CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

An Improved DCT based Steganography Technique

by Deepika Bansal, Rita Chhikara
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 102 - Number 14
Year of Publication: 2014
Authors: Deepika Bansal, Rita Chhikara
10.5120/17887-8861

Deepika Bansal, Rita Chhikara . An Improved DCT based Steganography Technique. International Journal of Computer Applications. 102, 14 ( September 2014), 46-49. DOI=10.5120/17887-8861

@article{ 10.5120/17887-8861,
author = { Deepika Bansal, Rita Chhikara },
title = { An Improved DCT based Steganography Technique },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 102 },
number = { 14 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 46-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume102/number14/17887-8861/ },
doi = { 10.5120/17887-8861 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:33:08.648738+05:30
%A Deepika Bansal
%A Rita Chhikara
%T An Improved DCT based Steganography Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 102
%N 14
%P 46-49
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, a steganographic technique for hiding secret data in image file formats is proposed. This technique uses the Quantized DCT coefficients for hiding the secret information. The proposed steganographic method can provide a high information hiding capacity and successfully increase the security.

References
  1. N. F. Johnson, S. Jajodia, Exploring Steganography: Seeing the Unseen IEEE Computer 31(2) (1998)26-34.
  2. Kh. Manglem Singh, S. Birendra Sigh and L. Shyam Sundar Singh, Hiding Encrypted Message in the Features of Images, IJCSNS, Vol. 7 No. 4, April 2007, pp 302-307.
  3. W. -N. Lie and L. -C. Chang, Data hiding in images with adaptive numbers of least significant bits based on human visual system, in Proc. ,IEEE Int. Conf. Image Processing, 1999, Page(s): 286–290.
  4. S. Katzenbeisser and F. A. P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking. Norwood, MA: Artech House, 2000.
  5. D. R. Denslin Brabin, Dr. V. Sadasivam, QET Based Steganography Technique for JPEG Images.
  6. Stuti Goel, Arun Rana & Manpreet Kaur, "A Review of Comparison Techniques of Image Steganography", Global Journal of Computer Science and Technology Volume XIII Issue IV Version I, 2013, pp. 8-14.
  7. K. B. Raja, C. R. Chowdary, Venugopal K R, L. M. Patnaik, "A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images".
  8. Wei Zheng, Yanchang Liu, "Research in a Fast DCT Algorithm Based on JPEG", IEEE, 2011, pp. 551-553.
  9. Xianhua Song, Shen Wang, Xiamu Niu, "An Integer DCT and Affine Transformation Based Image Steganography Method", Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012, pp. 102-105.
  10. Anirban Goswami, Dipankar Pal, Nabin Ghoshal, "Authentication Technique for Gray Images Using DCT (ATGIDCT)", 2012 Third International Conference on Emerging Applications of Information Technology (EAIT), pp. 421-424.
  11. Image Source: www. 1000pictures. com
  12. LibSVM ToolBox Available: http://www. csie. ntu. edu. tw/~cjlin/libsvm/
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Least Significant Bit Insertion Discrete Cosine Transform Steganography Algorithms