where N and M represent the length and width of the image as shown in Figure 1.

**Figure 1.** Double wavelet decomposition applied in an image.

The coding of two channels per sub-band filtering *x*(Δ*xn*,*<sup>m</sup>*) required by the impulse response for a low-pass filter *h*0(*i*Δ*n*,*<sup>m</sup>*) and *h*1(*i*Δ*n*,*<sup>m</sup>*) followed by sub-sampling (decimation 2), every output. The filtering functions given in Eq. 4 and 5 apply to the rows and columns of the image.

$$\log\_{0}\left(k\Delta\_{n,m}\right) = \sum\_{i} \mathbf{x}\left(\Delta\mathbf{i}(n,m)\right) h\_{0}\left[\left(\Delta\mathbf{i}+\mathbf{2}k\right)\Delta\_{n,m}\right] \tag{6}$$

$$\log\_1\left(k\Delta\_{n,m}\right) = \sum\_{i} \ge \left(\Delta i(n,m)\right)h\_1\left[\left(\Delta i + \mathcal{D}k\right)\Delta\_{n,m}\right] \tag{7}$$

This results to obtaining the four sub-images at the output of the processing. The image resolution applying DWT is divided into four frequency sub-bands called Low-Low (LL), Low-High (LH), High-Low (HL), and High-High (HH), see Figure 2. The names given were based on the type of filtering applied to the rows and columns; they are obtained from Eqs. 6 and 7.

**Figure 2.** Sub-band coding for an image.

Each sub-band is a copy of the original image but in different frequency level, which provides a certain amount of energy [8, 9] (Figure 1). To describe a DWT, it is enough to define a discrete impulse response for a low-pass filter, *h*<sup>0</sup> (*k*), which satisfies the requirements *<sup>h</sup>*<sup>1</sup> (*<sup>N</sup>* - 1)Δ*<sup>x</sup>* =(-1)*<sup>i</sup> h*0 (*i*Δ*x*).Where from *h*<sup>0</sup> (*k*), we can generate the function *f(x)* called scaling function. We can also generate, *h*<sup>1</sup> (*k*), with this last and with *f(x)*, calculate the mother wavelet *y(x).* If the scaling vector has a finite number of nonzero terms, then *f(x)* and *y(x)* generate wavelets with compact support. Scaling a vector such that [11],

Scaling Factor Threshold Estimator in Different Color Models Using a Discrete Wavelet Transform for Steganographic... http://dx.doi.org/10.5772/61729 69

$$
\sum\_{k} h\_0 \left( k \right) = \sqrt{2}, \quad \text{and} \quad \sum\_{k} h\_0 \left( k \right) h\_0 \left( k + 2l \right) = \mathcal{S} \left( l \right) \tag{8}
$$

where *2l* represents the displacement of the sample image every 2 pixels. There exists a scaling function for which,

$$\phi\left(\mathbf{x}\right) = \sum\_{k} h\_{0}\left(k\right)\phi\left(2n \cdot k\right) \tag{9}$$

which can be constructed as a sum, from Eq. 11, that is half copy of the image, using *h*<sup>0</sup> (*k*) as the weighting factor. The scaling function is a continuous function whose general form is the same as the impulse response of discrete low-pass filter, *h*<sup>0</sup> (*k*). If instead the calculation begins from the scaling function *f(x)*, it must be an orthonormal unit in terms of translations [11],

$$\left\langle \phi(\mathbf{x} - m), \phi(\mathbf{x} - n) \right\rangle = \delta\_{m,n} \tag{10}$$

and *h*<sup>0</sup> (*k*) can be calculated,

$$h\_0\left(k\right) = \left\langle \phi\_{1,0}\left(0\right), \phi\_{0,k}\left(\infty\right) \right\rangle \tag{11}$$

where

The coding of two channels per sub-band filtering *x*(Δ*xn*,*<sup>m</sup>*) required by the impulse response for a low-pass filter *h*0(*i*Δ*n*,*<sup>m</sup>*) and *h*1(*i*Δ*n*,*<sup>m</sup>*) followed by sub-sampling (decimation 2), every output. The filtering functions given in Eq. 4 and 5 apply to the rows and columns of the image.

*g k x inm h i k* D = D D+ D é ù å ë û (6)

*g k x inm h i k* D = D D+ D é ù å ë û (7)

0 , ( ) ( )( ) <sup>0</sup> , (, ) 2 *n m n m*

1 , ( ) ( )( ) <sup>1</sup> , (, ) 2 *n m n m*

This results to obtaining the four sub-images at the output of the processing. The image resolution applying DWT is divided into four frequency sub-bands called Low-Low (LL), Low-High (LH), High-Low (HL), and High-High (HH), see Figure 2. The names given were based on the type of filtering applied to the rows and columns; they are obtained from Eqs. 6 and 7.

Each sub-band is a copy of the original image but in different frequency level, which provides a certain amount of energy [8, 9] (Figure 1). To describe a DWT, it is enough to define a discrete

*y(x).* If the scaling vector has a finite number of nonzero terms, then *f(x)* and *y(x)* generate

(*k*), which satisfies the requirements

(*k*), we can generate the function *f(x)* called scaling

(*k*), with this last and with *f(x)*, calculate the mother wavelet

*i*

68 Wavelet Transform and Some of Its Real-World Applications

*i*

**Figure 2.** Sub-band coding for an image.

*h*0

function. We can also generate, *h*<sup>1</sup>

*<sup>h</sup>*<sup>1</sup> (*<sup>N</sup>* - 1)Δ*<sup>x</sup>* =(-1)*<sup>i</sup>*

impulse response for a low-pass filter, *h*<sup>0</sup>

(*i*Δ*x*).Where from *h*<sup>0</sup>

wavelets with compact support. Scaling a vector such that [11],

$$\phi\_{j,k}\left(n\right) = 2^{j/2}\phi\left(2^j n \cdot k\right), \quad j = 0, 1... \quad k = 0, 1..., 2^j \quad 1 \tag{12}$$

Determined *f(x)* and *h*<sup>0</sup> (*k*), we can define a discrete impulse response for the high-pass filter called wavelet vector,

$$h\_1\left(k\right) = \left(-1\right)^k h\_0\left(-k+1\right)\tag{13}$$

and from this, we obtain the mother wavelet,

$$\psi\left(n\right) = \sum\_{k} h\_{1}\left(k\right) \phi\left(2n \cdot k\right) \tag{14}$$

where the set of orthonormal wavelets is derived, and the scaling factor obtained for setting the pixel with the new value obtained from the low-pass and band-pass filtering from [11],

$$\Psi\_{j,k}\left(n\right) = 2^{j/2}\Psi\left(2^j n \cdot k\right) \tag{15}$$

It is restricted to case basis functions obtained by means of changing the type of binary scale *2j* , and dyadic translations of the mother wavelet, where a dyadic translation corresponds to a shift, k / 2j; value that is equal to a scale factor which is a multiple of a binary value (2,4,8,...) and therefore, the size of the wavelet, thereby obtaining the image adjustment. When working with images, the most important features for pattern recognition are the edges of the structures. A border can be defined as the set of points where the image has sharp transitions in intensity. However, not all variations of intensity can be defined as edges. Several variations of detection algorithms on images, such as the Canny algorithm [13] are equivalent to detecting a maximum DWT module dyadic bidimensional. For detecting image edges or irregularities, applies irregularities detector based on the exponents of Lipschitz [12].Thus, if *f* has a singularity at a point *v*, this means that it is not differentiable at *v*, and Lipschitz exponent at this point characterizes the singular behavior.

The Lipschitz regularity of edge points is derived from the maximum decrease of along DWT scales. In addition, approaches the image can be reconstructed from these high module without visual degradation. In two dimensions, we try to detect contours. For detection, the problem is the presence of noise. So, if we define the boundary from turning points, they will appear across the surface, due to noise. The application of the values for Lipschitz exponents can find and ratifying the highlighted areas like the edges obtained in step filtering Lipschitz regularity defines the upper limit with non-integer exponents. Thus, the DWT is a powerful tool to measure the minimum local regularity of the tool functions. However, it is not possible to analyze the regularity of f at a particular point v that will decrease from | *f* ^(*w*)|, for high frequencies of ω. In contrast, as the wavelets are well localized in time, the DWT gives the Lipschitz regularity of intervals and points. The decrease in amplitude along DWT scales relates to Lipschitz regularity. Effective use of Lipschitz exponents can find these discontinu‐ ities in the image, which, as mentioned, are sometimes noisy areas, due to the nature of the image. These noisy areas are detected in the right places for concealment of information. Asymptotic decay measurement is equivalent to amplification of the image structures with a scale as it approaches zero. The singularities are detected by locating the maximum line (abscissa) upon which it converges to the maximum fine scales [11]. Finally, the signal *ψj*,*n*(*t*) can be compressed or expanded in the time. This will have little certainly after effects in the plane of frequencies [2],

$$\begin{aligned} \left(\boldsymbol{\nu}\left(t\right)\right) &\text{compressed by a factor } 2^{\left(\boldsymbol{s}\right)}\left(\boldsymbol{s}\right)\boldsymbol{\nu}\_{\boldsymbol{s}}\left(t\right) = \frac{1}{\sqrt{2^{\boldsymbol{s}}}} \boldsymbol{\nu}\left(\frac{t}{\boldsymbol{s}}\right), \\ \boldsymbol{\nu}\left(\boldsymbol{w}\right) &\text{compressed by a factor } \frac{1}{2^{\left(\boldsymbol{w}\right)}} \boldsymbol{\nu}\_{\boldsymbol{s}}\left(\boldsymbol{w}\right) = \frac{1}{\sqrt{2^{\boldsymbol{s}}}} 2^{\left(\boldsymbol{w}\right)} \boldsymbol{\nu}\left(2^{\left(\boldsymbol{w}\right)}\boldsymbol{w}\right) = \sqrt{2^{\boldsymbol{s}}} \boldsymbol{\nu}\left(2^{\left(\boldsymbol{w}\right)}\boldsymbol{w}\right). \end{aligned} \tag{16}$$

where *ψ* ^(*w*) represents the reconstruction of *ψ*(*t*). The discrete wavelet reconstruction can be computed by an inverse of the procedure of decomposition beginning at the level of resolution lower in the hierarchy. In applying the proposed steganographic algorithm to the sub-band LH is necessary to use a scaling factor that works with 24-bit RGB color images or Luminance, Chromatic blue, Chromatic red (YcbCr) or Hue, Value, Saturation (HSV) color model [14]; this scaling factor is closely related to energy conservation applied in the theory of wavelets. However, in the RGB color images, we propose the following scaling factor,

$$
\sqrt[1]{\sqrt[2]{2^{\circ}}}\tag{17}
$$

where *j* is directly dependent on the number of bits that integrates the image.

( ) ( ) - / 2 , 2 2 *j j*

It is restricted to case basis functions obtained by means of changing the type of binary scale

The Lipschitz regularity of edge points is derived from the maximum decrease of along DWT scales. In addition, approaches the image can be reconstructed from these high module without visual degradation. In two dimensions, we try to detect contours. For detection, the problem is the presence of noise. So, if we define the boundary from turning points, they will appear across the surface, due to noise. The application of the values for Lipschitz exponents can find and ratifying the highlighted areas like the edges obtained in step filtering Lipschitz regularity defines the upper limit with non-integer exponents. Thus, the DWT is a powerful tool to measure the minimum local regularity of the tool functions. However, it is not possible to

frequencies of ω. In contrast, as the wavelets are well localized in time, the DWT gives the Lipschitz regularity of intervals and points. The decrease in amplitude along DWT scales relates to Lipschitz regularity. Effective use of Lipschitz exponents can find these discontinu‐ ities in the image, which, as mentioned, are sometimes noisy areas, due to the nature of the image. These noisy areas are detected in the right places for concealment of information. Asymptotic decay measurement is equivalent to amplification of the image structures with a scale as it approaches zero. The singularities are detected by locating the maximum line (abscissa) upon which it converges to the maximum fine scales [11]. Finally, the signal *ψj*,*n*(*t*) can be compressed or expanded in the time. This will have little certainly after effects in the

( ) ( ) ( ) ( ) <sup>2</sup>

*w compresed by a factor w w w*

*j j*

1 1 <sup>ˆ</sup> 22 22, <sup>2</sup> <sup>2</sup> *<sup>j</sup>*

y

y

*j*

*<sup>t</sup> t compresed by a factor s t*

<sup>1</sup> 2 , 2

*<sup>s</sup> <sup>j</sup>*

*jj jj*

= = ) )) (16)

yy

*s*

è ø

 y

æ ö <sup>=</sup> ç ÷

analyze the regularity of f at a particular point v that will decrease from | *f*

, and dyadic translations of the mother wavelet, where a dyadic translation corresponds to a shift, k / 2j; value that is equal to a scale factor which is a multiple of a binary value (2,4,8,...) and therefore, the size of the wavelet, thereby obtaining the image adjustment. When working with images, the most important features for pattern recognition are the edges of the structures. A border can be defined as the set of points where the image has sharp transitions in intensity. However, not all variations of intensity can be defined as edges. Several variations of detection algorithms on images, such as the Canny algorithm [13] are equivalent to detecting a maximum DWT module dyadic bidimensional. For detecting image edges or irregularities, applies irregularities detector based on the exponents of Lipschitz [12].Thus, if *f* has a singularity at a point *v*, this means that it is not differentiable at *v*, and Lipschitz exponent at this point

*n nk* = (15)

^(*w*)|, for high

 y

*j k* y

*2j*

characterizes the singular behavior.

70 Wavelet Transform and Some of Its Real-World Applications

plane of frequencies [2],

y

y

where *ψ*

( ) () ()

^(*w*) represents the reconstruction of *ψ*(*t*).

The proposed steganographic method works in the wavelet domain and provides an analysis of the wavelet coefficients in different decomposition scales to estimate the simple variance field to distinguish areas where the pixels are considered noisy [14]. We propose the following criterion: If the standard deviation of the current wavelet coefficient kernel is smaller than the threshold defined for the standard deviation global, then the respective area from the host image is considered noisy and then in such area, the hidden information can be inserted. Otherwise, the pixels from this area are considered free of noise and it is not possible to insert data of the hidden image. The criterion provides good invisibility for the hidden data and edges and results to fine detail preservation of the stego-image [14]. The standard deviation is computed using the following,

$$\sigma\_k = \sqrt{\sum\_{m=1}^n (y\_m - \overline{y})^2 / m} \,\, \,\, \,\tag{18}$$

where *ym* is the m-th element of the host image, *y*¯ <sup>=</sup> ∑ *m*=1 *n ym* / *n* is the mean value of the current kernel, and *n* = 9 is the number of elements in the sample. The proposed steganographic method is depicted in Figure 3. This method is applied in each channel of RGB host image. From Figure 3, the block of redundancy of approaches, uses one level of decomposition with Haar wavelet. This algorithm smoothens the low frequencies of the host image through a double convolution operation (first of decomposition, and after reconstruction) of the coefficients and samples of host image [14], providing more hiding capacity and detail preservation of the proposed method. To hide the image, a double decomposition wavelet daubechies 4 (db4) is applied. To recover the hidden image, the algorithm of Figure 3 is used again but in the block of input changes to RGB stego-image and in the condition *σ<sup>k</sup>* <*σ<sup>g</sup>* recovers the hidden data. Finally, the use of two levels of decomposition with db4 wavelet, and 3×3 kernel were found after numerous simulations under criteria peak signal noise ratio (PSNR), MAE (Mean Absolute Error), CORR (Correlation), NCD (Normalized Color Deviation), etc. [2,14].This criterion applied to each RGB channel is also applied to each channel for YCbCr color space and HSV, apply each threshold adjustment scale factor for reducing distortions in the image.

Fig. 3 Proposed steganographic algorithm. **Figure 3.** Proposed steganographic algorithm.

The threshold *σg* is used to select the pixel occupying the position where the data are hidden. This is done through [14], The threshold *σg* is used to select the pixel occupying the position where the data are hidden. This is done through [14],

$$
\sigma\_{\mathcal{g}} = \sqrt{\sum\_{m=1}^{N} (\mathbf{x}\_i \cdot \overline{\mathbf{x}})^2 / N} \,\tag{19}
$$

(19)

where *xi* is the i-th element of the host image, = ∑ 1= *N i <sup>i</sup> N/xx* is the mean value of the current host image, and *N* is the number of elements in the sample(host image). Adjusting for each expansion and contraction of the wavelet transform using Eq. 19; for each value of the weight function in the host image, pixels in each color space applied for demonstration of this threshold is observed, if the proposal is a valid consideration. The three goals of steganographic algorithms must be achieved: high capacity for integration, high quality of the stego-image and full recovery of the hidden information. **3. Theory/Calculations**  where *xi* is the i-th element of the host image, *x*¯ <sup>=</sup>∑ *i*=1 *N xi* / *N* is the mean value of the current host image, and *N* is the number of elements in the sample(host image). Adjusting for each expansion and contraction of the wavelet transform using Eq. 19; for each value of the weight function in the host image, pixels in each color space applied for demonstration of this threshold is observed, if the proposal is a valid consideration. The three goals of steganographic algorithms must be achieved: high capacity for integration, high quality of the stego-image and full recovery of the hidden information.

#### the criterion most frequently used to evaluate the quality of the imagery [2], **3. Theory/Calculations**

1 2

*M*

),(-),( <sup>1</sup> MSE *M*

1 1

*<sup>L</sup> mlxmly MM*

*m*

*l*

where ∑∑

21

 dB, MSE <sup>255</sup> log10PSNR 2 <sup>10</sup> (20) In the optimization and evaluation of algorithms in digital image processing, the peak signal to noise relation (PSNR) is the criterion most frequently used to evaluate the quality of the imagery [2],

2

The Normalized Color Deviation (NCD) is used for the quantification of the color perceptual error [2],

2

stego-image, *)m,l(x* is the corresponding pixel in the original cover image, and *L*<sup>2</sup>

In the optimization and evaluation of algorithms in digital image processing, the peak signal to noise relation (PSNR) is

the coordinates of the current position in the image, *)m,l(y* is the 3D vector value of the pixel in the ( ) *m,l* location of the

is the mean square error, *M,M* <sup>21</sup> are the image dimensions, l, m are

is the L2-vector norm.

Scaling Factor Threshold Estimator in Different Color Models Using a Discrete Wavelet Transform for Steganographic... http://dx.doi.org/10.5772/61729 73

$$\text{PSNR} = 10 \qquad \qquad \log\_{10} \left[ \frac{\left(255\right)^2}{\text{MSE}} \right] \text{dB}\_{\prime} \tag{20}$$

where MSE= <sup>1</sup> *M*1*M*<sup>2</sup> ∑ *l*=1 *M*<sup>1</sup> ∑ *m*=1 *M*<sup>2</sup> *y*(*l*, *m*) - *x*(*l*, *m*) *<sup>L</sup>* <sup>2</sup> <sup>2</sup> is the mean square error, *M*1, *<sup>M</sup>*<sup>2</sup> are the image dimensions, l, m are the coordinates of the current position in the image, *y*(*l*, *m*) is the 3D vector value of the pixel in the (*l*, *m*) location of the stego-image, *x*(*l*, *m*) is the corresponding pixel in the original cover image, and ⋅ *<sup>L</sup>* <sup>2</sup> is the L2-vector norm.

The Normalized Color Deviation (NCD) is used for the quantification of the color perceptual error [2],

$$\text{NCD} = \frac{\sum\_{l=1}^{M\_1} \sum\_{m=1}^{M\_2} \left\| \Delta E\_{Luv}(l, m) \right\|\_{L\_2}}{\sum\_{l=1}^{M\_1} \sum\_{m=1}^{M\_2} \left\| E\_{Luv}^\*(l, m) \right\|\_{L\_2}} \tag{21}$$

Here, Δ*ELuv*(*l*, *<sup>m</sup>*) *<sup>L</sup>* <sup>2</sup> = (Δ*L* \* (*l*, *m*))<sup>2</sup> + (Δ*u* \*)<sup>2</sup> + (Δ*v* \*)<sup>2</sup> 1/2 is the norm of the color error; Δ*L* \* , Δ*u* \* , and Δ*v* \* are the differences in the *L* \* , *u* \* , and *v* \* components, between the two color vectors that present the stego and cover image for each pixel *(l,m)* of an image, and *ELuv* \* (*l*, *<sup>m</sup>*) *<sup>L</sup>* <sup>2</sup> = (*L* \*)<sup>2</sup> + (*u* \*)<sup>2</sup> + (*v* \*)<sup>2</sup> 1/2 is the norm of the cover image pixel vector in the *L* \* *u* \* *v* \* space. The quality index (Q) is provided to demonstrate the quality of the stego-images [2, 14], where *x*¯ and *y*¯ are the mean values of the cover and stego-image, respectively; *σ<sup>x</sup>* 2 and *σ<sup>y</sup>* 2 are the variances of the cover and stego-image, respectively, and *<sup>σ</sup>xy* <sup>=</sup> <sup>1</sup> *NM* ∑ *l N* ∑ *m M* ((*xl*,*<sup>m</sup>* <sup>−</sup> *<sup>x</sup>*¯)(*yl*,*<sup>m</sup>* <sup>−</sup> *<sup>y</sup>*¯)) is the correlation coefficient between cover image x and hide image y,

Fig. 3 Proposed steganographic algorithm.

Stego-image

Input RGB host image Redundancy of approaches

DWT with 2 scaling levels, db4wavelet

Variance field estimate of A and HD

If *σk*<*σg,* hidden data

IDWT

algorithm, Haar wavelet

The threshold *σg* is used to select the pixel occupying the position where the data are hidden. This is done through [14],

The threshold *σg* is used to select the pixel occupying the position where the data are hidden.


( )/ ,

2

number of elements in the sample(host image). Adjusting for each expansion and contraction of the wavelet transform using Eq. 19; for each value of the weight function in the host image, pixels in each color space applied for demonstration of this threshold is observed, if the proposal is a valid consideration. The three goals of steganographic algorithms must be achieved: high capacity for integration, high quality of the stego-image and full recovery of the hidden information.

image, and *N* is the number of elements in the sample(host image). Adjusting for each expansion and contraction of the wavelet transform using Eq. 19; for each value of the weight function in the host image, pixels in each color space applied for demonstration of this threshold is observed, if the proposal is a valid consideration. The three goals of steganographic algorithms must be achieved: high capacity for integration, high quality of the stego-image

*i*=1 *N*

In the optimization and evaluation of algorithms in digital image processing, the peak signal to noise relation (PSNR) is

In the optimization and evaluation of algorithms in digital image processing, the peak signal to noise relation (PSNR) is the criterion most frequently used to evaluate the quality of the

the coordinates of the current position in the image, *)m,l(y* is the 3D vector value of the pixel in the ( ) *m,l* location of the

dB, MSE

is the mean square error, *M,M* <sup>21</sup> are the image dimensions, l, m are

<sup>10</sup>

2

*<sup>i</sup> N/xx* is the mean value of the current host image, and *N* is the

*xi* / *N* is the mean value of the current host

<sup>=</sup> å (19)

(20)

is the L2-vector norm.

(19)

*σ ,N/)xx(*

 *xx N* =

1

1= *N i*

<sup>255</sup> log10PSNR

2

The Normalized Color Deviation (NCD) is used for the quantification of the color perceptual error [2],

2

stego-image, *)m,l(x* is the corresponding pixel in the original cover image, and *L*<sup>2</sup>

*N <sup>m</sup> <sup>g</sup>* <sup>∑</sup> *<sup>i</sup>* -= 1=

s

*N g i m*

where *xi* is the i-th element of the host image, = ∑

**Figure 3.** Proposed steganographic algorithm.

72 Wavelet Transform and Some of Its Real-World Applications

This is done through [14],

1 2

*M*

),(-),( <sup>1</sup> MSE *M*

**3. Theory/Calculations**

1 1

*<sup>L</sup> mlxmly MM*

*m*

*l*

the criterion most frequently used to evaluate the quality of the imagery [2],

and full recovery of the hidden information.

where *xi* is the i-th element of the host image, *x*¯ <sup>=</sup>∑

**3. Theory/Calculations** 

where ∑∑

imagery [2],

21

$$\mathbf{Q} = \frac{4\sigma\_{xy}\overline{xy}}{\left(\sigma\_x^2 + \sigma\_y^2\right)\left(\overline{x}^2 + \overline{y}^2\right)}\,\mathrm{}\tag{22}$$

The hiding capacity (HC) dictates the number of bits inserted in the host image [2,14],

$$\text{HCC} = \text{MSE} \times \frac{\text{number of samples in embedding band}}{\text{number of bits of source data}}.\tag{23}$$

We incorporate in the proposed scheme other color spaces such as YCbCr and HSV to ensure that the visual artifacts appearing in the stego-image are imperceptible, and the difference between the cover and stego-image is indistinguishable by HSV by using the proposed scaling factor. To verify and quantify the results obtained in this proposed steganographic algorithm, the results obtained in conjunction with other spatial domain methods were compared with 4-3 LSB and the optimization of this algorithm.

Table 1 shows the performance results in terms of PSNR, MAE (Mean Absolute Error), CORR (Correlation), Q, NCD, HC, in the case of j=28 values in the scaling factor by using the 320 × 320 RGB color image "Mandrill" [15] as the host image and "Lena" [15] as the hidden image. In Table 1, we can see that the best result is presented by the steganographic method proposed here by applying the scale factor adjustment in the wavelet transform, the scale factor for this example has a value of j = 28 . In Table 2, we can see the results of the image recovered "Lena" where you can see that the image quality index (Q) is close to 1, indicating that the recovered image is very close to the one inserted originally.


**Table 1.** Comparative results for the stego-image "Mandrill" with the secret image "Lena"


**Table 2.** Comparative results for the retrieved secret image "Lena"

In Table 3, we show the results obtained from the proposed steganographic algorithm with a scaling factor, with j = 10. We note that PSNR improves by more than 1dB, and conserves the Q index on the recovered image. The PSNR value is enhanced for each of the cases in color spaces, and so it may be said that the energy distribution (inserted data) within the image is homogeneous, thus wanting to be approached by a stego-analyzer to retain a uniform distribution histogram, removing any suspicion of being a carrier of information. In Table 3, we can see that the model of color HSV offers better quality in the stego-image in contrast to the RGB and YCbCr models; nevertheless, the capacity of insertion is lost. It is possible to observe that the model RGB offers good results and the capacity of insertion does not sacrifice itself.

the results obtained in conjunction with other spatial domain methods were compared with

Table 1 shows the performance results in terms of PSNR, MAE (Mean Absolute Error), CORR

320 RGB color image "Mandrill" [15] as the host image and "Lena" [15] as the hidden image. In Table 1, we can see that the best result is presented by the steganographic method proposed here by applying the scale factor adjustment in the wavelet transform, the scale factor for this

where you can see that the image quality index (Q) is close to 1, indicating that the recovered

**4LSB 3LSB 4LSBO 3LSBO**

PSNR dB 36.168 36.169 30.111 30.112 37.283 MAE 2.9911 2.9902 9.7307 9.7315 1.2020 CORR 99.78 99.78 99.76 99.76 99.34 Q 0.9976 0.9976 0.9948 0.9948 0.9956 NCD 0.00073 0.00073 0.0022 0.0022 0.00030 HC (Kb) 51,200 38,400 51,200 38,400 76,800

**Table 1.** Comparative results for the stego-image "Mandrill" with the secret image "Lena"

**Table 2.** Comparative results for the retrieved secret image "Lena"

values in the scaling factor by using the 320 ×

**Variance Field Simple Estimation**

**Variance Field Simple Estimation**

. In Table 2, we can see the results of the image recovered "Lena"

**Algorithms**

**Algorithms**

**4LSB 3LSB 4LSBO 3LSBO**

PSNR dB 36.291 36.291 30.144 30.144 35.391 MAE 2.7479 2.7479 8.1255 8.1255 2.9409 CORR 99.55 99.55 99.54 99.54 99.30 Q 0.9962 0.9962 0.9943 0.9943 0.9950 NCD 0.0020 0.0020 0.0033 0.0033 0.0019

In Table 3, we show the results obtained from the proposed steganographic algorithm with a scaling factor, with j = 10. We note that PSNR improves by more than 1dB, and conserves the

4-3 LSB and the optimization of this algorithm.

74 Wavelet Transform and Some of Its Real-World Applications

(Correlation), Q, NCD, HC, in the case of j=28

image is very close to the one inserted originally.

example has a value of j = 28

**Criteria**

**Criteria**


**Table 3.** Performance results in different color models for j=10 in the scaling factor.

We also present the error images in Figure 4 presents the visual results according with Table 3.

We also present the error images in Figure 4 presents the visual results according with Table 3.

Figure 4. Visual results in the case of j=10, (a) stego-image "Mandrill", (b) error stego-image "Mandrill", (c) hide image "Lena", (d) error hide image "Lena". **Figure 4.** Visual results in the case of j=10, (a) stego-image "Mandrill", (b) error stego-image "Mandrill", (c) hide image "Lena", (d) error hide image "Lena".

#### **4. Discussions 4. Discussions**

The results only apply steganographic algorithm have shown visual defects, which may cause some suspicion that this is a carrier of information added to this. However, applying the scaling factor, better visual and quantitative results also overcoming the stego-image are obtained. Significantly, a steganographic algorithm must meet the following criteria: Total recovery of the embedded information; good quality of the cover image and the recovered image; and high insertion capability. Finally, in this work, the proposed method yielded better results, with the best result obtained using the scaling factor *j = 10.* The following are the results: PSNR = 41.3900dB, NCD = 2.8906 e-4, MAE = 0.6401, HC = 0,068e3Kb and Q = 99.99% in the cover image. We can also observe that applying the scale factor, the wavelet contraction and expansion is set as close to the original contour of the image, thus, making the data inserted into the noisiest areas of the image; and this is imperceptible to the human eye. The results only apply steganographic algorithm have shown visual defects, which may cause some suspicion that this is a carrier of information added to this. However, applying the scaling factor, better visual and quantitative results also overcoming the stego-image are obtained. Significantly, a steganographic algorithm must meet the following criteria: Total recovery of the embedded information; good quality of the cover image and the recovered image; and high insertion capability. Finally, in this work, the proposed method yielded better results, with the best result obtained using the scaling factor *j = 10.* The following are the results: PSNR = 41.3900dB, NCD = 2.8906 e-4, MAE = 0.6401, HC = 0,068e3Kb and Q = 99.99% in the cover image. We can also observe that applying the scale factor, the wavelet contraction and expansion is set as close to the original contour of the image, thus, making the data inserted into the noisiest areas of the image; and this is imperceptible to the human eye.

#### The RGB, HSV and YCbCr color model images are altered in their energy contribution in each sub-matrix of the wavelet decomposition when the steganographic algorithm is applied. From equations 5, 6 and 14, we propose the use of the **5. Conclusions**

**5. Conclusions** 

the three objectives of steganographic algorithms. For steganographic applications, the digital filter helps to locate areas suitable for inserting information without it becoming visible to the human eye. This filter is generally altered in their energy contribution in each sub-matrix of wavelet decomposition when a steganographic algorithm is applied. It is known that the value of 1 2 is the key factor in the value adjustment of the wavelets energy, the value adjustment has The RGB, HSV and YCbCr color model images are altered in their energy contribution in each sub-matrix of the wavelet decomposition when the steganographic algorithm is applied. From equations 5, 6 and 14, we propose the use of the scaling factor for adjusting filtered images with DWT. This adjustment will be made to each pixel of the image to achieve the three

scaling factor for adjusting filtered images with DWT. This adjustment will be made to each pixel of the image to achieve

been applied only in grayscale image tests. To apply the proposed scaling factor *<sup>j</sup>* 1 2 in RGB color images, there is a value adjustment factor for the energy input in each sub-matrix. It is also noted that when changing the value of j, it adjusts the sharpness and image quality providing a visible improvement of the image, as shown in Tables 1, 2 and 3, and in the subjective results. From Table 3, more security options are given for the insertion of information that is highly confidential; each color space provides particular characteristics that can be exploited for sending such information.

objectives of steganographic algorithms. For steganographic applications, the digital filter helps to locate areas suitable for inserting information without it becoming visible to the human eye. This filter is generally altered in their energy contribution in each sub-matrix of wavelet decomposition when a steganographic algorithm is applied. It is known that the value of 1 / 2 is the key factor in the value adjustment of the wavelets energy, the value adjustment has been

applied only in grayscale image tests. To apply the proposed scaling factor 1 / 2 *<sup>j</sup>* in RGB color images, there is a value adjustment factor for the energy input in each sub-matrix. It is also noted that when changing the value of j, it adjusts the sharpness and image quality providing a visible improvement of the image, as shown in Tables 1, 2 and 3, and in the subjective results. From Table 3, more security options are given for the insertion of information that is highly confidential; each color space provides particular characteristics that can be exploited for sending such information.

### **Acknowledgements**

We also present the error images in Figure 4 presents the visual results according with Table 3.

76 Wavelet Transform and Some of Its Real-World Applications

The results only apply steganographic algorithm have shown visual defects, which may cause some suspicion that this is a carrier of information added to this. However, applying the scaling factor, better visual and quantitative results also overcoming the stego-image are obtained. Significantly, a steganographic algorithm must meet the following criteria: Total recovery of the embedded information; good quality of the cover image and the recovered image; and high insertion capability. Finally, in this work, the proposed method yielded better results, with the best result obtained using the scaling factor *j = 10.* The following are the results: PSNR = 41.3900dB, NCD = 2.8906 e-4, MAE = 0.6401, HC = 0,068e3Kb and Q = 99.99% in the cover image. We can also observe that applying the scale factor, the wavelet contraction and expansion is set as close to the original contour of the image, thus, making the data inserted into the noisiest areas of

The results only apply steganographic algorithm have shown visual defects, which may cause some suspicion that this is a carrier of information added to this. However, applying the scaling factor, better visual and quantitative results also overcoming the stego-image are obtained. Significantly, a steganographic algorithm must meet the following criteria: Total recovery of the embedded information; good quality of the cover image and the recovered image; and high insertion capability. Finally, in this work, the proposed method yielded better results, with the best result obtained using the scaling factor *j = 10.* The following are the results: PSNR = 41.3900dB, NCD = 2.8906 e-4, MAE = 0.6401, HC = 0,068e3Kb and Q = 99.99% in the cover image. We can also observe that applying the scale factor, the wavelet contraction and expansion is set as close to the original contour of the image, thus, making the data inserted into the noisiest

Figure 4. Visual results in the case of j=10, (a) stego-image "Mandrill", (b) error stego-image "Mandrill", (c) hide image "Lena", (d) error hide image "Lena".

**Figure 4.** Visual results in the case of j=10, (a) stego-image "Mandrill", (b) error stego-image "Mandrill", (c) hide image

(c) (d)

(a) (b)

The RGB, HSV and YCbCr color model images are altered in their energy contribution in each sub-matrix of the wavelet decomposition when the steganographic algorithm is applied. From equations 5, 6 and 14, we propose the use of the scaling factor for adjusting filtered images with DWT. This adjustment will be made to each pixel of the image to achieve the three objectives of steganographic algorithms. For steganographic applications, the digital filter helps to locate areas suitable for inserting information without it becoming visible to the human eye. This filter is generally altered in their energy contribution in each sub-matrix of wavelet decomposition when a steganographic algorithm is applied. It is known that the value of 1 2 is the key factor in the value adjustment of the wavelets energy, the value adjustment has been applied only in grayscale image tests. To apply the proposed scaling factor *<sup>j</sup>* 1 2 in RGB color images, there is a value adjustment factor for the energy input in each sub-matrix. It is also noted that when changing the value of j, it adjusts the sharpness and image quality providing a visible improvement of the image, as shown in Tables 1, 2 and 3, and in the subjective results. From Table 3, more security options are given for the insertion of information that is highly confidential; each color space provides particular characteristics that can be exploited for sending such information.

The RGB, HSV and YCbCr color model images are altered in their energy contribution in each sub-matrix of the wavelet decomposition when the steganographic algorithm is applied. From equations 5, 6 and 14, we propose the use of the scaling factor for adjusting filtered images with DWT. This adjustment will be made to each pixel of the image to achieve the three

**4. Discussions** 

**5. Conclusions** 

the image; and this is imperceptible to the human eye.

**5. Conclusions**

areas of the image; and this is imperceptible to the human eye.

"Lena", (d) error hide image "Lena".

**4. Discussions**

This work was supported by Instituto Politécnico Nacional (IPN) and Consejo Nacional de Ciencia y Tecnología (CONACYT).

### **Author details**

Blanca Esther Carvajal-Gámez1,2\*, Erika Hernández Rubio2\* and Amilcar Meneses Viveros3

\*Address all correspondence to: becarvajal@ipn.mx; ehernandezru@ipn.mx

1 Instituto Politécnico Nacional, Unidad Profesional Interdisciplinaria de Ingeniería y Tecnologías Avanzadas, México

2 Instituto Politécnico Nacional, Escuela Superior de Computo, Sección de Estudios de Posgrado e Investigación Juan de Dios Batiz s/n Professional U. Adolfo López Mateos,, México

3 Centro de Investigación y de Estudios Avanzados del IPN, Departamento de Computación, San Pedro Zacatenco, México

#### **References**


graphic algorithms using the scaling function, 1/√2<sup>j</sup> , International Journal of Physical Sciences, 2013, vol. 8(4), 157-166, DOI: 10.5897/IJPS12.516.

