BIT LENGTH REPLACEMENT STEGANOGRAPHY BASED ON DCT COEFFICIENTS

Steganography is a means of establishing secret communication through public channel in an artistic manner. In this paper, we propose Bit Length Replacement Steganography Based on DCT Coefficients (BLSDCT) . The cover image is segmented into 8*8 blocks and DCT is applied on each block. The numbers of payload MSB bits are embedded into DCT coefficients of the cover image based on the values of DCT coefficients. It is observed that the proposed algorithm has better PSNR, Security and capacity compared to the existing algorithm.

[1]  Dusan Levicky,et al.  Steganography systems by using CDMA techniques , 2009, 2009 19th International Conference Radioelektronika.

[2]  Mahdi Ramezani,et al.  Adaptive Image Steganography with Mod-4 Embedding Using Image Contrast , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.

[3]  Yixian Yang,et al.  Analysis of Current Steganography Tools: Classifications & Features , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[4]  Kevin Curran,et al.  Enhancing Steganography in Digital Images , 2008, 2008 Canadian Conference on Computer and Robot Vision.

[5]  Tung-Shou Chen,et al.  Lossless Steganography for AMBTC-Compressed Images , 2008, 2008 Congress on Image and Signal Processing.

[6]  Mee Young Sung,et al.  Steganography using block-based adaptive threshold , 2007, 2007 22nd international symposium on computer and information sciences.

[7]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[8]  Min-Shiang Hwang,et al.  Data Hiding: Current Status and Key Issues , 2007, Int. J. Netw. Secur..

[9]  Hongmei Tang,et al.  A New Image Encryption and Steganography Scheme , 2009, 2009 International Conference on Computer and Communications Security.

[10]  B. B. Zaidan,et al.  Approved Undetectable-Antivirus Steganography for Multimedia Information in PE-File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.

[11]  Saleh Zein-Sabatto,et al.  Learning to grasp in unknown environment by reinforcement learning and shaping , 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics.

[12]  Daniela Stanescu,et al.  Steganography on embedded devices , 2009, 2009 5th International Symposium on Applied Computational Intelligence and Informatics.

[13]  V. Vijayalakshmi,et al.  A modulo based LSB steganography method , 2009, 2009 International Conference on Control, Automation, Communication and Energy Conservation.

[14]  A. Touir,et al.  A New Image Steganography Technique , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[15]  Josef Pieprzyk,et al.  Estimating Hidden Message Length in Binary Image Embedded by Using Boundary Pixels Steganography , 2010, 2010 International Conference on Availability, Reliability and Security.

[16]  A. A. Zaidan,et al.  "Stego-Analysis Chain, Session One" Investigations on Steganography Weakness vs Stego-Analysis System for Multimedia File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.

[17]  Mohammad Hassan Shirali-Shahreza,et al.  A New Synonym Text Steganography , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[18]  Xijian Ping,et al.  Estimation of MB steganography based on least square method , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[19]  Po-Yueh Chen,et al.  A DWT Based Approach for Image Steganography , 2006 .

[20]  Sos S. Agaian,et al.  Generalized collage steganography on images , 2008, 2008 IEEE International Conference on Systems, Man and Cybernetics.

[21]  Marios Savvides,et al.  Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching , 2009, 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[22]  Long-Wen Chang,et al.  Adaptive Data Hiding for Images Based on Harr Discrete Wavelet Transform , 2006, PSIVT.

[23]  K.B. Raja,et al.  A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.

[24]  Vijay Kumar,et al.  Performance evaluation of DWT based image steganography , 2010, 2010 IEEE 2nd International Advance Computing Conference (IACC).

[25]  H. H. Zayed,et al.  An adaptive steganographic technique based on integer wavelet transform , 2009, 2009 International Conference on Networking and Media Convergence.

[26]  D. Lakshmi Narayana,et al.  High Capacity Image Steganography in Wavelet Domain , 2022 .