Advertisement

A Novel Distributed Image Steganography Method Based on Block-DCT

  • Rosemary Koikara
  • Dip Jyoti Deka
  • Mitali Gogoi
  • Rig Das
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 315)

Abstract

Distributed Image Steganography (DIS) is a method of hiding secret information in multiple carrier images, making it more difficult to trace than conventional steganographic techniques, and requiring a collection of affected images for the retrieval of the secret data. In this paper we concentrate on performing DIS on grayscale images using Block-DCT (Discrete Cosine Transformation). Distributed Image Steganography using Block-DCT adds to the security of DIS by embedding the secret data in the Frequency Domain. This makes the carrier images more immune to various steganalysis attacks as the secret data is more evenly distributed amongst the pixels of the carrier images making it more difficult to determine its existence. We use parity check in order to compensate for round-off errors that are typically associated with DCT.

Keywords

Steganography Distributed steganography Block-DCT PSNR 

References

  1. 1.
    Bai, L., Biswas, S., Blasch, P.E.: An estimation approach to extract multimedia information in distributed steganographic images. In: Proceedings of the 10th International Conference on Information Fusion, Quebec, Canada, 9–12 July 2007Google Scholar
  2. 2.
    Jhonson, F.N., Jajodia, S.: Exploring steganography: seeing the unseen. In: Proceedings of the IEEE paper of Feb 1998Google Scholar
  3. 3.
    Cheddad, A., Condell, J., Curran, K., Kevitt, M.P.: Digital image steganography: survey and analysis of current methods. J. Sign. Proces. 90, 727–752 (2010)CrossRefzbMATHGoogle Scholar
  4. 4.
    Li, B., He, J., Huang, J., Shi, Y.Q.: A survey on image steganography and steganalysis. J. Inf. Hiding Multimedia Sign. Proces. 2(2), 142–172 (2011)Google Scholar
  5. 5.
    Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Secur. Priv. 1(3), 32–44 (2003)CrossRefGoogle Scholar
  6. 6.
    Thien, C.C., Lin, J.C.: Secret image sharing. J. Comput. Graph. 26(5), 765–770 (2002) Google Scholar
  7. 7.
    Shamir, A.: How to share a secret. Commun. ACM. 22(11), 612–613, (1979)Google Scholar
  8. 8.
    Das, R., Tuithung, T.: A review on “A novel technique for image steganography based on block-DCT and Huffman encoding”. In: Proceedings of the 4th International Conference on Computer Graphics and Image Processing, ICGIP-2012, 6–7 Oct, Singapore, SPIE 2012Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Rosemary Koikara
    • 1
  • Dip Jyoti Deka
    • 1
  • Mitali Gogoi
    • 1
  • Rig Das
    • 2
  1. 1.Department of Computer Science and Engineering and Information TechnologyDon Bosco College of Engineering and TechnologyGuwahatiIndia
  2. 2.Department of Computer Science and EngineeringNational Institute of TechnologyRourkelaIndia

Personalised recommendations