Research Article

An Optimized Trade-off Decomposition Steganography Algorithm

by  Mazhar Tayel, Hamed Shawky
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 86 - Issue 5
Published: January 2014
Authors: Mazhar Tayel, Hamed Shawky
10.5120/14981-3187
PDF

Mazhar Tayel, Hamed Shawky . An Optimized Trade-off Decomposition Steganography Algorithm. International Journal of Computer Applications. 86, 5 (January 2014), 19-23. DOI=10.5120/14981-3187

                        @article{ 10.5120/14981-3187,
                        author  = { Mazhar Tayel,Hamed Shawky },
                        title   = { An Optimized Trade-off Decomposition Steganography Algorithm },
                        journal = { International Journal of Computer Applications },
                        year    = { 2014 },
                        volume  = { 86 },
                        number  = { 5 },
                        pages   = { 19-23 },
                        doi     = { 10.5120/14981-3187 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2014
                        %A Mazhar Tayel
                        %A Hamed Shawky
                        %T An Optimized Trade-off Decomposition Steganography Algorithm%T 
                        %J International Journal of Computer Applications
                        %V 86
                        %N 5
                        %P 19-23
                        %R 10.5120/14981-3187
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper a modified Steganography algorithm is proposed. A fuzzification is performed in the message channel to compress the decomposed coefficients before embedding in the cover-image to get a new Stego-image. A relative embedding strength factor (ESF) is used for embedding the secret in the cover-image. The well known metrics (MSE, PSNR, Cor. and Entropy) were used to evaluate quality of the modified algorithm. Also, the trade-off factor was introduced to determine an optimum value for the ESF to get an acceptable degradation in the Stego-image. In addition, the reconstruction algorithm mentioned in previous paper was modified using the optimum value of the ESF. Comparisons show improved results w. r. t. other algorithms.

References
  • Nuno Roma, Leonel Sousa "A tutorial overview on the properties of the discrete cosine transform for encoded image and video processing" Rua Alves Redol, Lisboa – Portugal, February 2011.
  • Ekta Walia, Payal Jain, Navdeep "An Analysis of LSB & DCT based Steganography " Global Journal of Computer Science and Technology, April 2010.
  • Abbas Cheddad , Joan Condell, Kevin Curran, Paul Mc Kevitt" Digital image steganography: Survey and analysis of current methods " www. elsevier. com/locate/sigpro Signal Processing 2010.
  • Hardik Patel, Preeti Dave " Steganography Technique Based on DCT Coefficients" International Journal of Engineering Research and Applications, Jan-Feb 2012.
  • Hossein Malekmohamadi and Shahrokh Ghaemmaghami" stegoanalsis of lsb based image Steganography using spatial and frequency domain features" IEEE 2009.
  • A. Nag, S. Biswas, D. Sarkar, P. P. Sarkar "A novel technique for image steganography based on Block-DCT and Huffman Encoding", International Journal of Computer Science and Information Technology, June 2010.
  • Matus Jokay — Tomas Moravc?k " Image-Based JPEG Steganography", Tatra Mt. Math. Publ. 2010.
  • Orea flores, M. A. acivedo "wavelet and discreet transforms for insetting information into BMB image ", July 2006.
  • Mazhar Tayel, Alaa Hafez, Hamed Shawky "A New Hybrid Fuzzy-Decomposed Full Capacity Stego-System " under publication in IEEE Aerospace Conference 2014.
  • George Corser," Entropy as an Estimate of Image Steganography" Oakland University Rochester, USA 2013, gpcorser@oakland. edu.
  • Nedal M. S. Kafri and Hani Y. Suleiman "Bit-4 of Frequency Domain-DCT Steganography Technique" IEEE, 2009.
  • Deepak Singla1, Rupali Syal "Data Security Using LSB & DCT Steganography in Images ", International Journal of Computational Engineering Research/ IJCER , Mar-Apr 2012.
  • Blossom Kaur, Amandeep Kaur, Jasdeep Singh" steganographic approach for hiding image in DCT domain" IJAET, July 2011.
  • Mazhar Tayel, Hamed Shawky, Alaa El-Din Sayed Hafez "New Chaos Steganography algorithm for Hiding Multimedia Data" advanced communication technology (ICACT), 2012.
  • Mazhar Tayel, Alaa Hafez, Hamed Shawky," A Hybrid Chaos- Fuzzy –Threshold Steganography Algorithm for Hiding Secure Data" ICACT Transactions on Advanced Communications Technology (TACT), Jan. 2013.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Steganography Cover-image Secret-message Decomposition Fuzzy set

Powered by PhDFocusTM