Research Article

An Improved DCT based Steganography Technique

by  Deepika Bansal, Rita Chhikara
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 102 - Issue 14
Published: September 2014
Authors: Deepika Bansal, Rita Chhikara
10.5120/17887-8861
PDF

Deepika Bansal, Rita Chhikara . An Improved DCT based Steganography Technique. International Journal of Computer Applications. 102, 14 (September 2014), 46-49. DOI=10.5120/17887-8861

                        @article{ 10.5120/17887-8861,
                        author  = { Deepika Bansal,Rita Chhikara },
                        title   = { An Improved DCT based Steganography Technique },
                        journal = { International Journal of Computer Applications },
                        year    = { 2014 },
                        volume  = { 102 },
                        number  = { 14 },
                        pages   = { 46-49 },
                        doi     = { 10.5120/17887-8861 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2014
                        %A Deepika Bansal
                        %A Rita Chhikara
                        %T An Improved DCT based Steganography Technique%T 
                        %J International Journal of Computer Applications
                        %V 102
                        %N 14
                        %P 46-49
                        %R 10.5120/17887-8861
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, a steganographic technique for hiding secret data in image file formats is proposed. This technique uses the Quantized DCT coefficients for hiding the secret information. The proposed steganographic method can provide a high information hiding capacity and successfully increase the security.

References
  • N. F. Johnson, S. Jajodia, Exploring Steganography: Seeing the Unseen IEEE Computer 31(2) (1998)26-34.
  • Kh. Manglem Singh, S. Birendra Sigh and L. Shyam Sundar Singh, Hiding Encrypted Message in the Features of Images, IJCSNS, Vol. 7 No. 4, April 2007, pp 302-307.
  • W. -N. Lie and L. -C. Chang, Data hiding in images with adaptive numbers of least significant bits based on human visual system, in Proc. ,IEEE Int. Conf. Image Processing, 1999, Page(s): 286–290.
  • S. Katzenbeisser and F. A. P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking. Norwood, MA: Artech House, 2000.
  • D. R. Denslin Brabin, Dr. V. Sadasivam, QET Based Steganography Technique for JPEG Images.
  • Stuti Goel, Arun Rana & Manpreet Kaur, "A Review of Comparison Techniques of Image Steganography", Global Journal of Computer Science and Technology Volume XIII Issue IV Version I, 2013, pp. 8-14.
  • K. B. Raja, C. R. Chowdary, Venugopal K R, L. M. Patnaik, "A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images".
  • Wei Zheng, Yanchang Liu, "Research in a Fast DCT Algorithm Based on JPEG", IEEE, 2011, pp. 551-553.
  • Xianhua Song, Shen Wang, Xiamu Niu, "An Integer DCT and Affine Transformation Based Image Steganography Method", Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012, pp. 102-105.
  • Anirban Goswami, Dipankar Pal, Nabin Ghoshal, "Authentication Technique for Gray Images Using DCT (ATGIDCT)", 2012 Third International Conference on Emerging Applications of Information Technology (EAIT), pp. 421-424.
  • Image Source: www. 1000pictures. com
  • LibSVM ToolBox Available: http://www. csie. ntu. edu. tw/~cjlin/libsvm/
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Steganography Least Significant Bit Insertion Discrete Cosine Transform Steganography Algorithms

Powered by PhDFocusTM