Advertisement

A novel steganographic scheme using discrete sine transform based on energy distribution

  • H. B. Kekre
  • Archana Athawale
  • Dipali Sadavarti
Conference paper

Abstract

The research concerning the technique of hiding secret message into another information is usually named steganography. This is because the word steganography comes from the Greek root meaning Covered Writing. An image steganographic scheme is one kind of steganographic systems, where the secret message is hidden in a digital image with some hiding method [1]. Some one can then use a proper embedding procedure to embed the secret message into the cover image in such a way that it is imperceptible to a human observer. The hidden message can then be recovered using appropriate extraction procedure. The original image is called the cover image and the message-embedded image is called a stego-image.

Keywords

Discrete Cosine Transform Discrete Wavelet Transform Cover Image Secret Message Secret Image 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Chin-Chen Chang, Tung-Shou Chen, Hsien-Chu Hsia, “An Effective Image Steganographic Scheme Based on Wavelet Transformation and Pattern-Based Modification,” iccnmc, pp.450, 2003 International Conference on Computer Networks and Mobile Computing (ICCNMC’03), 2003Google Scholar
  2. 2.
    R.O.EI Safy, H.H. Zayed and A. EI Dessouki, “An Adaptive Steganographic Technique Based on Integer Wavelet Transform,” International Conference on Networking and Media Convergence, 2009 (ICNM) 2009 ) on 24-25 MarchGoogle Scholar
  3. 3.
    Wu, H.-C.; Wu, N.-I.; Tsai, C.-S.; Hwang, M.-S, ” Image steganographic scheme based on pixel-value differencing and LSB replacement methods,” Vision, Image and Signal Processing, IEE Proceedings - Volume 152, Issue 5, 7 Oct. 2005Google Scholar
  4. 4.
    C.K Chan and L.M Cheng, ” Hiding data in images by simple LSB substitution, ” Pattern Recognition, pp. 469474, Mar. 2004Google Scholar
  5. 5.
    P. Chen and H. Lin, “ A DWT Approach for Image Steganography, ”, International Journal of Applied Science and Engineering 2006. 4, 3Google Scholar
  6. 6.
    Dr.H. B. Kekre, Ms. Archana Athawale and Ms. Pallavi N. Halarnkar, “Increased Capacity of Information Hiding in LSBs Method for Text and Image”, International Journal of Electrical, Computer and Systems Engineering, Volume 2 Number 4. http://www.waset.org/ijecse/v2.html
  7. 7.
    Dr. H. B. Kekre, Ms. Archana Athawale, “Information Hiding using LSB Technique with Increased Capacity” International Journal of Cryptography and Security, Vol-I, No.2, Oct-2008Google Scholar
  8. 8.
    Dr. H. B. Kekre, Ms. Archana Athawale and Ms. Pallavi N. Halarnkar, “Polynomial Transformation To Improve Capacity Of Cover Image For Information Hiding In Multiple LSB’s “, International Journal of Engineering Research and Industrial Applications (IJERIA), Ascent Publications, Volume II, March 2009, PuneGoogle Scholar
  9. 9.
    Dr. H. B. Kekre, Ms. Archana Athawale and Ms. Pallavi N. Halarnkar, “Performance Evaluation Of Pixel Value Differencing And Kekre’s Modified Algorithm For Information Hiding In Images”, ACM International Conference on Advances in Computing, Communication and Control (ICAC3).2009 (Uploaded on ACM Portal:http://portal.acm.org/citation.cfm?id=1523103.15231 72)
  10. 10.
    Dr. H. B. Kekre, Ms. Archana Athawale and Ms. Pallavi N. Halarnkar, “Comparative Study of Different Color Spaces for Information Hiding using Multiple LSB’s in Different Components”, IEEE International Advance Computing Conference IACC’09, held on 6th – 7th March 09, Patiala PunjabGoogle Scholar
  11. 11.
    Dr. H. B. Kekre, Ms. Archana Athawale and Ms. Pallavi N. Halarnkar, “High Payload using High Boost Filtering in Kekre’s Multiple LSB’s Algorithm”, 2nd International Conference on Advances in Computer Vision and Information Technology ACVIT 2009, 16th -19th December 2009, AurangabadGoogle Scholar
  12. 12.
    Dr.Dr. H. B. Kekre, Ms. Archana Athawale, Ms. Pallavi N. Halarnkar and Mr. Varun Banura, “Performance Comparison of DCT and Walsh Transform for Steganography”, Accepted for ICWETGoogle Scholar
  13. 13.
    Dr. H. B. Kekre, Ms. Archana Athawale and Ms. Pallavi N. Halarnkar, “Increased Capacity Of Least Significant Bits Embedding For Information Hiding”,TechnoPath Technical Magazine, NMIMS University.Volume 1 No 1Google Scholar
  14. 14.
    Dr. H. B. Kekre, Ms. Archana Athawale and Ms. Pallavi N. Halarnkar, “Robust and Secured Information Hiding using Polynomial Transformation in Kekre’s LUV color space and multiple LSBs”, National Conference on Information and Communication Technology NCICT-09, held on 6th – 7th March 2009, MumbaiGoogle Scholar
  15. 15.
    Dr. H. B. Kekre, Ms. Archana Athawale and Ms. Pallavi N. Halarnkar,”High Payload using High Boost Filtering in Kekre’s Multiple LSB’s Algorithm for Information Hiding”, Technopath Technical Magazine May 2009, Volume 1 No 2Google Scholar
  16. 16.
    Dr. H. B. Kekre, Ms. Archana Athawale and Ms. Pallavi N. Halarnkar, “Increased Capacity and High Security for Embedding Secret Message in Transform Domain using Discrete Cosine Transform”, Accepted in TechnopathGoogle Scholar

Copyright information

© Springer India Pvt. Ltd 2011

Authors and Affiliations

  • H. B. Kekre
    • 1
  • Archana Athawale
    • 2
  • Dipali Sadavarti
    • 3
  1. 1.NMIMS UniversityMumbaiIndia
  2. 2.Thadomal Shahani Engineering CollegeMumbaiIndia
  3. 3.MumbaiIndia

Personalised recommendations