Abstract
With the rise of communication through the Internet, there has also been a rise of interception of important messages, thus resulting in a greater risk of breach of privacy. Hence, constant research is going on for the development and improvement of techniques that can handle such attacks. Most of the existing algorithms use either the spatial domain or the frequency domain of the image for embedding the secret message. This paper introduces a steganographic algorithm that uses the frequency domain of the image for selecting the potential pixels and the spatial domain for embedding the message bits, thus making it robust against steganalytic attacks. This technique is also capable of withstanding statistical attacks. Our proposed algorithm embeds a maximum of 5 bits of the message per pixel in each image component thus making the embedding capacity very high. Besides embedding capacity, our technique also has a high embedding efficiency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chang, C.C., Tseng, H.W.: A Steganographic Method for Digital Images Using Side Match. Pattern Recognition Letters 25, 1431–1437 (2004)
Dumitrescu, S., Wu, X., Memon, N.: In Steganalysis of Random LSB Embedding in Continuous-tone Images. In: IEEE International Conference on Image Processing, pp. 641–644 (2002)
Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB Steganography via Sample Pair Analysis. IEEE Transactions on Signal Processing 51(7) (2003)
Fridrich, J., Goljan, M., Dui, R.: Reliable Detection of LSB Steganography in Color and Grayscale Images. In: Proceedings of the ACM Workshop on Multimedia and Security, pp. 27–30 (2001)
Fridrich, J., Lisonek, P.: Grid Colorings in Steganography. IEEE Trans. on Information Theory 53(4), 1547–1549 (2007)
Kahn, D.: The History of Steganography. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 1–17. Springer, Heidelberg (1996)
Mandal, J.K., Das, D.: Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain. International Journal of Information Sciences and Techniques 2(4) (2012)
Mukherjee, I., Paul, G.: Efficient Multi-bit Image Steganography in Spatial Domain. In: Bagchi, A., Ray, I. (eds.) ICISS 2013. LNCS, vol. 8303, pp. 270–284. Springer, Heidelberg (2013)
Park, Y.-R., Kang, H.-H., Shin, S.-U., Kwon, K.-R.: An Image Steganography Using Pixel Characteristics. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-M., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 581–588. Springer, Heidelberg (2005)
Paul, G., Davidson, I., Mukherjee, I., Ravi, S.S.: Keyless Steganography in Spatial Domain Using Energetic Pixels. In: Venkatakrishnan, V., Goswami, D. (eds.) ICISS 2012. LNCS, vol. 7671, pp. 134–148. Springer, Heidelberg (2012)
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding: A Survey. Proceedings of the IEEE 87, 1062–1078 (1999)
Provos, N.: Defending against Statistical Steganalysis. In: Tenth USENIX Security Symposium, pp. 325–335 (2001)
Reddy, V.L., Subramanyam, A., Reddy, P.C.: Implementation of LSB Steganography and its Evaluation for Various File Formats. International Journal of Advanced Networking and Applications 2(5), 868–872 (2011)
Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)
Wu, D.C., Tsai, W.H.: A Steganographic Method for Images by Pixel-value Differencing. Pattern Recognition Letters 24, 1613–1626 (2003)
Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S.: Image Steganographic Scheme Based on pixel value differencing and LSB replacement method. IEEE Proceedings on Vision,Image and Signal Processing 152(5), 611–615 (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Mukherjee, I., Podder, A. (2014). DCT Based Robust Multi-bit Steganographic Algorithm. In: Kumar Kundu, M., Mohapatra, D., Konar, A., Chakraborty, A. (eds) Advanced Computing, Networking and Informatics- Volume 2. Smart Innovation, Systems and Technologies, vol 28. Springer, Cham. https://doi.org/10.1007/978-3-319-07350-7_42
Download citation
DOI: https://doi.org/10.1007/978-3-319-07350-7_42
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07349-1
Online ISBN: 978-3-319-07350-7
eBook Packages: EngineeringEngineering (R0)