Abstract
The confidential information is communicated through the open channel in a covert way by using steganography. In this paper we propose the Covariance based Steganography using Discrete Cosine Transform (CSDCT) algorithm. The Average Covariance of the Cover Image (ACCI) is computed and threshold ACCI value is fixed at 0.15. The cover image is segmented into 8*8 cells and the Least Significant Bit (LSBs) are replaced by Most Significant Bits (MSBs) of payload based on ACCI values. It is observed that the capacity, Peak Signal to Noise Ratio (PSNR) and security is better compared to the existing algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Sarreshtedari, S., Ghotbi, M., Ghaemmaghami, S.: On the Effect of Spatial to Compressed Domains Transformation in LSB based Image Steganography. In: International Conference on Computer Systems and Applications, pp. 260–264 (2009)
Chen, P.-Y., Lin, H.-J.: A DWT Based Approach for Image steganography. International Journal of Applied Science and Engineering, 275–290 (December 2006)
Luo, W., Huang, F., Huang, J.: Edge Adaptive Image Steganography Based on LSB Matching Revisited. IEEE Transactions on Information Forensics and Security 5(2), 173–178 (2010)
Chhajed, G.J., Shinde, S.A.: Efficient Embedding in B&W Picture Images. In: Second IEEE International Conference Information Management and Engineering, pp. 525–528 (2010)
Yang, C.-H., Weng, C.-Y., Wang, S.-J., Sun, H.-M.: Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems. IEEE Transactions on Information Forensics and Security 3, 488–497 (2008)
Kumar, V., Kumar, D.: Performance Evaluation of DWT based Image Steganography. In: IEEE Second International Conference on Advance Computing, pp. 223–228 (2010)
Aos, A.Z., Nazi, A.W., Hameed, S.A., Othman, F., Zaidan, B.B.: Approved Undetectable-Antivirus Steganography. In: International Conference on Computer and Information Technology, pp. 437–441 (2009)
Wu, N.-I., Hwang, M.-S.: Data Hiding: Current Status and Key Issues. International Journal of Network Security 4(1), 1–9 (2007)
Lai, B.-L., Chang, L.-W.: Adaptive Data Hiding for Images Based on Harr Discrete Wavelet Transform. In: Chang, L.-W., Lie, W.-N. (eds.) PSIVT 2006. LNCS, vol. 4319, pp. 1085–1093. Springer, Heidelberg (2006)
Raja, K.B., Vikas, Venugopal, K.R., Patnaik, L.M.: High Capacity Lossless Secure Image Steganography using Wavelets. In: International Conference on Advances Computing and Communications, pp. 230–235 (2006)
H.-l. Zhang, G.-Z., Geng, C.-Q., Xiong, C.-Q.: Image Steganography using Pixel Value Differencing. In: Second International Symposium on Electronic Commerce and Security, pp. 109–112 (2009)
Francia III, G.A., Yang, M., Trifas, M.: Applied Image Processing to Multimedia Information Security. In: International Conference on Image Analysis and Signal Processing, pp. 104–107 (2009)
Hossain, M., Haque, S.A., Sharmin, F.: Variable Rate Steganography in Gray Scale Digital Images using Neighborhood Pixel Information. In: International Conference on Computer and Information Technology, pp. 21–23 (2009)
Zaker, N., Hamzeh, A., Katebi, S.D., Samavi, S.: Improving Security of Pixel Value Differencing Steganographic Method. In: Third International Conference on New Technologies, Mobility and Security, pp. 1–4 (2009)
Yao, X., Du, W., Wu, W., Huang, M., Fu, J.: A Robust EMD-like Stegnographic Scheme. In: Third International Symposium on Intelligent Information Technology and Security Informatics, pp. 134–137 (2010)
Bhattacharyya, S., Kshitij, A.P., Sanyal, G.: A Novel Approach to Develop a Secure Image based Steganographic Model using Integer Wavelet Transform. In: International Conference on Recent Trends in Information, Telecommunication and Computing, pp. 173–178 (2010)
Shejul, A.A., Kulkarni, U.L.: A DWT Based Approach for Steganography using Biometrics. In: International Conference on Data Storage and Data Engineering, pp. 39–43 (2010)
Juneja, M., Sindhu, P.S.: Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption. In: International Conference on Advances in Recent Technologies in Communication and Computing, pp. 302–305 (2009)
Bhattacharyya, D., Dutta, J., Das, P., Bandyopadhyay, R., Bandyopadhyay, S.K.: Discrete Fourier Transformation based Image Authentication Technique. In: Eighth IEEE International Conference on Cognitive Informatics, pp. 196–200 (2009)
Velasco, C., Nano, M., Perez, H., Martinez, R., Yamaguchik.: Adaptive JPEG Steganography using Convolutional Codes and Synchronization Bits in DCT Domain. In: Fifty Second IEEE International Midwest Symposium on Circuits and Systems, pp. 842–847 (2010)
El Safy, R.O., Zayed, H.H., El Dessouki, A.: An Adaptive Steganographic Technique Based on Integer Wavelet Transform. In: IEEE Proceedings on International Conference on Networks and Media, pp. 111–117 (March 2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sathisha, N., Babu, K.S., Raja, K.B., Venugopal, K.R., Patnaik, L.M. (2011). Covariance Based Steganography Using DCT. In: Abraham, A., Lloret Mauri, J., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 191. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22714-1_66
Download citation
DOI: https://doi.org/10.1007/978-3-642-22714-1_66
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22713-4
Online ISBN: 978-3-642-22714-1
eBook Packages: Computer ScienceComputer Science (R0)