scispace - formally typeset
Open AccessJournal ArticleDOI

ContSteg: Contourlet-Based Steganography Method

Hedieh Sajedi, +1 more
- 15 Oct 2009 - 
- Vol. 01, Iss: 3, pp 163-170
TLDR
The result of examining the proposed method with two of the most powerful steganaly-sis algorithms show that it could successfully embed data in cover-images with the average embedding ca-pacity of 0.05 bits per pixel.
Abstract
A category of techniques for secret data communication called steganography hides data in multimedia me-diums. It involves embedding secret data into a cover-medium by means of small perceptible and statistical degradation. In this paper, a new adaptive steganography method based on contourlet transform is presented that provides large embedding capacity. We called the proposed method ContSteg. In contourlet decomposi-tion of an image, edges are represented by the coefficients with large magnitudes. In ContSteg, these coeffi-cients are considered for data embedding because human eyes are less sensitive in edgy and non-smooth re-gions of images. For embedding the secret data, contourlet subbands are divided into 4×4 blocks. Each bit of secret data is hidden by exchanging the value of two coefficients in a block of contourlet coefficients. Ac-cording to the experimental results, the proposed method is capable of providing a larger embedding capacity without causing noticeable distortions of stego-images in comparison with a similar wavelet-based steg-anography approach. The result of examining the proposed method with two of the most powerful steganaly-sis algorithms show that we could successfully embed data in cover-images with the average embedding ca-pacity of 0.05 bits per pixel.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Current status and key issues in image steganography

TL;DR: A review of fundamental concepts, evaluation measures and security aspects of steganography system, various spatial and transform domain embedding schemes, and current research trends and directions to improve on existing methods are suggested.
Book ChapterDOI

SVD-DCT Based Medical Image Watermarking in NSCT Domain

TL;DR: A new hybrid transform domain technique for medical image watermarking is discussed and high robustness against geometrical and signal processing attacks in terms of peak signal to noise ratio (PSNR) and correlation coefficient (CC) is proved.
Journal ArticleDOI

Colour image steganography method based on sparse representation

TL;DR: The authors address the use of sparse representation to securely hide a message within non-overlapping blocks of a given colour image in the wavelet domain by introducing a novel refinement procedure in the proposed algorithm and experimental results show that the embedded data are invisible perceptually.
Journal ArticleDOI

Steganalysis based on steganography pattern discovery

TL;DR: This paper proposes an approach for Steganography Pattern Discovery (SPD), an evolutionary method to extract the signature of stego images against clean images via fuzzy if-then rules and results indicate that the pattern of a steganography method is extracted well and the type of steganographic method used to make a stegO image can be predicted with high accuracy.
Journal ArticleDOI

CBS: Contourlet-Based Steganalysis Method

TL;DR: An universal approach to steganalysis called CBS, which uses statistical moments of contourlet coefficients as features for analysis and a non-linear SVM classifier is applied to classify cover and stego images.
References
More filters
Book

Fundamentals of digital image processing

TL;DR: This chapter discusses two Dimensional Systems and Mathematical Preliminaries and their applications in Image Analysis and Computer Vision, as well as image reconstruction from Projections and image enhancement.
Book ChapterDOI

F5-A Steganographic Algorithm

TL;DR: The newly developed algorithm F5 withstands visual and statistical attacks, yet it still offers a large steganographic capacity because it implements matrix encoding to improve the efficiency of embedding and reduces the number of necessary changes.
Proceedings Article

Defending against statistical steganalysis

TL;DR: Improved methods for information hiding are presented and an a priori estimate is presented to determine the amount of data that can be hidden in the image while still being able to maintain frequency count based statistics.
Book ChapterDOI

Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines

TL;DR: In this article, a wavelet-like decomposition is used to build higher-order statistical models of natural images and support vector machines are then used to discriminate between untouched and adulterated images.
Book ChapterDOI

Feature-Based steganalysis for JPEG images and its implications for future design of steganographic schemes

TL;DR: In this article, a feature-based steganalytic method for JPEG images is proposed, where the features are calculated as an L 1 norm of the difference between a specific macroscopic functional calculated from the stego image and the same functional obtained from a decompressed, cropped, and recompressed stegos image.
Related Papers (5)