Compression Technique Using DCT & Fractal Compression: A Survey

Steganography differs from digital watermarking because both the information and the very existence of the information are hidden. In the beginning, the fractal image compression method is used to compress the secret image, and then we encrypt this compressed data by DES.The Existing Steganographic approaches are unable to handle the Subterfuge attack i.e, they cannot deal with the opponents not only detects a message ,but also render it useless, or even worse, modify it to opponent favor. The advantage of BCBS is the decoding can be operated without access to the cover image and it also detects if the message has been tampered without using any extra error correction. To improve the imperceptibility of the BCBS, DCT is used in combination to transfer stego-image from spatial domain to the frequency domain. The hiding capacity of the information is improved by introducing Fractal Compression and the security is enhanced using by encrypting stego-image using DES.  Copyright © www.iiste.org Keywords : Steganography, data hiding, fractal image compression, DCT.

[1]  김인택 [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .

[2]  Chin-Chen Chang,et al.  A DCT-domain system for hiding fractal compressed images , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[3]  K. Munivara Prasad,et al.  High Secure Image Steganography in BCBS Using DCT and Fractal Compression , 2010 .

[4]  André Kaup,et al.  Steganographic system based on higher-order statistics , 2003, IS&T/SPIE Electronic Imaging.

[5]  K.B. Raja,et al.  A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.

[6]  Y. Fisher Fractal image compression: theory and application , 1995 .

[7]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[8]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[9]  Chaur-Chin Chen On the selection of image compression algorithms , 1998, Proceedings. Fourteenth International Conference on Pattern Recognition (Cat. No.98EX170).

[10]  Wesley E. Snyder,et al.  Blind consistency-based steganography for information hiding in digital media , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.

[11]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[12]  Sachin Dhawan,et al.  A Review of Image Compression and Comparison of its Algorithms , 2011 .

[13]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[14]  Anil K. Jain,et al.  Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[15]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998 .

[16]  Jiri Fridrich,et al.  Applications of data hiding in digital images , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).

[17]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[18]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..