Skip to main content

Adaptive Steganography Based on Covariance and Dct

  • Conference paper
Information Technology and Mobile Communication (AIM 2011)

Abstract

The steganography is a covert communication to transfer confidential information over an internet. In this paper we propose Adaptive Steganography based on Covariance and Discrete Cosine Transform (ASCDCT) algorithm. The Average Covariance of the Cover Image (ACCI) is computed. The ACCI of 0.15 is considered as the threshold value. The cover image is segmented into 8*8 cells and DCT is applied to derive coefficients. The payload Most Significant Bits (MSBs) are embedded into the cover image based on ACCI and DCT coefficients. It is observed that the capacity, Peak Signal to Noise Ratio (PSNR) and security is better compared to the existing algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Luo, W., Huang, F., Huang, J.: Edge Adaptive Image Steganography Based on LSB Matching Revisited. IEEE Transactions on Information Forensics and Security 5, 173–178 (2010)

    Google Scholar 

  2. Yang, C.-H., Weng, C.-Y., Wang, S.-J., Sun, H.-M.: Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Sysytems. IEEE Transactions on Information Forensics and Security 3, 488–497 (2008)

    Article  Google Scholar 

  3. Lai, B.-L., Chang, L.-W.: Adaptive Data Hiding for Images Based on Harr Discrete Wavelet Transform. In: Chang, L.-W., Lie, W.-N. (eds.) PSIVT 2006. LNCS, vol. 4319, pp. 1085–1093. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  4. Raja, K.B., Vikas, Venugopal, K.R., Patnaik, L.M.: High Capacity Lossless Secure Image Steganography using Wavelets. In: International Conference on Advances Computing and Communications, pp. 230–235 (2006)

    Google Scholar 

  5. Velasco, C., Nano, M., Perez, H., Martinez, R., Yamaguchik: Adaptive JPEG Steganography using Convolutional Codes and Synchronization Bits in DCT Domain. In: 52nd IEEE International Midwest Symposium on Circuits and Systems, pp. 842–847 (2010)

    Google Scholar 

  6. El Safy, R.O., Zayed, H.H., El Dessouki, A.: An Adaptive Steganographic Technique Based on Integer Wavelet Transform. In: IEEE Proceedings on International Conference on Networks and Media, pp. 111–117 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sathisha, N. et al. (2011). Adaptive Steganography Based on Covariance and Dct. In: Das, V.V., Thomas, G., Lumban Gaol, F. (eds) Information Technology and Mobile Communication. AIM 2011. Communications in Computer and Information Science, vol 147. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20573-6_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20573-6_45

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20572-9

  • Online ISBN: 978-3-642-20573-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics