A Novel Steganographic Scheme Using Weighted Matrix in Transform Domain

  • Partha Chowdhuri
  • Biswapati Jana
  • Debasis Giri
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 834)


In this paper a weighted matrix based steganographic scheme has been developed based on Discrete Cosine Transform (DCT). First, \((8 \times 8)\) quantized DCT coefficient blocks are obtained from the cover image. Instead of hiding the data directory to the quantized DCT coefficient blocks, a different approach has been taken here. The AC coefficients, except 0 coefficients, are used to form a series of \(3 \times 3\) temporary matrices. Then, each four bits secret data is converted into an integer value. An user defined weighted matrix is used to select the position in the temporary matrix where the data will be embedded. The integer value is then embedded into that particular position of the selected temporary matrix. The proposed method is tested using different steganographic attacks like RS analysis and NCC to show that the scheme is undetectable under these analysis and more robust that other schemes. This scheme provides good embedding capacity with high visual quality of stego images.


Steganography Weighted matrix Quantized DCT coefficient PSNR NCC 


  1. 1.
    Chang, C.C., Lin, C.C., Tseng, C.S., Tai, W.L.: Reversible hiding in DCT-based compressed images. Inf. Sci. 177, 2768–2786 (2007)CrossRefGoogle Scholar
  2. 2.
    Lin, C.C., Shiu, P.F.: High capacity data hiding scheme for DCT-based images. J. Inf. Hiding Multimed. Signal Process. 1(3), 220–240 (2010)Google Scholar
  3. 3.
    Lutovac, B., et al.: An algorithm for robust image watermarking based on the DCT and Zernike moments. Multimed. Tools Appl. 76(22), 23333–23352 (2017)CrossRefGoogle Scholar
  4. 4.
    Kim, H.S., Lee, H.-K.: Invariant image watermark using Zernike moments. IEEE Trans. Circuits Syst. Video Technol. 13(8), 766–775 (2003)CrossRefGoogle Scholar
  5. 5.
    UCID Image Database, Nottingham Trent University, UK.
  6. 6.
    Rahman, M.M., et al.: A semi blind watermarking technique for copyright protection of image based on DCT and SVD domain. Global J. Res. Eng. (2017)Google Scholar
  7. 7.
    Saidi, M., et al.: A new adaptive image steganography scheme based on DCT and chaotic map. Multimed. Tools Appl. 76(11), 13493–13510 (2017)CrossRefGoogle Scholar
  8. 8.
    Singh, D., Singh, S.K.: DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimed. Tools Appl. 76(1), 953–977 (2017)CrossRefGoogle Scholar
  9. 9.
    University of Southern California: The USC-SIPI Image Database.
  10. 10.
    Wei, S., Zhe-Ming, L., Yu-Chun, W., Fa-Xin, Y., Rong-Jun, S.: High performance reversible data hiding for block truncation coding compressed images. Signal Image Video Process. 7(2), 297–306 (2013)CrossRefGoogle Scholar
  11. 11.
    Weng, C.-Y., Huang, C.-T., Kao, H.-W.: DCT-based compressed image with reversibility using modified quantization. In: Pan, J.-S., Tsai, P.-W., Watada, J., Jain, L.C. (eds.) IIH-MSP 2017. SIST, vol. 81, pp. 214–221. Springer, Cham (2018). Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Partha Chowdhuri
    • 1
  • Biswapati Jana
    • 1
  • Debasis Giri
    • 2
  1. 1.Department of Computer ScienceVidyasagar UniversityMidnaporeIndia
  2. 2.Department of Computer Science and EngineeringHaldia Institute of TechnologyHaldiaIndia

Personalised recommendations