Advertisement

An Adaptive Frequency Based Steganography Technique

  • Sonam ChhikaraEmail author
  • Rajeev Kumar
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 835)

Abstract

Steganography is an art of embedding data in an imperceptible way. Steganography technique has two category based on transformation: spatial and frquency domain transformation based techniques. The requirements of steganography are capacity, quality and imperceptibility. This paper works on capacity and quality simultaneously by embedding data in transformed domain at selected locations. Here, secret message bits are embedded in middle frequency, few low frequency and high frequency components at alternate position of discrete cosine transformed image. By this method, secret message bits will less affect the cover image’s information part. Analyses of this method and other DCT based methods over same image data set shows that proposed work has good PSNR value and high embedding capacity.

Keywords

Steganography Data hiding Security DCT 

References

  1. 1.
    Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE J. Sel. A. Commun. 16, 474–481 (2006)CrossRefGoogle Scholar
  2. 2.
    Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Water-marking and Steganography. Morgan Kaufmann Pub-lishers Inc., San Francisco (2008)Google Scholar
  3. 3.
    Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding-a survey. Proc. IEEE 87, 1062–1078 (1999)CrossRefGoogle Scholar
  4. 4.
    Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Reversible data hiding. In: Proceedings of the International Conference on Image Processing, vol. 2, pp. 157–160 (2002)Google Scholar
  5. 5.
    Ker, A.D.: Steganalysis of embedding in two least-signicant bits. IEEE Trans. Inf. Forensics Secur. 2, 46–54 (2007)CrossRefGoogle Scholar
  6. 6.
    Yu, L., Zhao, Y., Ni, R., Li, T.: Improved adaptive LSB steganography based on chaos and genetic algorithm. EURASIP J. Adv. Signal Process. 2010, 876–946 (2010)Google Scholar
  7. 7.
    Shreelekshmi, R., Wilscy , M., Madhavan, C.E.V.: Cover image preprocessing for more reliable LSB re-placement steganography. In: International Conference on Signal Acquisition and Processing, pp. 153–156 (2010)Google Scholar
  8. 8.
    Acharya, T., Tsai, P.-S.: JPEG2000 Standard for Image Compression: Concepts, Algorithms and VLSI Architectures. Wiley Interscience, New York (2004). ISBN. 0471484229CrossRefGoogle Scholar
  9. 9.
    Al Ataby, A., Al Naima, F.: A modified high capacity image steganography technique based on wavelet transform. Int. Arab J. Inf. Technol. 7, 358–364 (2010)Google Scholar
  10. 10.
    Naoum, R., Shihab, A., Al Hamouz, S.: Enhanced image steganography system based on discrete wavelet transformation and resilient back propagation. Int. J. Comput. Sci. Network Secur. 16, 114–122 (2016)Google Scholar
  11. 11.
    Allan Latham. Jphide (2008)Google Scholar
  12. 12.
    Provos, N.: Software OutGuess (2001). www.outguess.org
  13. 13.
    Westfeld, A.: F5—a steganographic algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001).  https://doi.org/10.1007/3-540-45496-9_21CrossRefGoogle Scholar
  14. 14.
    Solanki, K., Sarkar, A., Manjunath, B.S.: YASS: yet another steganographic scheme that resists blind steganalysis. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 16–31. Springer, Heidelberg (2007).  https://doi.org/10.1007/978-3-540-77370-2_2CrossRefGoogle Scholar
  15. 15.
    Raja, K.B., Chowdary, C.R.: A secure image steganography using lSB, DCT and compression techniques on raw images. In: Proceedings of the IEEE 3rd International Conference on Intelligent Sensing and Information Processing 2005 (ICISIP), pp. 170–176 (2005)Google Scholar
  16. 16.
    Raftari, N., Moghadam, A.M.E.: Digital image steganography based on assignment algorithm and combination of DCT-IWT. In: 2012 Fourth International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), pp. 295–300. IEEE (2012)Google Scholar
  17. 17.
    Chang, C.-C., Chen, T.-S., Chung, L.-Z.: A steganographic method based upon JPEG and quantization table modification. Inf. Sci. 141, 123–138 (2002)CrossRefGoogle Scholar
  18. 18.
    Sakai, H., Kuribayashi, M., Mori, M.: Adaptive reversible data hiding for JPEG images. In: International Symposium on Information Theory and Its Applications, pp. 1–6 (2008)Google Scholar
  19. 19.
    Almohammad, A., Hierons, R.M., Ghinea, G.: High capacity steganographic method based upon JPEG. In: Third International Conference on Availability, Reliability and Security, pp. 544–549 (2008)Google Scholar
  20. 20.
    Vongurai, N., Phimoltares, S.: Frequency-based steganography using 32\(\,\times \,\)32 interpolated quantization table and discrete cosine transform. In: Fourth International Conference on Computational Intelligence, Modelling and Simulation, pp. 249–253 (2012)Google Scholar
  21. 21.
    AwadAttaby, A., Mursi Ahmed, M.F.M., Alsammak, A.K.: Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3. Ain Shams Eng. J. 9(4), 1–10 (2017)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.School of Computer and System SciencesJawaharlal Nehru UniversityNew DelhiIndia

Personalised recommendations