Information Security Technique in Frequency Domain

There have been many hidden communication techniques proposed in the last few years. The focus of this development was given to steganography to build such techniques. This paper presents a novel technique for Image steganography based on a frequency domain, where DCT is used to transform original image (cover image) blocks from spatial domain to frequency domain, and then Huffman encoding is performed on the secret messages/images before it is embedded in the frequency domain. The number of payload bits L is embedded into the DCT coefficient based on the DCT coefficient value of cover image in order to maximize the hiding capacity. It is observed that the proposed algorithm has better PSNR, Security and capacity compared to the existing algorithm.

[1]  Yun Q. Shi,et al.  2-D Interleaving for Enhancing the Robustness of Watermark Signals Embedded in Still Images , 2000, IEEE International Conference on Multimedia and Expo.

[2]  Daren Huang,et al.  A robust DWT-based blind data hiding algorithm , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[3]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[4]  Chin-Ming Hsu,et al.  A secure data hiding technique with heterogeneous data-combining capability for electronic patient records , 2000, Proceedings of the 22nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (Cat. No.00CH37143).

[5]  Re Gonzalez,et al.  R.C. Eddins, Digital image processing using MATLAB, vol. Gatesmark Publishing Knoxville , 2009 .

[6]  Lisa M. Marvel,et al.  A methodology for data hiding using images , 1998, IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201).

[7]  Yue Li,et al.  Protection of Mammograms Using Blind Steganography and Watermarking , 2007 .

[8]  Junwu Zhu,et al.  Steganography: DCT Coefficients Reparation Technique in JPEG Image , 2008 .

[9]  Yu-Chee Tseng,et al.  A secure data hiding scheme for binary images , 2002, IEEE Trans. Commun..

[10]  Walter Bender,et al.  Applications for data hiding , 2000, IBM Syst. J..

[11]  Zhaohui Wu,et al.  A data hiding method for few-color images , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[12]  H. H. Zayed,et al.  An adaptive steganographic technique based on integer wavelet transform , 2009, 2009 International Conference on Networking and Media Convergence.

[13]  Po-Yueh Chen,et al.  A Modified Side Match Scheme for Image Steganography , 2009 .

[14]  Xingming Sun,et al.  Steganalysis of Syntactic Transformation based Steganography , 2011 .

[15]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[16]  Sushanta Biswas,et al.  A novel technique for image steganography based on Block-DCT and Huffman Encoding , 2010, ArXiv.

[17]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[18]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[19]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[20]  U. C. Niranjan,et al.  Watermarking medical images with patient information , 1998, Proceedings of the 20th Annual International Conference of the IEEE Engineering in Medicine and Biology Society. Vol.20 Biomedical Engineering Towards the Year 2000 and Beyond (Cat. No.98CH36286).