scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Implementation of image steganography algorithm using scrambled image and quantization coefficient modification in DCT

TL;DR: An effective algorithm has been introduced which would embed secret message data, scrambled by Arnold Transform, in frequency domain using the quantization coefficient modification in Discrete Cosine Transform (DCT).
Abstract: To ensure reliability and integrity in information transmission, image steganography is cutting edge technology in today's digital world. It can be implemented in spatial, time and frequency domain. In this research article, an effective algorithm has been introduced which would embed secret message data, scrambled by Arnold Transform, in frequency domain using the quantization coefficient modification in Discrete Cosine Transform (DCT). At first the cover image is split into blocks, then two dimensional DCT is applied on each image block and transformed secret message is inserted by analyzing mid-band coefficients of DCT. After the successful transmission of the cover image to the recipient, the secret message can be effectively recovered in high quality from the Stego image.
Citations
More filters
Journal ArticleDOI
TL;DR: Combined steganography using discrete cosine transform (DCT) and cryptography using the one-time pad or vernam cipher implemented on a digital image obtained satisfactory results with PSNR and NCC high and resistant to JPEG compression and median filter.
Abstract: Rapid development of Internet makes transactions message even easier and faster. The main problem in the transactions message is security, especially if the message is private and secret. To secure these messages is usually done with steganography or cryptography. Steganography is a way to hide messages into other digital content such as images, video or audio so it does not seem nondescript from the outside. While cryptography is a technique to encrypt messages so that messages can not be read directly. In this paper have proposed combination of steganography using discrete cosine transform (DCT) and cryptography using the one-time pad or vernam cipher implemented on a digital image. The measurement method used to determine the quality of stego image is the peak signal to noise ratio (PSNR) and ormalize cross Correlation (NCC) to measure the quality of the extraction of the decrypted message. Of steganography and encryption methods proposed obtained satisfactory results with PSNR and NCC high and resistant to JPEG compression and median filter. Keywords —Image Steganography, Discrete Cosine Transform (DCT), One Time Pad, Vernam, Chiper, Image Cryptography

55 citations


Cites methods from "Implementation of image steganograp..."

  • ...The difference in encryption techniques performed on the message before it is inserted, Arnold’s Transform to scramble message in [4], Blowfish Algorithm in [5], and RSA in [6]....

    [...]

  • ...In previous research [4], [5], [6] has combined steganography and cryptography technique....

    [...]

Proceedings ArticleDOI
01 Nov 2017
TL;DR: This paper proposed a combination of steganography and cryptography by using Discrete Cosine Transform (DCT), One Time Pad (OTP) and PN-Sequence implemented on a digital image to produce a better security system.
Abstract: The security of sending confidential data on the internet is very important. Thus, the data security techniques must be developed. Techniques like cryptography and steganography are techniques that are widely used to protect information messages that are confidential. Steganography is a technique to hide, while cryptography is a technique to encode. The combination of the two techniques produces a better security system. This paper proposed a combination of steganography and cryptography by using Discrete Cosine Transform (DCT), One Time Pad (OTP) and PN-Sequence implemented on a digital image. The test and measurement method used to determine the quality of stego image or final image is using Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE). On the other hand, Normalized Correlation Coefficient (NCC) is used to measure the quality of extraction and decryption messages from the proposed StegoCrypt method. The experimental results of this study get better results compared to previous studies where this technique has better imperceptibility and is more resistant to JPEG compression, median filter, and crop attacks.

24 citations


Cites methods from "Implementation of image steganograp..."

  • ...DCT has also been widely applied in message concealment techniques as in research [1][2][10]....

    [...]

Journal ArticleDOI
TL;DR: A new method has been proposed which combines cryptography and steganography to ensure even more secure communication and the Peak Signal to Noise Ratio (PSNR) of the proposed algorithm is better than most of the similar algorithms.
Abstract: Cryptography and Steganography are two prominent techniques to obtain secure communication over the shared media like the Internet. Steganography is slightly ahead of cryptography because of its stealthy characteristics. In this paper, a new method has been proposed which combines cryptography and steganography to ensure even more secure communication. The Advanced Encryption Standard (AES) in spatial domain of the carrier/cover image and Least Significant Bit (LSB) replacement in the transformed domain of the same image has been used after performing a Discrete Cosine Transform (DCT) on the pixels. An additional layer of security has been introduced by applying XOR operation on the AES encrypted message with the pixel values of the carrier image. The Peak Signal to Noise Ratio (PSNR) of the proposed algorithm is better than most of the similar algorithms. With better PSNR, the proposed method depicts a three layer of security of the information and error free decryption.

12 citations

Proceedings ArticleDOI
24 May 2018
TL;DR: A robust watermarking framework to embed a color watermark is presented and the efficiency of the proposed scheme against the most common attacks such as JPEG compression, impulsive and Gaussian noises, scaling, etc., has been tested in terms of Peak Signal-to-Noise Ratio, Similarity Structural Index Measure and Normalized Correlation Coefficient demonstrating good performance.
Abstract: Technology advances and easy access to multimedia tools with digital content have increased the number of issues in copyright procedures Digital watermarks are a set of techniques that are used to protect the copyright of digital content In this paper, a robust watermarking framework to embed a color watermark is presented To perform a color image as watermark, a method based on Discrete Cosine Transform (DCT) and Quantization Index Modulation (QIM) has been designed, besides, the color watermark is encoded in such a way that data to represent the colors are reduced Additionally, the coded watermark is embedded into the mid-frequency coefficients of DCT to ensure the robustness and imperceptibility of the watermark The efficiency of the proposed scheme against the most common attacks such as JPEG compression, impulsive and Gaussian noises, scaling, etc, has been tested in terms of Peak Signal-to-Noise Ratio (PSNR), Similarity Structural Index Measure (SSIM) and Normalized Correlation Coefficient (NCC) demonstrating good performance

12 citations

Journal ArticleDOI
TL;DR: A novel key-based blind method for RGB image steganography where multiple images can be hidden simultaneously is described which provides enhanced security as well as improve the quality of the stego.
Abstract: Steganography is a widely-used technique for digital data hiding. Image steganography is the most popular among all other kinds of steganography. In this article, a novel key-based blind method for RGB image steganography where multiple images can be hidden simultaneously is described. The proposed method is based on Discrete Cosine Transformation (DCT) and Discrete Wavelet Transformation (DWT) which provides enhanced security as well as improve the quality of the stego. Here, the cover image has been taken as RGB although the method can be implemented on grayscale images as well. The fundamental concept of visual cryptography has been utilized here in order to increase the capacity to a great extent. To make the method more robust and imperceptible, pseudo-random number sequence and a correlation coefficient have been used for embedding and the extraction of the secrets, respectively. The robustness of the method is tested against steganalysis attacks such as crop, rotate, resize, noise addition, and histogram equalization. The method has been applied on multiple sets of images and the quality of the resultant images have been analyzed through various matrices namely ‘Peak Signal to Noise Ratio,' ‘Structural Similarity index,' ‘Structural Content,' and ‘Maximum Difference.' The results obtained are very promising and have been compared with existing methods to prove its efficiency.

4 citations

References
More filters
Journal ArticleDOI
TL;DR: In this article, a structural similarity index is proposed for image quality assessment based on the degradation of structural information, which can be applied to both subjective ratings and objective methods on a database of images compressed with JPEG and JPEG2000.
Abstract: Objective methods for assessing perceptual image quality traditionally attempted to quantify the visibility of errors (differences) between a distorted image and a reference image using a variety of known properties of the human visual system. Under the assumption that human visual perception is highly adapted for extracting structural information from a scene, we introduce an alternative complementary framework for quality assessment based on the degradation of structural information. As a specific example of this concept, we develop a structural similarity index and demonstrate its promise through a set of intuitive examples, as well as comparison to both subjective ratings and state-of-the-art objective methods on a database of images compressed with JPEG and JPEG2000. A MATLAB implementation of the proposed algorithm is available online at http://www.cns.nyu.edu//spl sim/lcv/ssim/.

40,609 citations

01 Jan 1994
TL;DR: Some simple functions to compute the discrete cosine transform and how it is used for image compression are developed to illustrate the use of Mathematica in image processing and to provide the reader with the basic tools for further exploration of this subject.
Abstract: The discrete cosine transform (DCT) is a technique for converting a signal into elementary frequency components. It is widely used in image compression. Here we develop some simple functions to compute the DCT and to compress images. These functions illustrate the power of Mathematica in the prototyping of image processing algorithms. The rapid growth of digital imaging applications, including desktop publishing, multimedia, teleconferencing, and high-definition television (HDTV) has increased the need for effective and standardized image compression techniques. Among the emerging standards are JPEG, for compression of still images [Wallace 1991]; MPEG, for compression of motion video [Puri 1992]; and CCITT H.261 (also known as Px64), for compression of video telephony and teleconferencing. All three of these standards employ a basic technique known as the discrete cosine transform (DCT). Developed by Ahmed, Natarajan, and Rao [1974], the DCT is a close relative of the discrete Fourier transform (DFT). Its application to image compression was pioneered by Chen and Pratt [1984]. In this article, I will develop some simple functions to compute the DCT and show how it is used for image compression. We have used these functions in our laboratory to explore methods of optimizing image compression for the human viewer, using information about the human visual system [Watson 1993]. The goal of this paper is to illustrate the use of Mathematica in image processing and to provide the reader with the basic tools for further exploration of this subject.

364 citations

Journal Article
TL;DR: Analysis of Least Significant Bit (LSB) based Steganography and Discrete Cosine Transform (DCT) basedSteganography is presented, an implementation of both methods and their performance analysis has been done.
Abstract: This paper presents analysis of Least Significant Bit (LSB) based Steganography and Discrete Cosine Transform (DCT) based Steganography. LSB based Steganography embed the text message in least significant bits of digital picture. Least significant bit (LSB) insertion is a common, simple approach to embedding information in a cover file. Unfortunately, it is vulnerable to even a small image manipulation. Converting an image from a format like GIF or BMP, which reconstructs the original message exactly (lossless compression) to a JPEG, which does not (lossy compression), and then back could destroy the information hidden in the LSBs. DCT based Steganography embed the text message in least significant bits of the Discrete Cosine (DC) coefficient of digital picture. When information is hidden inside video, the program hiding the information usually performs the DCT. DCT works by slightly changing each of the images in the video, only to the extent that is not noticeable by the human eye. An implementation of both these methods and their performance analysis has been done in this paper.

131 citations

Journal ArticleDOI
TL;DR: A novel technique for Image steganography based on Block-DCT, where DCT is used to transform original image (cover image) blocks from spatial domain to frequency domain, which shows that the algorithm has a high capacity and a good invisibility.
Abstract: Image steganography is the art of hiding information into a cover image. This paper presents a novel technique for Image steganography based on DWT, where DWT is used to transform original image (cover image) from spatial domain to frequency domain. Firstly two dimensional Discrete Wavelet Transform (2-D DWT) is performed on a gray level cover image of size M × N and Huffman encoding is performed on the secret messages/image before embedding. Then each bit of Huffman code of secret message/image is embedded in the high frequency coefficients resulted from Discrete Wavelet Transform. Image quality is to be improved by preserving the wavelet coefficients in the low frequency subband. The experimental results show that the algorithm has a high capacity and a good invisibility. Moreover PSNR of cover image with stego-image shows the better results in comparison with other existing steganography approaches. Furthermore, satisfactory security is maintained since the secret message/image cannot be extracted without knowing decoding rules and Huffman table.

98 citations


"Implementation of image steganograp..." refers methods in this paper

  • ...In [6], another method is proposed where an image message is Huffman encoded and then embedded at LSB of DC coefficient in DCT of cover image....

    [...]

Proceedings ArticleDOI
21 Mar 2012
TL;DR: The results show that the proposed algorithm for modified steganography is highly secured with certain strength in addition to good perceptual invisibility.
Abstract: Steganography, the secret image is embedded in the cover image and transmitted in such a way that the existence of information is undetectable. The digital images, videos, sound files and other computer files can be used as carrier to embed the information. In this paper, we propose a modified secure and high capacity based steganography scheme of hiding a large-size secret image into a small-size cover image. Arnold transformation is performed to scrambles the secret image. Discrete Wavelet Transform (DWT) is performed in both images and followed by Alpha blending operation. Then the Inverse Discrete Wavelet Transformation (IDWT) is applied to get the stego image. We have investigated the performance of our scheme by comparing various qualities of the stego image and cover image. The results show that the proposed algorithm for modified steganography is highly secured with certain strength in addition to good perceptual invisibility.

70 citations