CFP last date
20 March 2024
Reseach Article

A New Steganography Method based on Optimal Coefficients Adjustment Process (OCAP)

by Fariba Ghorbany Beram, Mashallah Abbasi Dezfouli, Mohammadi Hossein Yektaie
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 87 - Number 2
Year of Publication: 2014
Authors: Fariba Ghorbany Beram, Mashallah Abbasi Dezfouli, Mohammadi Hossein Yektaie
10.5120/15181-3528

Fariba Ghorbany Beram, Mashallah Abbasi Dezfouli, Mohammadi Hossein Yektaie . A New Steganography Method based on Optimal Coefficients Adjustment Process (OCAP). International Journal of Computer Applications. 87, 2 ( February 2014), 28-32. DOI=10.5120/15181-3528

@article{ 10.5120/15181-3528,
author = { Fariba Ghorbany Beram, Mashallah Abbasi Dezfouli, Mohammadi Hossein Yektaie },
title = { A New Steganography Method based on Optimal Coefficients Adjustment Process (OCAP) },
journal = { International Journal of Computer Applications },
issue_date = { February 2014 },
volume = { 87 },
number = { 2 },
month = { February },
year = { 2014 },
issn = { 0975-8887 },
pages = { 28-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume87/number2/15181-3528/ },
doi = { 10.5120/15181-3528 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:04:53.880220+05:30
%A Fariba Ghorbany Beram
%A Mashallah Abbasi Dezfouli
%A Mohammadi Hossein Yektaie
%T A New Steganography Method based on Optimal Coefficients Adjustment Process (OCAP)
%J International Journal of Computer Applications
%@ 0975-8887
%V 87
%N 2
%P 28-32
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the technique for hiding secret information in other data such as multimedia images, text, audio. For hiding secret information in images, there exist a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. The existing methods hide the information using constant bit length in integer wavelet coefficients. The main drawback of the existed methods is overflow of pixels may occur in integer wavelet domain after embedding. This may probably results bit error while recovering secret information. This paper uses variable bit length based on float wavelet coefficients to hide the data in a particular positions using secret key and Optimal Coefficients Adjustment Process (OCAP). The system combines an float wavelet transform and the variable rate of embedding and embeds secret data in a random order using a secret key only known to both sender and receiver to maximize performance of this steganographic method. to obtain an optimal mapping function to reduce the difference error between original coefficients values and modified values, OCAP algorithm is proposed. From the experimental results it is seen that the proposed methods achieve a much higher visual quality as indicated by the high psnr in spite of hiding a larger number of secret bits in the image. Moreover, extraction of the secret information is independent of original cover image.

References
  1. Jayaram P, Ranganatha H R, Anupama H S," INFORMATION HIDING USING AUDIO TEGANOGRAPHY – A SURVEY", The International Journal of Multimedia & Its Applications (IJMA) Vol. 3, No. 3, August 2011
  2. Dhanya Job, 2Varghese Paul," Digital Image Steganography using Elliptical Curve Cryptography for Secured Data Transmission", Volume 3, Issue ICASE13, April 2013, ISSN Online: 2277-2677
  3. Seyyed Amin Seyyedi,Rauf. Kh Sadykhov,"Digital Image Steganography Concept and Evaluation", International Journal of Computer Applications (0975 – 8887) Volume 66– No. 5, March 2013
  4. Shen Wang, Bian Yang and Xiamu Niu," A Secure Steganography Method based on Genetic Algorithm", Volume 1, Number 1, January 2010
  5. Souvik Bhattacharyya, Indradip Banerjee and Gautam Sanyal," A Survey of Steganography and Steganalysis Technique in Image, Text, Audio and Video as Cover Carrier", Volume 2, No. 4, April 2011 Journal of Global Research in Computer Science REVIEW ARTICLE
  6. Moazzam Hossain, Sadia Al Haque, and Farhana Sharmin," Variable Rate Steganography in Gray Scale Digital Images Using Neighborhood Pixel Information", The International Arab Journal of Information Technology, Vol. 7, No. 1, January 2010
  7. Dr. Monisha Sharma1 and Mrs. Swagota Bera2," A REVIEW ON BLIND STILL IMAGE STEGANALYSIS TECHNIQUES USING FEATURES EXTRACTION AND PATTERN CLASSIFICATION METHOD", International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol. 2, No. 3, June 2012
  8. Hamdy A. Morsy, Zaki B. Nossair, Alaa M. Hamdy, Fathy Z. Amer," JPEG Steganography System with Minimal Changes to the Quantized DCT Coefficients", International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-1, Issue-6, January 2012
  9. Sandeep Singh, Aman Singh, "A Review on the Various Recent Steganography Techniques", IJCSN International Journal of Computer Science and Network, Volume 2, Issue 6, December 2013 ISSN (Online) : 2277-5420 www. IJCSN. org
  10. Bin Li, Junhui He, Jiwu Huang, Yun Qing Shi," A Survey on Image Steganography and Steganalysis", Journal of Information Hiding and Multimedia Signal Processing °c 2011 ISSN 2073-4212 Ubiquitous International Volume 2, Number 2, April 2011
  11. Nitin Jain, Sachin Meshram, Shikha Dubey," Image Steganography Using LSB and Edge – Detection Technique", International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-3, July 2012
  12. Zhang Tao1, Zhang Yan2, Li Wenxiang1, Ping Xijian1," STEGANALYSIS OF LSB MATCHING EXPLOITING HIGH-DIMENSIONAL CORRELATIONS BETWEEN PIXEL DIFFERENCES", 2009 Fifth International Conference on Natural Computation 978-0-7695-3736-8/09 $25. 00 © 2009 IEEE DOI 10. 1109/ICNC. 2009. 195
  13. Saddaf Rubab, M. Younus," Improved Image Steganography Technique for Colored Images using Wavelet Transform", International Journal of Computer Applications (0975 – 8887) Volume 39– No. 14, February 2012
  14. Khosravi Sara 1 , Abbasi Dezfoli Mashallah 2 , Yektaie Mohammad Hossein 3," A NEW STEGANOGRAPHY METHOD BASED ON HIOP (HIGHER INTENSITY OF PIXEL) ALGORITHM AND STRASSEN'S MATRIX MULTIPLICATION", Volume 2, No. 1, January 2011 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www. jgrcs. info
  15. Saddaf Rubab, M. Younus," Improved Image Steganography Technique for Colored Images using Wavelet Transform", International Journal of Computer Applications (0975 – 8887) Volume 39– No. 14, February 2012
  16. Sharma VK, Shrivastava V. 2010. Improving the performance of least significant bit substitution steganography against rs steganalysis by minimizing detection probability. International Journal of Information and Communication Technology Research. Volume 1 No. 4, August 2011 ISSN-2223-4985:148-156
  17. Bhattacharya T, Dey N, Chaudhuri B. 2012. A session based multiple image hiding technique using dwt and dct. International Journal of Computer Applications (0975 – 8887) Volume 38– No. 5:18-21
  18. Najran N. H. Al_Dawla,M. M. Kazi,K. V. Kale," Steganography Enhancement by combining text and image through Wavelet Technique", International Journal of Computer Applications (0975 – 8887) Volume 51– No. 21, August 2012
  19. Arun Rana1, Nitin Sharma2, Amandeep Kaur3," IMAGE STEGANOGRAPHY METHOD BASED ON KOHONEN NEURAL NETWORK", ISSN: 2248-9622 www. ijera. com Vol. 2, Issue 3, May-Jun 2012, pp. 2234-2236
  20. G. Bindu, K. Srilakshmi," A NOVEL APPROACH OF LSB STEGANOGRAPHY FOR RETREIVING TEXT FROM AUDIO", G Bindu et al ,Int. J. Computer Technology & Applications,Vol 3 (4), 1384-1387, ISSN:2229-6093
  21. Y?ld?ray YALMA,Ismail ERT¨URK," A new color image quality measure based on YUV transformation and PSNR for human vision system", Turk J Elec Eng & Comp Sci (2013) Turkish Journal of Electrical Engineering & Computer Sciences http://journals. tubitak. gov. tr/elektrik/
  22. S. Premkumar,L. Dinesh," Efficient Algorithm for Steganography Technique Combined with Image Cryptography for Secure Application", International Journal of Computer Applications (0975 – 8887) Volume 49– No. 13, July 2012
Index Terms

Computer Science
Information Sciences

Keywords

Steganography float wavelet coefficients variable rate psnr OCAP