An Analysis of LSB & DCT based Steganography

This paper presents analysis of Least Significant Bit (LSB) based Steganography and Discrete Cosine Transform (DCT) based Steganography. LSB based Steganography embed the text message in least significant bits of digital picture. Least significant bit (LSB) insertion is a common, simple approach to embedding information in a cover file. Unfortunately, it is vulnerable to even a small image manipulation. Converting an image from a format like GIF or BMP, which reconstructs the original message exactly (lossless compression) to a JPEG, which does not (lossy compression), and then back could destroy the information hidden in the LSBs. DCT based Steganography embed the text message in least significant bits of the Discrete Cosine (DC) coefficient of digital picture. When information is hidden inside video, the program hiding the information usually performs the DCT. DCT works by slightly changing each of the images in the video, only to the extent that is not noticeable by the human eye. An implementation of both these methods and their performance analysis has been done in this paper.

[1]  Daisy Jacobs,et al.  Implementation of LSB Steganography and Its Evaluation for Various Bits , 2007, 2006 1st International Conference on Digital Information Management.

[2]  Chin-Chen Chang,et al.  A method of extracting embedded binary data from JPEG bitstreams using standard JPEG decoder , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[3]  Timothy K. Shih,et al.  A Lossy Compression Tolerant Data Hiding Method Based on JPEG and VQ , 2004 .

[4]  Hideki Noda,et al.  Performance Improvement of JPEG2000 Steganography Using QIM , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[5]  Marc Chaumont,et al.  A DCT-based data-hiding method to embed the color information in a JPEG grey level image , 2006, 2006 14th European Signal Processing Conference.

[6]  Kazuhiko Yamaguchi,et al.  Integrity Verification of Secret Information in Image Steganography , 2006 .

[7]  Andrew B. Watson,et al.  Image Compression Using the Discrete Cosine Transform , 1994 .

[8]  A. Jain,et al.  A JPEG compression resistant steganography scheme for raster graphics images , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.