Abstract
In this paper, we propose a higher capacity steganographic approach basing on a novel mapping method. We exploit the strong energy compaction property in the Discrete Cosine Transform (DCT) to ensure a maximum embedding capacity resulting minimum embedding artifact. The approach combines the compaction efficiency with a randomized embedding behavior generated by a chaotic function PieceWise Linear Chaotic Map. The scrambled embedding positions ensures the security aspect. The mapping applied over bits enlarges the capacity of our approach by embedding symbols within DCT coefficients instead of bits.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Yang, H., Sun, X., Sun, G.: A high-capacity image data hiding scheme using adaptive LSB substitution (2009)
Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Lossless generalized-LSB data embedding. IEEE Trans. Image Process. 14, 253–266 (2006)
Wang, Z.-H., Chang, C.-C., Li, M.-C.: Optimizing least-significant-bit substitution using cat swarm optimization strategy. Inf. Sci. 192, 98–108 (2012)
Baby, D., Thomas, J., Augustine, G., George, E., Michael, N.R.: A novel DWT based image securing method using steganography. Procedia Comput. Sci. 46, 612–618 (2015)
Ghasemi, E., Shanbehzadeh, J., Fassihi, N.: High capacity image steganography using wavelet transform and genetic algorithm. In: Proceedings of the International Multiconference of Engineers and Computer Scientists (2011)
Li, X., Wang, J.: A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf. Sci. 177, 3099–3109 (2007)
Patel, H., Dave, P.: Steganography technique based on DCT coefficients. Int. J. Eng. Res. Appl. 2, 713–717 (2012)
Kumar, V., Kumar, D.: Digital image steganography based on combination of DCT and DWT. In: Das, V.V., Vijaykumar, R. (eds.) ICT 2010. CCIS, vol. 101, pp. 596–601. Springer, Heidelberg (2010). doi:10.1007/978-3-642-15766-0_102
Mou, X., Li, S., Chen, G.: On the dynamical degradation of digital piecewise linear chaotic maps. Int. J. Bifurc. Chaos 15, 3119–3151 (2005)
Saidi, M., Hermassi, H., Rhouma, R., Belghith, S.: A new adaptive image steganography scheme based on DCT and chaotic map. Multimedia Tools Appl. 76, 1–18 (2016)
Standard test images database. http://www.imageprocessingplace.com/root_files_Vimage_databases.htm
Bas, P., Filler, T., Pevný, T.: “Break Our Steganographic System”: the ins and outs of organizing BOSS. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59–70. Springer, Heidelberg (2011). doi:10.1007/978-3-642-24178-9_5
Ker, A.D., Bas, P., Böhme, R., Cogranne, R., Craver, S., Filler, T., Fridrich, J., Pevnỳ, T.: Moving steganography and steganalysis from the laboratory into the real world. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, pp. 45–58 (2013)
Kodovsky, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7, 432–444 (2012)
Liu, Q.: Steganalysis of DCT-embedding based adaptive steganography and yass. In: Proceedings of the Thirteenth ACM Multimedia Workshop on Multimedia and Security, pp. 77–86 (2011)
Holub, V., Fridrich, J.: Low-complexity features for jpeg steganalysis using undecimated DCT. IEEE Trans. Inf. Forensics Secur. 10, 219–228 (2015)
Chen, C., Shi, Y.Q.: JPEG image steganalysis utilizing both intrablock and interblock correlations. In: 2008 IEEE International Symposium on Circuits and Systems, pp. 3029–3032 (2008)
Kodovskỳ, J., Fridrich, J.: Calibration revisited. In: Proceedings of the 11th ACM Workshop on Multimedia and Security, pp. 63–74 (2009)
Tang, M., Hu, J., Song, W., Zeng, S.: Reversible and adaptive image steganographic method. AEU-Int. J. Electron. Commun. 69, 1745–1754 (2015)
Tang, M., Hu, J., Song, W.: A high capacity image steganography using multi-layer embedding. Optik International Journal for Light and Electron Optics 125, 3972–3976 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Saidi, M., Hermassi, H., Rhouma, R., Belghith, S. (2017). Uniformly Spread Embedding Based Steganography. In: Jallouli, R., Zaïane, O., Bach Tobji, M., Srarfi Tabbane, R., Nijholt, A. (eds) Digital Economy. Emerging Technologies and Business Innovation. ICDEc 2017. Lecture Notes in Business Information Processing, vol 290. Springer, Cham. https://doi.org/10.1007/978-3-319-62737-3_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-62737-3_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-62736-6
Online ISBN: 978-3-319-62737-3
eBook Packages: Computer ScienceComputer Science (R0)