Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

An Optimized Trade-off Decomposition Steganography Algorithm

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 86 - Number 5
Year of Publication: 2014
Mazhar Tayel
Hamed Shawky

Mazhar Tayel and Hamed Shawky. Article: An Optimized Trade-off Decomposition Steganography Algorithm. International Journal of Computer Applications 86(5):19-23, January 2014. Full text available. BibTeX

	author = {Mazhar Tayel and Hamed Shawky},
	title = {Article: An Optimized Trade-off Decomposition Steganography Algorithm},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {86},
	number = {5},
	pages = {19-23},
	month = {January},
	note = {Full text available}


In this paper a modified Steganography algorithm is proposed. A fuzzification is performed in the message channel to compress the decomposed coefficients before embedding in the cover-image to get a new Stego-image. A relative embedding strength factor (ESF) is used for embedding the secret in the cover-image. The well known metrics (MSE, PSNR, Cor. and Entropy) were used to evaluate quality of the modified algorithm. Also, the trade-off factor was introduced to determine an optimum value for the ESF to get an acceptable degradation in the Stego-image. In addition, the reconstruction algorithm mentioned in previous paper was modified using the optimum value of the ESF. Comparisons show improved results w. r. t. other algorithms.


  • Nuno Roma, Leonel Sousa "A tutorial overview on the properties of the discrete cosine transform for encoded image and video processing" Rua Alves Redol, Lisboa – Portugal, February 2011.
  • Ekta Walia, Payal Jain, Navdeep "An Analysis of LSB & DCT based Steganography " Global Journal of Computer Science and Technology, April 2010.
  • Abbas Cheddad , Joan Condell, Kevin Curran, Paul Mc Kevitt" Digital image steganography: Survey and analysis of current methods " www. elsevier. com/locate/sigpro Signal Processing 2010.
  • Hardik Patel, Preeti Dave " Steganography Technique Based on DCT Coefficients" International Journal of Engineering Research and Applications, Jan-Feb 2012.
  • Hossein Malekmohamadi and Shahrokh Ghaemmaghami" stegoanalsis of lsb based image Steganography using spatial and frequency domain features" IEEE 2009.
  • A. Nag, S. Biswas, D. Sarkar, P. P. Sarkar "A novel technique for image steganography based on Block-DCT and Huffman Encoding", International Journal of Computer Science and Information Technology, June 2010.
  • Matus Jokay — Tomas Moravc?k " Image-Based JPEG Steganography", Tatra Mt. Math. Publ. 2010.
  • Orea flores, M. A. acivedo "wavelet and discreet transforms for insetting information into BMB image ", July 2006.
  • Mazhar Tayel, Alaa Hafez, Hamed Shawky "A New Hybrid Fuzzy-Decomposed Full Capacity Stego-System " under publication in IEEE Aerospace Conference 2014.
  • George Corser," Entropy as an Estimate of Image Steganography" Oakland University Rochester, USA 2013, gpcorser@oakland. edu.
  • Nedal M. S. Kafri and Hani Y. Suleiman "Bit-4 of Frequency Domain-DCT Steganography Technique" IEEE, 2009.
  • Deepak Singla1, Rupali Syal "Data Security Using LSB & DCT Steganography in Images ", International Journal of Computational Engineering Research/ IJCER , Mar-Apr 2012.
  • Blossom Kaur, Amandeep Kaur, Jasdeep Singh" steganographic approach for hiding image in DCT domain" IJAET, July 2011.
  • Mazhar Tayel, Hamed Shawky, Alaa El-Din Sayed Hafez "New Chaos Steganography algorithm for Hiding Multimedia Data" advanced communication technology (ICACT), 2012.
  • Mazhar Tayel, Alaa Hafez, Hamed Shawky," A Hybrid Chaos- Fuzzy –Threshold Steganography Algorithm for Hiding Secure Data" ICACT Transactions on Advanced Communications Technology (TACT), Jan. 2013.