Skip to main content

Using PSO Algorithm for Simple LSB Substitution Based Steganography Scheme in DCT Transformation Domain

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6728))

Abstract

An improved method for embedding a secret message into a cover image with least significant bit (LSB) substitution in discrete cosine transformation (DCT) domain was proposed. The secret message was first split into partitions, while the cover image was divided into blocks of size 2x2, and DCT was used to convert the blocks from spatial domain to frequency domain. Then, Particle Swarm Optimization (PSO) algorithm was applied to search for an optimal substitution matrix T to transform the split partitions for an optimal embedding. Next, the transformed part of secret message was embedded into the AC coefficients of the transformed image blocks by LSB substitution. Experimental results show the proposed method can keep the quality of the stego-image better, while the security of the hidden secret message is increased by use of the substitution matrix T.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal 35(3-4), 313–336 (1996)

    Article  Google Scholar 

  2. Li, X., Wang, J.: A steganographic method based upon JPEG and particle swarm optimization algorithm. Information Sciences 177, 3099–3109 (2007)

    Article  Google Scholar 

  3. Bhattacharyya, D., Dutta, J., Das, P., Banyopadhyay, S.K., Kim, T.-h.: Discrete cosine Transformation based image authentication and secret message transmission scheme. In: First International Conference on Computational Intelligence, Communication Systems and Networks (2009)

    Google Scholar 

  4. Blondin, J.: Particle Swarm Optimization: A tutorial (September 4, 2009)

    Google Scholar 

  5. Kennedy, Eberhart, R.C.: Swarm Intelligence. Morgan Kaufmann Publishers, San Francisco (2001) ISBN: 1-55860-595-9

    Google Scholar 

  6. Chang, C.C., Chen, T.S., Chung, L.Z.: A steganographic method based upon JPEG and quantization table modification. Information Science 141, 123–138 (2002)

    Article  MATH  Google Scholar 

  7. Parsopoulos, K.E., Vrahatis, M.N.: Particle Swarm Optimization and Intelligence: Advance and Applications. Information Science (2010)

    Google Scholar 

  8. Fazli, S., Kiamini, M.: A High Performance Steganographic Method Using Jpeg and PSO Algorithm. In: IEEE International Multitopic (December 24, 2008)

    Google Scholar 

  9. Fridrich, J.: Steganography in Digital Media Principles, Algorithm, and Applications. Cambridge University press, Cambridge (2010)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rabevohitra, F.H., Sang, J. (2011). Using PSO Algorithm for Simple LSB Substitution Based Steganography Scheme in DCT Transformation Domain. In: Tan, Y., Shi, Y., Chai, Y., Wang, G. (eds) Advances in Swarm Intelligence. ICSI 2011. Lecture Notes in Computer Science, vol 6728. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21515-5_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21515-5_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21514-8

  • Online ISBN: 978-3-642-21515-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics