Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

A New Steganography Method based on Optimal Coefficients Adjustment Process (OCAP)

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 87 - Number 2
Year of Publication: 2014
Authors:
Fariba Ghorbany Beram
Mashallah Abbasi Dezfouli
Mohammadi Hossein Yektaie
10.5120/15181-3528

Fariba Ghorbany Beram, Mashallah Abbasi Dezfouli and Mohammadi Hossein Yektaie. Article: A New Steganography Method based on Optimal Coefficients Adjustment Process (OCAP). International Journal of Computer Applications 87(2):28-32, February 2014. Full text available. BibTeX

@article{key:article,
	author = {Fariba Ghorbany Beram and Mashallah Abbasi Dezfouli and Mohammadi Hossein Yektaie},
	title = {Article: A New Steganography Method based on Optimal Coefficients Adjustment Process (OCAP)},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {87},
	number = {2},
	pages = {28-32},
	month = {February},
	note = {Full text available}
}

Abstract

Steganography is the technique for hiding secret information in other data such as multimedia images, text, audio. For hiding secret information in images, there exist a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. The existing methods hide the information using constant bit length in integer wavelet coefficients. The main drawback of the existed methods is overflow of pixels may occur in integer wavelet domain after embedding. This may probably results bit error while recovering secret information. This paper uses variable bit length based on float wavelet coefficients to hide the data in a particular positions using secret key and Optimal Coefficients Adjustment Process (OCAP). The system combines an float wavelet transform and the variable rate of embedding and embeds secret data in a random order using a secret key only known to both sender and receiver to maximize performance of this steganographic method. to obtain an optimal mapping function to reduce the difference error between original coefficients values and modified values, OCAP algorithm is proposed. From the experimental results it is seen that the proposed methods achieve a much higher visual quality as indicated by the high psnr in spite of hiding a larger number of secret bits in the image. Moreover, extraction of the secret information is independent of original cover image.

References

  • Jayaram P, Ranganatha H R, Anupama H S," INFORMATION HIDING USING AUDIO TEGANOGRAPHY – A SURVEY", The International Journal of Multimedia & Its Applications (IJMA) Vol. 3, No. 3, August 2011
  • Dhanya Job, 2Varghese Paul," Digital Image Steganography using Elliptical Curve Cryptography for Secured Data Transmission", Volume 3, Issue ICASE13, April 2013, ISSN Online: 2277-2677
  • Seyyed Amin Seyyedi,Rauf. Kh Sadykhov,"Digital Image Steganography Concept and Evaluation", International Journal of Computer Applications (0975 – 8887) Volume 66– No. 5, March 2013
  • Shen Wang, Bian Yang and Xiamu Niu," A Secure Steganography Method based on Genetic Algorithm", Volume 1, Number 1, January 2010
  • Souvik Bhattacharyya, Indradip Banerjee and Gautam Sanyal," A Survey of Steganography and Steganalysis Technique in Image, Text, Audio and Video as Cover Carrier", Volume 2, No. 4, April 2011 Journal of Global Research in Computer Science REVIEW ARTICLE
  • Moazzam Hossain, Sadia Al Haque, and Farhana Sharmin," Variable Rate Steganography in Gray Scale Digital Images Using Neighborhood Pixel Information", The International Arab Journal of Information Technology, Vol. 7, No. 1, January 2010
  • Dr. Monisha Sharma1 and Mrs. Swagota Bera2," A REVIEW ON BLIND STILL IMAGE STEGANALYSIS TECHNIQUES USING FEATURES EXTRACTION AND PATTERN CLASSIFICATION METHOD", International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol. 2, No. 3, June 2012
  • Hamdy A. Morsy, Zaki B. Nossair, Alaa M. Hamdy, Fathy Z. Amer," JPEG Steganography System with Minimal Changes to the Quantized DCT Coefficients", International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-1, Issue-6, January 2012
  • Sandeep Singh, Aman Singh, "A Review on the Various Recent Steganography Techniques", IJCSN International Journal of Computer Science and Network, Volume 2, Issue 6, December 2013 ISSN (Online) : 2277-5420 www. IJCSN. org
  • Bin Li, Junhui He, Jiwu Huang, Yun Qing Shi," A Survey on Image Steganography and Steganalysis", Journal of Information Hiding and Multimedia Signal Processing °c 2011 ISSN 2073-4212 Ubiquitous International Volume 2, Number 2, April 2011
  • Nitin Jain, Sachin Meshram, Shikha Dubey," Image Steganography Using LSB and Edge – Detection Technique", International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-3, July 2012
  • Zhang Tao1, Zhang Yan2, Li Wenxiang1, Ping Xijian1," STEGANALYSIS OF LSB MATCHING EXPLOITING HIGH-DIMENSIONAL CORRELATIONS BETWEEN PIXEL DIFFERENCES", 2009 Fifth International Conference on Natural Computation 978-0-7695-3736-8/09 $25. 00 © 2009 IEEE DOI 10. 1109/ICNC. 2009. 195
  • Saddaf Rubab, M. Younus," Improved Image Steganography Technique for Colored Images using Wavelet Transform", International Journal of Computer Applications (0975 – 8887) Volume 39– No. 14, February 2012
  • Khosravi Sara 1 , Abbasi Dezfoli Mashallah 2 , Yektaie Mohammad Hossein 3," A NEW STEGANOGRAPHY METHOD BASED ON HIOP (HIGHER INTENSITY OF PIXEL) ALGORITHM AND STRASSEN'S MATRIX MULTIPLICATION", Volume 2, No. 1, January 2011 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www. jgrcs. info
  • Saddaf Rubab, M. Younus," Improved Image Steganography Technique for Colored Images using Wavelet Transform", International Journal of Computer Applications (0975 – 8887) Volume 39– No. 14, February 2012
  • Sharma VK, Shrivastava V. 2010. Improving the performance of least significant bit substitution steganography against rs steganalysis by minimizing detection probability. International Journal of Information and Communication Technology Research. Volume 1 No. 4, August 2011 ISSN-2223-4985:148-156
  • Bhattacharya T, Dey N, Chaudhuri B. 2012. A session based multiple image hiding technique using dwt and dct. International Journal of Computer Applications (0975 – 8887) Volume 38– No. 5:18-21
  • Najran N. H. Al_Dawla,M. M. Kazi,K. V. Kale," Steganography Enhancement by combining text and image through Wavelet Technique", International Journal of Computer Applications (0975 – 8887) Volume 51– No. 21, August 2012
  • Arun Rana1, Nitin Sharma2, Amandeep Kaur3," IMAGE STEGANOGRAPHY METHOD BASED ON KOHONEN NEURAL NETWORK", ISSN: 2248-9622 www. ijera. com Vol. 2, Issue 3, May-Jun 2012, pp. 2234-2236
  • G. Bindu, K. Srilakshmi," A NOVEL APPROACH OF LSB STEGANOGRAPHY FOR RETREIVING TEXT FROM AUDIO", G Bindu et al ,Int. J. Computer Technology & Applications,Vol 3 (4), 1384-1387, ISSN:2229-6093
  • Y?ld?ray YALMA,Ismail ERT¨URK," A new color image quality measure based on YUV transformation and PSNR for human vision system", Turk J Elec Eng & Comp Sci (2013) Turkish Journal of Electrical Engineering & Computer Sciences http://journals. tubitak. gov. tr/elektrik/
  • S. Premkumar,L. Dinesh," Efficient Algorithm for Steganography Technique Combined with Image Cryptography for Secure Application", International Journal of Computer Applications (0975 – 8887) Volume 49– No. 13, July 2012