Skip to main content

Image Steganography Optimization Technique

  • Conference paper
Signal Processing and Information Technology (SPIT 2011)


This paper presents a novel steganography technique which combines Discrete Cosine Transform (DCT) and Least Significant Bit (LSB). The objective is to maximize the capacity and invisibility of the secret image with minimal modification to the cover image (at most k-bits per block). The secret image is transformed to frequency domain using DCT. An algorithm is employed to construct the optimum quantization to embed the DCT coefficients in k-bits. The k-bits are then hidden in the LSBs of the cover image. The performance (capacity and peak signal-to-noise ratio) of the proposed method is compared with LSB.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others


  1. Morkel, T., Eloff, J., Olivier, M.: An Overview of Image Steganography. In: The Fifth Annual Information Security South Africa Conference (ISSA 2005), Sandton, South Africa (June/July 2005)

    Google Scholar 

  2. Wang, H., Wang, S.: Cyber warfare: Steganography vs. Steganalysis. Communications of the ACM 47(10), 76–82 (2004)

    Article  Google Scholar 

  3. Walia, E., Jain, P., Navdeep: An Analysis of LSB & DCT based Steganography. Global Journal of Computer Science and Technology 10, 4–8 (2010)

    Google Scholar 

  4. Deshpande, N., Sneha, K., Jacobs, D.: Implementation of LSB Steganography and Its Evaluation for various Bits. In: 2006 1st International Conference on Digital Information Management, pp. 173–178 (2007)

    Google Scholar 

  5. Raja, K., Chowdary, C., Venugopal, R., Patnaik, L.: A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images. In: 3rd International Conference on Intelligent Sensing and Information Processing, pp. 170–176 (2005)

    Google Scholar 

  6. Walia, E., Jain, P., Navdeep: An Analysis of LSB & DCT based Stegnography. Global Journal of Computer Science 10, 4–8 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations


Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Mohd, B.J., Abed, S., Al-Naami, B., Alouneh, S. (2012). Image Steganography Optimization Technique. In: Das, V.V., Ariwa, E., Rahayu, S.B. (eds) Signal Processing and Information Technology. SPIT 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 62. Springer, Berlin, Heidelberg.

Download citation

  • DOI:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32572-4

  • Online ISBN: 978-3-642-32573-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics