A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images

Steganography is an important area of research in recent years involving a number of applications. It is the science of embedding information into the cover image viz., text, video, and image (payload) without causing statistically significant modification to the cover image. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected. In this paper we present an image based steganography that combines Least Significant Bit(LSB), Discrete Cosine Transform(DCT), and compression techniques on raw images to enhance the security of the payload. Initially, the LSB algorithm is used to embed the payload bits into the cover image to derive the stego-image. The stego-image is transformed from spatial domain to the frequency domain using DCT. Finally quantization and runlength coding algorithms are used for compressing the stego-image to enhance its security. It is observed that secure images with low MSE and BER are transferred without using any password, in comparison with earlier works.

[1]  Bernd Girod,et al.  Communications approach to image steganography , 2002, IS&T/SPIE Electronic Imaging.

[2]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[3]  Nicholas Hopper,et al.  Public-Key Steganography , 2003, EUROCRYPT.

[4]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[5]  Lisa M. Marvel,et al.  Reliable Blind Information Hiding for Images , 1998, Information Hiding.

[6]  O. F. Cook The Method of Types , 1898 .

[7]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[8]  Miroslav Goljan,et al.  Steganalysis based on JPEG compatibility , 2001, SPIE ITCom.

[9]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[10]  Tuomas Aura,et al.  Practical Invisibility in Digital Communication , 1996, Information Hiding.

[11]  Imre Csisźar,et al.  The Method of Types , 1998, IEEE Trans. Inf. Theory.

[12]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..