Call for Paper - June 2022 Edition
IJCA solicits original research papers for the June 2022 Edition. Last date of manuscript submission is May 20, 2022. Read More

Implementing Semi-Blind Image Steganography with Improved Concealment

IJCA Proceedings on International Conference on Computer Technology
© 2015 by IJCA Journal
ICCT 2015 - Number 4
Year of Publication: 2015
Karan Nair
Karan Asher
Jonathan Joshi

Karan Nair, Karan Asher and Jonathan Joshi. Article: Implementing Semi-Blind Image Steganography with Improved Concealment. IJCA Proceedings on International Conference on Computer Technology ICCT 2015(4):14-19, September 2015. Full text available. BibTeX

	author = {Karan Nair and Karan Asher and Jonathan Joshi},
	title = {Article: Implementing Semi-Blind Image Steganography with Improved Concealment},
	journal = {IJCA Proceedings on International Conference on Computer Technology},
	year = {2015},
	volume = {ICCT 2015},
	number = {4},
	pages = {14-19},
	month = {September},
	note = {Full text available}


There have been a number of proposed methods to conceal information using steganographic techniques. Images are the favoured carrier due to the large capacity for concealed information and relative ease to work with. A number of methods exist to conceal text as well as image data within images. This paper proposes an information embedding scheme with improved concealment of secret images within larger images using a fractional embedding scheme. It explores the natural redundancy of image data, as well as limitations of human perception and statistical attacks to provide better subjective and objective concealment.


  • Bruce Norman, Secret warfare, the battle of Codes and Ciphers. Acropolis Books Inc. , first edition, 1980. ISBN 0-87491-600-3.
  • Neil F. Johnson, Sushil Jajodia, George Mason University, "Exploring Steganography: Seeing the Unseen", IEEE Computers, February 1998, pp. 26-34.
  • A. Joseph Raphael, Dr. V Sundaram, "Cryptography and Steganography – A Survey'' , Int. Journal of Comp. Tech. Appl. , Vol 2 (3), 626-630.
  • I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, "Digital Watermarking and Steganography (Second Edition)", Morgan Kaufmann Publishers, ISBN: 978-0-12-372585-1, 2007.
  • Philip Bateman, Dr. Hans Georg Schaathun,"Image Steganography and Steganalysis", Department of Computing, University of Surrey, 2008.
  • J. Fridrich, M. Goljan, and D. Hogea. "Attacking the OutGuess", Proceedings of the 3rd Information Hiding Workshop on Multimedia and Security 2002, Juan-les-Pins, France, 2002.
  • Ismail Avc?bas¸Nasir Memon and Bülent Sankur "Steganalysis Using Image Quality Metrics", IEEE Transactions on Image processing Vol. 12
  • Huynh-Thu, Q. ;Psytechnics Ltd. , Ipswich ; Ghanbari, M. "Scope of validity of PSNR in image/video quality assessment", IEEE xplore.
  • Zhou Wang, Alan C. Bovik, Hamid R. Sheikh and Eero P. Simoncelli "The SSIM Index for Image QualityAssessment",http://www. cns. nyu. edu/lcv/ssim/