CFP last date
20 May 2024
Reseach Article

Randomized Embedding Scheme Based on DCT Coefficients for Image Steganography

Published on None 2010 by Ajit Danti, Preethi Acharya
Recent Trends in Image Processing and Pattern Recognition
Foundation of Computer Science USA
RTIPPR - Number 2
None 2010
Authors: Ajit Danti, Preethi Acharya
8a911fe5-badf-47ae-860f-789cc7663e90

Ajit Danti, Preethi Acharya . Randomized Embedding Scheme Based on DCT Coefficients for Image Steganography. Recent Trends in Image Processing and Pattern Recognition. RTIPPR, 2 (None 2010), 97-103.

@article{
author = { Ajit Danti, Preethi Acharya },
title = { Randomized Embedding Scheme Based on DCT Coefficients for Image Steganography },
journal = { Recent Trends in Image Processing and Pattern Recognition },
issue_date = { None 2010 },
volume = { RTIPPR },
number = { 2 },
month = { None },
year = { 2010 },
issn = 0975-8887,
pages = { 97-103 },
numpages = 7,
url = { /specialissues/rtippr/number2/982-105/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Recent Trends in Image Processing and Pattern Recognition
%A Ajit Danti
%A Preethi Acharya
%T Randomized Embedding Scheme Based on DCT Coefficients for Image Steganography
%J Recent Trends in Image Processing and Pattern Recognition
%@ 0975-8887
%V RTIPPR
%N 2
%P 97-103
%D 2010
%I International Journal of Computer Applications
Abstract

Main goal of steganography is to communicate securely in a completely undetectable manner. It is an art of hiding secret data in an innocently looking dummy container. In the Steganographic process, communication is masked to make the hidden message not discernible to the observer. Hidden message may be textual or image. In this paper, a novel image steganography method based on randomized bit embedding is presented. Firstly the Discrete Cosine Transform (DCT) of the cover image is obtained. Then the stego image is constructed by hiding the given secrete message image in Least Significant Bit of the cover image in random locations based on threshold. DCT coefficients determine the randomized pixel locations for hiding to resist blind steganalysis methods such as self calibration process by cropping some pixels to estimate the cover image features. Blind steganalysis schemes can be guessed easily hence the proposed technique is more practically applicable. Quality of the stego image is analyzed by tradeoff between no of bits used for embedding. Efficacy of the proposed method is illustrated by exhaustive experimental results and comparisons.

References
  1. Avcibas, I., Sankur, B., Memon, N.: Image steganalysis with binary similarity measures. In: Proc. ICIP, pp. 645–648 (2002)
  2. C. Kurak and J. McHugh, a cautionary note on image downgrading, in:Proceedings of the IEEE 8th Annual Computer Security Applications Conference, 30 Nov-4 Dec, 1992, pp. 153-159.
  3. Dabeer, O., Sullivan, K., Madhow, U., Chandrasekaran, S., Manjunath, B.: Detection of hiding in the least significant bit. IEEE Transactions on Signal Processing, Supplement on Secure Media I 52, 3046–3058 (2004)
  4. Fridrich, J., Goljan, M., Lisonˇek, P., Soukal, D.: Writing on wet paper. In: ACM Workshop on Multimedia and security, Magdeburg, Germany (2004)
  5. Harmsen, J.J., Pearlman, W.A.: Steganalysis of additive noise modelable information hiding. In: Proc. of SPIE, pp. 131–142 (2003)
  6. Hetzl, S., Mutzel, P.: A graph theoretic approach to steganography. In: 9th IFIP TC-6 TC-11 International Conference, Communications and Multimedia Security, Salzburg, Austria, vol. 3677, pp. 119–128 (2005)
  7. Lyu, S., Farid, H.: Detecting hidden messages using higher-order statistics and support vector machines. In: Ershov, A.P., Nepomniaschy, V.A. (eds.) International Symposium on Theoretical Programming. LNCS, vol. 5, Springer, Heidelberg (1974)
  8. Pevny, T., Fridrich, J.: Multi-class blind steganalysis for JPEG images. In: Proc. of SPIE, San Jose, CA (2006)
  9. Pevny, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proc. of SPIE, San Jose, CA (2007)
  10. Provos, N.: Defending against statistical steganalysis. In: 10th USENIX Security Symposium, Washington DC, USA (2001) of the IEEE 22nd Annual EMBS International Conference, July 23-28, 2000, Chicago, USA, pp. 280-283.
  11. S. Miaou, C. Hsu, Y. Tsai and H. Chao, A secure data hiding technique with heterogeneous data-combining capability for electronic patient records, in: Proceedin
  12. Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004)
  13. Shi, Y.Q., Chen, C., Chen, W.: A Markov process based approach to effective attacking JPEG steganography. In: Leilich, H.-O. (ed.) GI-NTG Fachtagung Struktur und Betrieb von Rechensystemen. LNCS, Springer, Heidelberg (1974)
  14. Solanki, K., Sullivan, K., Madhow, U., Manjunath, B.S., Chandrasekaran, S.: Statistical restoration for robust and secure steganography. In: Proc. ICIP, Genova, Italy, pp. II 1118–1121 (2005)
  15. Solanki, K., Sullivan, K., Madhow, U., Manjunath, B.S., Chandrasekaran, S.: Probably secure steganography: Achieving zero K-L divergence using statistical restoration. In: Proc. ICIP, Atlanta, GA, USA, pp. 125–128 (2006)
  16. U. C. Nirinjan and D. Anand, Watermarking medical images with patient information, in:Proceeding of the 20th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Hong Kong, China, 29 Oct-1 Nov, 1998, pp. 703-706.
  17. Wang, Y., Moulin, P.: Steganalysis of block-DCT image steganography. In: IEEE workshop on Statistical Signal Processing, IEEE Computer Society Press, Los Alamitos (2003)
  18. Westfeld, A.: High capacity despite better steganalysis (F5 - a steganographic algorithm). In: Moskowitz, I.S. (ed.) Information Hiding. LNCS, vol. 2137, pp. 289–302. pringer, Heidelberg (2001)
  19. Y. Li, C. Li and Wei, Protection of mammograms using blind steganography and watermarking, in: Proceeding of the IEEE International Symposium on Information Assurance and security , 2007, pp. 496-499.
  20. Zollner, H. Federrah, H. Klimant, A. Pfitzman, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf. Modelling the security of steganographic systems, 2nd Information Hiding Workshop, pp.345{355, april 1998.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography DCT (Discrete Cosine Transform) Image hiding Randomization