Advertisement

Two Stage Color Image Steganography Using DCT (TSCIS-DCT)

  • Anirban Goswami
  • Dipankar Pal
  • Nabin Ghoshal
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 199)

Abstract

In frequency domain steganography, use of color images for secret data hiding may prove to be a decisive innovation. The proposed concept uses two color images for hiding a color/gray authenticating message/image. The mathematical technique of Discrete Cosine Transform (DCT) is applied on each block of size 2x2 taken in row major order from three color planes (Red, Green & Blue) sequentially and from two carrier images alternatively. A single secret message/image bit is fabricated within the transformed real frequency component of each source image byte except the first frequency component of each mask. The first frequency component of each block is used for re-adjustment to maintain the quantum value positive, non-fractional in spatial domain and also to reduce the integrated noise due to embedding. The pseudorandom position of embedding and subsequent extraction is generated by a logical expression. Experimental results of this technique reveal more efficiency compared to other similar technique.

Keywords

Image Authentication Digital Watermarking Steganography DCT IDCT MSE PSNR IF SSIM 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S.: Image steganographic scheme based on pisel-value differencing and LSB replacement methods. Proc. Inst. Elect. Eng., Vis. Images Signal Processing 152(5), 611–615 (2005)CrossRefGoogle Scholar
  2. 2.
    EL-Emam, N.N.: Hiding a large Amount of data with High Security Using Steganography Algorithm. Journal of Computer Science 3(4), 223–232 (2007) ISSN 1549-3636Google Scholar
  3. 3.
    Amin, P., Lue, N., Subbalakshmi, K.: Statistically secure digital image data hiding. In: IEEE Multimedia Signal Processing MMSP 2005, Shanghai, China, pp. 1–4 (October 2005)Google Scholar
  4. 4.
    Pavan, S., Gangadharpalli, S., Sridhar, V.: Multivariate entropy detector based hybrid image registration algorithm. In: IEEE Int. Conf. on Acoustics, Speech and Signal Processing, Philadelphia, Pennsylvania, USA, pp. 18–23 (March 2005)Google Scholar
  5. 5.
    Al-Hamami, A.H., Al-Ani, S.A.: A New Approach for Authentication Technique. Journal of Computer Science 1(1), 103–106 (2005) ISSN 1549-3636Google Scholar
  6. 6.
    Ker, A.: Steganalysis of Embedding in Two Least-Significant Bits. IEEE Transaction on Information Forensics and Security 2(1), 46–54 (2008) ISSN 1556-6013CrossRefGoogle Scholar
  7. 7.
    Ahmidi, N., Safabkhsh, R.: A novel DCT-based approach for secure color image watermarking. In: Proc. Int. Conf. Information Technology: Coding and Computing, vol. 2, pp. 709–713 (April 2004)Google Scholar
  8. 8.
    Bas, P., Biham, N.L., Chassery, J.: Color watermarking using quaternion Fourier transformation. In: Proc. ICASSP, Hong Kong, China, pp. 521–524 (June 2003)Google Scholar
  9. 9.
    Tsui, T.T., Zhang, X.–P., Androutsos, D.: Color Image Watermarking Using Multidimensional Fourier Transfomation. IEEE Trans. on Info. Forensics and Security 3(1), 16–28 (2008)CrossRefGoogle Scholar
  10. 10.
    Luo, H., Yu, F.-X., Chen, H., Huang, Z.-L., Li, H., Wang, P.-H.: Reversible data hiding based on block median preservation. Information Sciences 181, 308–328 (2011)CrossRefGoogle Scholar
  11. 11.
    Ghoshal, N., Chowdhury, S., Mandal, J.K.: A Steganographic Scheme for Color Image Authentication using Z-Transform (SSCIAZ). In: Advances in Intelligent Soft Computing, vis INDIA 2012 (2012) ISSN:1867-5662Google Scholar
  12. 12.
    Ghoshal, N., Mandal, J.K.: Discrete Fourier Transform based Multimedia Colour Image Authentication for Wireless Communication (DFTMCIAWC). In: 2nd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace &Electronics Systems Technology, Wireless Vitae 2011, Chennai, India (2011) ISBN: 978-1-4577-0787-2/11Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  1. 1.Dept. of Information TechnologyTechno IndiaKolkataIndia
  2. 2.Dept. of Computer Science and EngineeringTechno IndiaKolkataIndia
  3. 3.Dept. of Engineering and Technological StudiesUniversity of KalyaniKalyaniIndia

Personalised recommendations