Skip to main content

DCT Based Robust Multi-bit Steganographic Algorithm

  • Conference paper
Advanced Computing, Networking and Informatics- Volume 2

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 28))

Abstract

With the rise of communication through the Internet, there has also been a rise of interception of important messages, thus resulting in a greater risk of breach of privacy. Hence, constant research is going on for the development and improvement of techniques that can handle such attacks. Most of the existing algorithms use either the spatial domain or the frequency domain of the image for embedding the secret message. This paper introduces a steganographic algorithm that uses the frequency domain of the image for selecting the potential pixels and the spatial domain for embedding the message bits, thus making it robust against steganalytic attacks. This technique is also capable of withstanding statistical attacks. Our proposed algorithm embeds a maximum of 5 bits of the message per pixel in each image component thus making the embedding capacity very high. Besides embedding capacity, our technique also has a high embedding efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chang, C.C., Tseng, H.W.: A Steganographic Method for Digital Images Using Side Match. Pattern Recognition Letters 25, 1431–1437 (2004)

    Article  Google Scholar 

  2. Dumitrescu, S., Wu, X., Memon, N.: In Steganalysis of Random LSB Embedding in Continuous-tone Images. In: IEEE International Conference on Image Processing, pp. 641–644 (2002)

    Google Scholar 

  3. Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB Steganography via Sample Pair Analysis. IEEE Transactions on Signal Processing 51(7) (2003)

    Google Scholar 

  4. Fridrich, J., Goljan, M., Dui, R.: Reliable Detection of LSB Steganography in Color and Grayscale Images. In: Proceedings of the ACM Workshop on Multimedia and Security, pp. 27–30 (2001)

    Google Scholar 

  5. Fridrich, J., Lisonek, P.: Grid Colorings in Steganography. IEEE Trans. on Information Theory 53(4), 1547–1549 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  6. Kahn, D.: The History of Steganography. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 1–17. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  7. Mandal, J.K., Das, D.: Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain. International Journal of Information Sciences and Techniques 2(4) (2012)

    Google Scholar 

  8. Mukherjee, I., Paul, G.: Efficient Multi-bit Image Steganography in Spatial Domain. In: Bagchi, A., Ray, I. (eds.) ICISS 2013. LNCS, vol. 8303, pp. 270–284. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  9. Park, Y.-R., Kang, H.-H., Shin, S.-U., Kwon, K.-R.: An Image Steganography Using Pixel Characteristics. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-M., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 581–588. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Paul, G., Davidson, I., Mukherjee, I., Ravi, S.S.: Keyless Steganography in Spatial Domain Using Energetic Pixels. In: Venkatakrishnan, V., Goswami, D. (eds.) ICISS 2012. LNCS, vol. 7671, pp. 134–148. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  11. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding: A Survey. Proceedings of the IEEE 87, 1062–1078 (1999)

    Article  Google Scholar 

  12. Provos, N.: Defending against Statistical Steganalysis. In: Tenth USENIX Security Symposium, pp. 325–335 (2001)

    Google Scholar 

  13. Reddy, V.L., Subramanyam, A., Reddy, P.C.: Implementation of LSB Steganography and its Evaluation for Various File Formats. International Journal of Advanced Networking and Applications 2(5), 868–872 (2011)

    Google Scholar 

  14. Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  15. Wu, D.C., Tsai, W.H.: A Steganographic Method for Images by Pixel-value Differencing. Pattern Recognition Letters 24, 1613–1626 (2003)

    Article  MATH  Google Scholar 

  16. Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S.: Image Steganographic Scheme Based on pixel value differencing and LSB replacement method. IEEE Proceedings on Vision,Image and Signal Processing 152(5), 611–615 (2005)

    Article  Google Scholar 

  17. http://www.webshots.com

  18. http://221bakerstreet.org

  19. http://www.petitcolas.net/fabien/watermarking/stirmark

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Imon Mukherjee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Mukherjee, I., Podder, A. (2014). DCT Based Robust Multi-bit Steganographic Algorithm. In: Kumar Kundu, M., Mohapatra, D., Konar, A., Chakraborty, A. (eds) Advanced Computing, Networking and Informatics- Volume 2. Smart Innovation, Systems and Technologies, vol 28. Springer, Cham. https://doi.org/10.1007/978-3-319-07350-7_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07350-7_42

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07349-1

  • Online ISBN: 978-3-319-07350-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics