A Frequency Domain Steganography using Z Transform (FDSZT)

Image steganography is art of hiding information onto the cover image. In this proposal a transformed domain based gray scale image authentication/data hiding technique using Z transform (ZT) termed as FDSZT, has been proposed. ZTransform is applied on 2x2 masks of the source image in row major order to transform original sub image (cover image) block to its corresponding frequency domain. One bit of the hidden image is embedded in each mask of the source image onto the fourth LSB of transformed coefficient based on median value of the mask. A delicate handle has also been performed as post embedding operation for proper decoding. Stego sub image is obtained through a reverse transform as final step of embedding in a mask. During the process of embedding, dimension of the hidden image followed by the content of the message/hidden image are embedded. Reverse process is followed during decoding. High PSNR obtained for various images conform the quality of invisible watermark of FDSZT.

[1]  Nabin Ghoshal,et al.  Image Authentication by Hiding Large Volume of Data and Secure Message Transmission Technique using Mask (IAHLVDSMTTM) , 2009, 2009 IEEE International Advance Computing Conference.

[2]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[3]  Nasir D. Memon,et al.  Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[4]  A.I. Hashad,et al.  A robust steganography technique using discrete cosine transform insertion , 2005, 2005 International Conference on Information and Communication Technology.

[5]  Nameer N. El-Emam Hiding a Large Amount of Data with High Security Using Steganography Algorithm , 2007 .

[6]  J. K. Mandal,et al.  A Novel Technique for Image Authentication in Frequency Domain Using Discrete Fourier Transformation Technique (IAFDDFTT) , 2008 .

[7]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[8]  J.K. Mandal,et al.  Masking based Data Hiding and Image Authentication Technique (MDHIAT) , 2008, 2008 16th International Conference on Advanced Computing and Communications.

[9]  Yao Zhao,et al.  Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm , 2010, EURASIP J. Adv. Signal Process..

[10]  Chien-Chang Chen,et al.  Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.

[11]  Vincent Rijmen,et al.  The NIST Cryptographic Workshop on Hash Functions , 2006, IEEE Secur. Priv..

[12]  V. Sridhar,et al.  Multivariate entropy detector based hybrid image registration , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[13]  Sorina Dumitrescu,et al.  Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..