DCT Based Robust Multi-bit Steganographic Algorithm

  • Imon MukherjeeEmail author
  • Arunangshu Podder
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 28)


With the rise of communication through the Internet, there has also been a rise of interception of important messages, thus resulting in a greater risk of breach of privacy. Hence, constant research is going on for the development and improvement of techniques that can handle such attacks. Most of the existing algorithms use either the spatial domain or the frequency domain of the image for embedding the secret message. This paper introduces a steganographic algorithm that uses the frequency domain of the image for selecting the potential pixels and the spatial domain for embedding the message bits, thus making it robust against steganalytic attacks. This technique is also capable of withstanding statistical attacks. Our proposed algorithm embeds a maximum of 5 bits of the message per pixel in each image component thus making the embedding capacity very high. Besides embedding capacity, our technique also has a high embedding efficiency.


Information Security Multi-bit DCT Steganography Steganalysis Data hiding 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Chang, C.C., Tseng, H.W.: A Steganographic Method for Digital Images Using Side Match. Pattern Recognition Letters 25, 1431–1437 (2004)CrossRefGoogle Scholar
  2. 2.
    Dumitrescu, S., Wu, X., Memon, N.: In Steganalysis of Random LSB Embedding in Continuous-tone Images. In: IEEE International Conference on Image Processing, pp. 641–644 (2002)Google Scholar
  3. 3.
    Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB Steganography via Sample Pair Analysis. IEEE Transactions on Signal Processing 51(7) (2003)Google Scholar
  4. 4.
    Fridrich, J., Goljan, M., Dui, R.: Reliable Detection of LSB Steganography in Color and Grayscale Images. In: Proceedings of the ACM Workshop on Multimedia and Security, pp. 27–30 (2001)Google Scholar
  5. 5.
    Fridrich, J., Lisonek, P.: Grid Colorings in Steganography. IEEE Trans. on Information Theory 53(4), 1547–1549 (2007)MathSciNetCrossRefzbMATHGoogle Scholar
  6. 6.
    Kahn, D.: The History of Steganography. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 1–17. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  7. 7.
    Mandal, J.K., Das, D.: Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain. International Journal of Information Sciences and Techniques 2(4) (2012)Google Scholar
  8. 8.
    Mukherjee, I., Paul, G.: Efficient Multi-bit Image Steganography in Spatial Domain. In: Bagchi, A., Ray, I. (eds.) ICISS 2013. LNCS, vol. 8303, pp. 270–284. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  9. 9.
    Park, Y.-R., Kang, H.-H., Shin, S.-U., Kwon, K.-R.: An Image Steganography Using Pixel Characteristics. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-M., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 581–588. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  10. 10.
    Paul, G., Davidson, I., Mukherjee, I., Ravi, S.S.: Keyless Steganography in Spatial Domain Using Energetic Pixels. In: Venkatakrishnan, V., Goswami, D. (eds.) ICISS 2012. LNCS, vol. 7671, pp. 134–148. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  11. 11.
    Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding: A Survey. Proceedings of the IEEE 87, 1062–1078 (1999)CrossRefGoogle Scholar
  12. 12.
    Provos, N.: Defending against Statistical Steganalysis. In: Tenth USENIX Security Symposium, pp. 325–335 (2001)Google Scholar
  13. 13.
    Reddy, V.L., Subramanyam, A., Reddy, P.C.: Implementation of LSB Steganography and its Evaluation for Various File Formats. International Journal of Advanced Networking and Applications 2(5), 868–872 (2011)Google Scholar
  14. 14.
    Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  15. 15.
    Wu, D.C., Tsai, W.H.: A Steganographic Method for Images by Pixel-value Differencing. Pattern Recognition Letters 24, 1613–1626 (2003)CrossRefzbMATHGoogle Scholar
  16. 16.
    Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S.: Image Steganographic Scheme Based on pixel value differencing and LSB replacement method. IEEE Proceedings on Vision,Image and Signal Processing 152(5), 611–615 (2005)CrossRefGoogle Scholar
  17. 17.
  18. 18.
  19. 19.

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Department of Computer Science & EngineeringSt. Thomas’ College of Engineering & TechnologyKolkataIndia

Personalised recommendations