IJIGSP Vol. 5, No. 11, 8 Sep. 2013
Cover page and Table of Contents: PDF (size: 1341KB)
Full Text (PDF, 1341KB), PP.23-34
Views: 0 Downloads: 0
Least Significant Bit (LSB), Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Steganography, MSE, PSNR, NC
Steganography is an important area of research in recent years involving a number of applications. It is the science of embedding information into the cover image viz., text, video, and image (payload) without causing statistically significant modification to the cover image. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.In this paper, a DCT based robust methodology has been designed. The cover image is segmented into 8*8 blocks and DCT is applied on the image. The text to be hidden is embedded in the diagonal elements of the blocks by substituting a random variable in place of the bits of the text to be embedded. It is observed that the proposed algorithm is more robust with better CER & Normalized coefficient.
Stuti Goel, Arun Rana, Manpreet Kaur,"ADCT-based Robust Methodology for Image Steganography", IJIGSP, vol.5, no.11, pp.23-34, 2013. DOI: 10.5815/ijigsp.2013.11.03
[1]J.R. Krenn, “Steganography and Steganalysis”, January 2004.
[2]Deshpande Neeta, KamalapurSnehal, Daisy Jacobs, “Implementation of LSB Steganography and Its Evaluation for Various Bits”, 2004.
[3]K.B.Raja, C.R.Chowdary, Venugopal K R, L.M.Patnaik, “A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images”, IEEE-0-7803-9588-3/05/$20.00 ©2005.
[4]Vijay Kumar Sharma, Vishal shrivastava, “A Steganography Algorithm for Hiding Images by improved LSB substitution by minize detection.” Journal of Theoretical and Applied Information Technology, Vol. 36 No.1, ISSN: 1992-8645, 15th February 2012.
[5]Po-Yueh Chen and Hung-Ju Lin, “A DWT Based Approach for Image Steganography”, International Journal of Applied Science and Engineering 4, 3: 275-290, 2006.
[6]Chen Ming, Zhang Ru, NiuXinxin, Yang Yixian, “Analysis of Current Steganography Tools: Classifications & Features” , International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP'06),IEEE- 0-7695-2745-0/06 $20.00 © 2006.
[7]Aneesh Jain, Indranil Sen. Gupta, “A JPEG Compression Resistant Steganography Scheme for Raster Graphics Images”,IEEE-1-4244-1272-2/07/$25.00©2007.
[8]Beenish Mehboob and Rashid Aziz Faruqui, “A Steganography Implementation”, IEEE -4244-2427-6/08/$20.00 ©2008.
[9]Hassan Mathkour, Batool Al-Sadoon, AmeurTouir, “A New Image Steganography Technique”,IEEE-978-1-4244-2108-4/08/$25.00 © 2008.
[10]NageswaraRaoThota, Srinivasa Kumar Devireddy, “Image Compression Using Discrete Cosine Transform”, Georgian Electronic Scientific Journal: Computer Science and Telecommunications, No.3 (17), 2008.
[11]MamtaJuneja, Parvinder Singh Sandhu, “Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption”, International Conference on Advances in Recent Technologies in Communication and Computing, 2009.
[12]Dr. Ekta Walia, Payal Jain, Navdeep, “An Analysis of LSB & DCT based Steganography” ,Global Journal of Computer science & technology, Vol. 10 Issue 1 (Ver 1.0), April 2010.
[13]K.B.Shiva Kumar, K.B.Raja, R.K.Chhotaray, SabyasachiPattnaik, “Coherent Steganography using Segmentation and DCT”, IEEE-978-1-4244-5967-4/10/$26.00 ©2010.
[14]K Suresh Babu, K B Raja, Kiran Kumar K, Manjula Devi T H, Venugopal K R, L M Patnaik, “Authentication of Secret Information in Image Steganography” .
[15]Arvind Kumar, Km. Pooja, “Steganography- A Data Hiding Technique”, International Journal of Computer Applications (0975 – 8887), Volume 9– No.7, November 2010.
[16]Atalla I. Hashad,Ahmed S. Madani, “A Robust Steganography Technique Using Discrete Cosine Transform Insertion” .
[17]Vijay Kumar, Dinesh Kumar, “Performance Evaluation of DWT Based Image Steganography”, IEEE- 978-1-4244-4791-6/10/$25.00_c 2010.
[18]Ali Al-Ataby and Fawzi Al-Naima, “A Modified High Capacity Image Steganography Technique Based on Wavelet Transform” The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010.
[19]T. Narasimmalou, Allen Joseph .R, “Optimized Discrete Wavelet Transform based Steganography” , IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT),2012.
[20]NedaRaftari and Amir MasoudEftekhariMoghadam, “Digital Image Steganography Based on Assignment Algorithm and Combination of DCT-IWT”, Fourth International Conference on Computational Intelligence, Communication Systems and Networks, 2012.
[21]AnkitaSancheti, “Pixel Value Differencing Image Steganography Using Secret Key” International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Volume-2, Issue-1, and December 2012.
[22]Neha Batra &PoojaKaushik, “Implementation of Modified 16×16 Quantization Table Steganography on Color Images”, International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, Volume 2, Issue 10, October 2012.
[23]ElhamGhasemi, JamshidShanbehzadeh, NimaFassihi, “High Capacity Image Steganography using Wavelet Transform and Genetic Algorithm”, proceedings of international multiconfrence of engineers & computer science, IMECS-Volume I , March 16-18,2011.
[24]Gurmeet Kaur and AartiKochhar, “A Steganography Implementation based on LSB & DCT”, “International Journal for Science and Emerging, Technologies with Latest Trends” 4(1), ISSN No. (Online):2250-3641, ISSN No. (Print): 2277-8136, 35-41 (2012).