CFP last date
20 June 2024
Reseach Article

An Improved DCT based Steganography Technique

by Deepika Bansal, Rita Chhikara
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 102 - Number 14
Year of Publication: 2014
Authors: Deepika Bansal, Rita Chhikara
10.5120/17887-8861

Deepika Bansal, Rita Chhikara . An Improved DCT based Steganography Technique. International Journal of Computer Applications. 102, 14 ( September 2014), 46-49. DOI=10.5120/17887-8861

@article{ 10.5120/17887-8861,
author = { Deepika Bansal, Rita Chhikara },
title = { An Improved DCT based Steganography Technique },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 102 },
number = { 14 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 46-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume102/number14/17887-8861/ },
doi = { 10.5120/17887-8861 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:33:08.648738+05:30
%A Deepika Bansal
%A Rita Chhikara
%T An Improved DCT based Steganography Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 102
%N 14
%P 46-49
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, a steganographic technique for hiding secret data in image file formats is proposed. This technique uses the Quantized DCT coefficients for hiding the secret information. The proposed steganographic method can provide a high information hiding capacity and successfully increase the security.

References
  1. N. F. Johnson, S. Jajodia, Exploring Steganography: Seeing the Unseen IEEE Computer 31(2) (1998)26-34.
  2. Kh. Manglem Singh, S. Birendra Sigh and L. Shyam Sundar Singh, Hiding Encrypted Message in the Features of Images, IJCSNS, Vol. 7 No. 4, April 2007, pp 302-307.
  3. W. -N. Lie and L. -C. Chang, Data hiding in images with adaptive numbers of least significant bits based on human visual system, in Proc. ,IEEE Int. Conf. Image Processing, 1999, Page(s): 286–290.
  4. S. Katzenbeisser and F. A. P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking. Norwood, MA: Artech House, 2000.
  5. D. R. Denslin Brabin, Dr. V. Sadasivam, QET Based Steganography Technique for JPEG Images.
  6. Stuti Goel, Arun Rana & Manpreet Kaur, "A Review of Comparison Techniques of Image Steganography", Global Journal of Computer Science and Technology Volume XIII Issue IV Version I, 2013, pp. 8-14.
  7. K. B. Raja, C. R. Chowdary, Venugopal K R, L. M. Patnaik, "A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images".
  8. Wei Zheng, Yanchang Liu, "Research in a Fast DCT Algorithm Based on JPEG", IEEE, 2011, pp. 551-553.
  9. Xianhua Song, Shen Wang, Xiamu Niu, "An Integer DCT and Affine Transformation Based Image Steganography Method", Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012, pp. 102-105.
  10. Anirban Goswami, Dipankar Pal, Nabin Ghoshal, "Authentication Technique for Gray Images Using DCT (ATGIDCT)", 2012 Third International Conference on Emerging Applications of Information Technology (EAIT), pp. 421-424.
  11. Image Source: www. 1000pictures. com
  12. LibSVM ToolBox Available: http://www. csie. ntu. edu. tw/~cjlin/libsvm/
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Least Significant Bit Insertion Discrete Cosine Transform Steganography Algorithms