scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

A new steganographic method using Contourlet Transform

TL;DR: This paper introduces a new steganographic method in transform domain based on contourlet PDFB (pyramidal directional filter bank) based transform that has a good imperceptibility and to show this, the method uses four different visual quality metrics.
Abstract: The technique, digital steganography is a secret data hiding scheme which involves hiding data in multimedia files. Steganographic methods embed secret data in the cover media with minimum visual and statistical distortion. This paper introduces a new steganographic method in transform domain based on contourlet PDFB (pyramidal directional filter bank) based transform. Contourlet is a multiscale and multidirectional transform domain, which provides the both spatial and frequency domain information. This method also uses the wavelet based compression technique like that of JPEG2000 on the secret data for transferring more information with fewer data. The approximation sub-band is embedded in the contourlet coefficients of the cover image. Approximation subband is multiplied by a constant factor k, which is determined experimentally. Modified values of approximation sub-band are embedded in the contourlet subband of the cover image by replacing them directly. Experimental results give that the proposed method has a good imperceptibility and to show this, the method uses four different visual quality metrics.
Citations
More filters
Journal ArticleDOI
19 May 2019
TL;DR: A review of relevant research in cybersecurity tools and technologies is performed, organized according to both active and passive Defensive Cyberspace Operations, which accounts for the bulk of the cyber research literature over the last two decades.
Abstract: The realm of cybersecurity is perhaps one of the most quickly evolving areas within today’s research space. New and emerging technologies, as well as the growth of cybersecurity environment...

17 citations

Book ChapterDOI
01 Jan 2023
TL;DR: In this article , the authors proposed a steganography method to hide the existence of the data using the image as the cover image and the parameters Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), and Structured Similarity Index Measure (SSIM) are calculated.
Abstract: In today’s society, data security is of the utmost importance. Securing data by ensuring confidentiality and integrity is crucial. Security of information is essential for transferring confidential data, data storing, and database systems. Steganography is one of the methods of protecting data. As you can see, steganography is the art and science of concealing communication, i.e., encasing the secret message inside another medium, such as images, audio, video, or text. Steganography is a method with several advantages, including high concealment capacity and undetectability. There are different types of steganography. The type of steganography depends on the type of cover object such as text, image, video we use to conceal the secret. Image steganography is hiding the existence of the data using the image as the cover image. Lastly, the parameters Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), and Structured Similarity Index Measure (SSIM) are calculated which give an indication of the efficiency of the proposed method.
References
More filters
Journal ArticleDOI
TL;DR: It is demonstrated, through the experiments, that choosing suitable cover image by a proper selection measure could help the steganographer reduce detectability of stego images and the effect of cover selection on steganography embedding and steganalysis results is investigated.
Abstract: In this paper, we present a new adaptive contourlet-based steganography method that hides secret data in a specific or automatically selected cover image. Our proposed steganography method primarily decomposes the cover image by contourlet transform. Then, every bit of secret data is embedded by increasing or decreasing the value of one coefficient in a block of a contourlet subband. Contourlet coefficients are manipulated relative to their magnitudes to hide the secret data adaptively. In addition to proposing contourlet-based steganography method, this work investigates the effect of cover selection on steganography embedding and steganalysis results. We demonstrate, through the experiments, that choosing suitable cover image by a proper selection measure could help the steganographer reduce detectability of stego images. The proposed technique is examined with some state-of-the-art steganalysis methods, and the results illustrate that an image can successfully hide secret data with average embedding capacity of 0.02 bits per pixel in a random selected cover image. Cover selection improves the embedding capacity up to 0.06 bits per pixel. Several experiments and comparative studies are performed to show the effectiveness of the proposed technique in enhancing the security of stego images, as well as to demonstrate its gain over the previous approaches in literature.

41 citations


"A new steganographic method using C..." refers methods in this paper

  • ...Since, there is no control over the the complex nature of the transform function, the proposed method tries to keep the embedding process as simple as possible to reduce the overall complexity of the method, which is not observed in the other contourlet based steganographic methods [14],[16],[17]....

    [...]

Proceedings ArticleDOI
19 Apr 2016
TL;DR: The aim of this paper is design of image steganographic method with high secure level and high non-perceptibility level and the relation between security and capacity of the method was improved by special compression of QR code before the embedding process.
Abstract: This paper is focused on proposal of image steganographic method that is able to embedding of encoded secret message using Quick Response Code (QR) code into image data Discrete Wavelet Transformation (DWT) domain is used for the embedding of QR code, while embedding process is additionally protected by Advanced Encryption Standard (AES) cipher algorithm In addition, typical characteristics of QR code was broken using the encryption, therefore it makes the method more secure The aim of this paper is design of image steganographic method with high secure level and high non-perceptibility level The relation between security and capacity of the method was improved by special compression of QR code before the embedding process Efficiency of the proposed method was measured by Peak Signal-to-Noise Ratio (PSNR) and achieved results were compared with other steganographic tools

32 citations


"A new steganographic method using C..." refers methods in this paper

  • ...A DWT steganographic method along with QR code and AES algorithm is proposed in [10] to provide another level of security....

    [...]

Journal ArticleDOI
TL;DR: Experimental results indicated that the proposed adaptive scheme significantly is superior to the currently existing scheme, in terms of stego-image visual quality, embedding capacity and level of security and also the non- Adaptive method is better than other non-adaptive methods, in view of stEGo- image quality.

24 citations

Journal ArticleDOI
TL;DR: The result of examining the proposed method with two of the most powerful steganaly-sis algorithms show that it could successfully embed data in cover-images with the average embedding ca-pacity of 0.05 bits per pixel.
Abstract: A category of techniques for secret data communication called steganography hides data in multimedia me-diums. It involves embedding secret data into a cover-medium by means of small perceptible and statistical degradation. In this paper, a new adaptive steganography method based on contourlet transform is presented that provides large embedding capacity. We called the proposed method ContSteg. In contourlet decomposi-tion of an image, edges are represented by the coefficients with large magnitudes. In ContSteg, these coeffi-cients are considered for data embedding because human eyes are less sensitive in edgy and non-smooth re-gions of images. For embedding the secret data, contourlet subbands are divided into 4×4 blocks. Each bit of secret data is hidden by exchanging the value of two coefficients in a block of contourlet coefficients. Ac-cording to the experimental results, the proposed method is capable of providing a larger embedding capacity without causing noticeable distortions of stego-images in comparison with a similar wavelet-based steg-anography approach. The result of examining the proposed method with two of the most powerful steganaly-sis algorithms show that we could successfully embed data in cover-images with the average embedding ca-pacity of 0.05 bits per pixel.

21 citations


"A new steganographic method using C..." refers methods in this paper

  • ...Since, there is no control over the the complex nature of the transform function, the proposed method tries to keep the embedding process as simple as possible to reduce the overall complexity of the method, which is not observed in the other contourlet based steganographic methods [14],[16],[17]....

    [...]

Journal ArticleDOI
TL;DR: Improved version of the first adaptive image steganography methods in which it uses an advanced embedding operation to boost its security has been proposed, and has superior performance in terms of PSNR and SSIM, and is more secure against the steganalysis attack.
Abstract: This work presents adaptive image steganography meth-ods which locate suitable regions for embedding by contourlet trans-form, while embedded message bits are carried in discrete cosinetransform coefficients The first proposed method utilizes contourlettransform coefficients to select contour regions of the image In theembedding procedure, some of the contourlet transform coefficientsmay change which may cause errors at the message extractionphase We propose a novel iterative procedure to resolve such prob-lems In addition, we have proposed an improved version of the firstmethod in which it uses an advanced embedding operation to boostits security Experimental results show that the proposed basemethod is an imperceptible image steganography method with zeroretrieval error rate Comparisons with other steganography methodswhich utilize contourlet transform show that our proposed method isable to retrieve all messages perfectly, whereas the others failMoreover, the proposed method outperforms the ContSteg methodin termsofPSNRandthehigher-order statisticssteganalysismethodExperimental evaluations of our methods with the well known DCT-based steganography algorithms have demonstrated that ourimproved method has superior performance in terms of PSNR andSSIM, and is more secure against the steganalysis attack © 2013SPIE and IS&T [DOI: 101117/1JEI224043007]

19 citations


"A new steganographic method using C..." refers methods in this paper

  • ...Dual transform function, contourlet and DCT have been used in [13]....

    [...]