Skip to main content

Uniformly Spread Embedding Based Steganography

  • Conference paper
  • First Online:
  • 1247 Accesses

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 290))

Abstract

In this paper, we propose a higher capacity steganographic approach basing on a novel mapping method. We exploit the strong energy compaction property in the Discrete Cosine Transform (DCT) to ensure a maximum embedding capacity resulting minimum embedding artifact. The approach combines the compaction efficiency with a randomized embedding behavior generated by a chaotic function PieceWise Linear Chaotic Map. The scrambled embedding positions ensures the security aspect. The mapping applied over bits enlarges the capacity of our approach by embedding symbols within DCT coefficients instead of bits.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Yang, H., Sun, X., Sun, G.: A high-capacity image data hiding scheme using adaptive LSB substitution (2009)

    Google Scholar 

  2. Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Lossless generalized-LSB data embedding. IEEE Trans. Image Process. 14, 253–266 (2006)

    Article  Google Scholar 

  3. Wang, Z.-H., Chang, C.-C., Li, M.-C.: Optimizing least-significant-bit substitution using cat swarm optimization strategy. Inf. Sci. 192, 98–108 (2012)

    Article  Google Scholar 

  4. Baby, D., Thomas, J., Augustine, G., George, E., Michael, N.R.: A novel DWT based image securing method using steganography. Procedia Comput. Sci. 46, 612–618 (2015)

    Article  Google Scholar 

  5. Ghasemi, E., Shanbehzadeh, J., Fassihi, N.: High capacity image steganography using wavelet transform and genetic algorithm. In: Proceedings of the International Multiconference of Engineers and Computer Scientists (2011)

    Google Scholar 

  6. Li, X., Wang, J.: A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf. Sci. 177, 3099–3109 (2007)

    Article  Google Scholar 

  7. Patel, H., Dave, P.: Steganography technique based on DCT coefficients. Int. J. Eng. Res. Appl. 2, 713–717 (2012)

    Google Scholar 

  8. Kumar, V., Kumar, D.: Digital image steganography based on combination of DCT and DWT. In: Das, V.V., Vijaykumar, R. (eds.) ICT 2010. CCIS, vol. 101, pp. 596–601. Springer, Heidelberg (2010). doi:10.1007/978-3-642-15766-0_102

    Chapter  Google Scholar 

  9. Mou, X., Li, S., Chen, G.: On the dynamical degradation of digital piecewise linear chaotic maps. Int. J. Bifurc. Chaos 15, 3119–3151 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  10. Saidi, M., Hermassi, H., Rhouma, R., Belghith, S.: A new adaptive image steganography scheme based on DCT and chaotic map. Multimedia Tools Appl. 76, 1–18 (2016)

    Google Scholar 

  11. Standard test images database. http://www.imageprocessingplace.com/root_files_Vimage_databases.htm

  12. Bas, P., Filler, T., Pevný, T.: “Break Our Steganographic System”: the ins and outs of organizing BOSS. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59–70. Springer, Heidelberg (2011). doi:10.1007/978-3-642-24178-9_5

    Chapter  Google Scholar 

  13. Ker, A.D., Bas, P., Böhme, R., Cogranne, R., Craver, S., Filler, T., Fridrich, J., Pevnỳ, T.: Moving steganography and steganalysis from the laboratory into the real world. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, pp. 45–58 (2013)

    Google Scholar 

  14. Kodovsky, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7, 432–444 (2012)

    Article  Google Scholar 

  15. Liu, Q.: Steganalysis of DCT-embedding based adaptive steganography and yass. In: Proceedings of the Thirteenth ACM Multimedia Workshop on Multimedia and Security, pp. 77–86 (2011)

    Google Scholar 

  16. Holub, V., Fridrich, J.: Low-complexity features for jpeg steganalysis using undecimated DCT. IEEE Trans. Inf. Forensics Secur. 10, 219–228 (2015)

    Article  Google Scholar 

  17. Chen, C., Shi, Y.Q.: JPEG image steganalysis utilizing both intrablock and interblock correlations. In: 2008 IEEE International Symposium on Circuits and Systems, pp. 3029–3032 (2008)

    Google Scholar 

  18. Kodovskỳ, J., Fridrich, J.: Calibration revisited. In: Proceedings of the 11th ACM Workshop on Multimedia and Security, pp. 63–74 (2009)

    Google Scholar 

  19. Tang, M., Hu, J., Song, W., Zeng, S.: Reversible and adaptive image steganographic method. AEU-Int. J. Electron. Commun. 69, 1745–1754 (2015)

    Google Scholar 

  20. Tang, M., Hu, J., Song, W.: A high capacity image steganography using multi-layer embedding. Optik International Journal for Light and Electron Optics 125, 3972–3976 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marwa Saidi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Saidi, M., Hermassi, H., Rhouma, R., Belghith, S. (2017). Uniformly Spread Embedding Based Steganography. In: Jallouli, R., Zaïane, O., Bach Tobji, M., Srarfi Tabbane, R., Nijholt, A. (eds) Digital Economy. Emerging Technologies and Business Innovation. ICDEc 2017. Lecture Notes in Business Information Processing, vol 290. Springer, Cham. https://doi.org/10.1007/978-3-319-62737-3_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-62737-3_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-62736-6

  • Online ISBN: 978-3-319-62737-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics