Skip to main content

Covariance Based Steganography Using DCT

  • Conference paper
Advances in Computing and Communications (ACC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 191))

Included in the following conference series:

Abstract

The confidential information is communicated through the open channel in a covert way by using steganography. In this paper we propose the Covariance based Steganography using Discrete Cosine Transform (CSDCT) algorithm. The Average Covariance of the Cover Image (ACCI) is computed and threshold ACCI value is fixed at 0.15. The cover image is segmented into 8*8 cells and the Least Significant Bit (LSBs) are replaced by Most Significant Bits (MSBs) of payload based on ACCI values. It is observed that the capacity, Peak Signal to Noise Ratio (PSNR) and security is better compared to the existing algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sarreshtedari, S., Ghotbi, M., Ghaemmaghami, S.: On the Effect of Spatial to Compressed Domains Transformation in LSB based Image Steganography. In: International Conference on Computer Systems and Applications, pp. 260–264 (2009)

    Google Scholar 

  2. Chen, P.-Y., Lin, H.-J.: A DWT Based Approach for Image steganography. International Journal of Applied Science and Engineering, 275–290 (December 2006)

    Google Scholar 

  3. Luo, W., Huang, F., Huang, J.: Edge Adaptive Image Steganography Based on LSB Matching Revisited. IEEE Transactions on Information Forensics and Security 5(2), 173–178 (2010)

    MathSciNet  Google Scholar 

  4. Chhajed, G.J., Shinde, S.A.: Efficient Embedding in B&W Picture Images. In: Second IEEE International Conference Information Management and Engineering, pp. 525–528 (2010)

    Google Scholar 

  5. Yang, C.-H., Weng, C.-Y., Wang, S.-J., Sun, H.-M.: Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems. IEEE Transactions on Information Forensics and Security 3, 488–497 (2008)

    Article  Google Scholar 

  6. Kumar, V., Kumar, D.: Performance Evaluation of DWT based Image Steganography. In: IEEE Second International Conference on Advance Computing, pp. 223–228 (2010)

    Google Scholar 

  7. Aos, A.Z., Nazi, A.W., Hameed, S.A., Othman, F., Zaidan, B.B.: Approved Undetectable-Antivirus Steganography. In: International Conference on Computer and Information Technology, pp. 437–441 (2009)

    Google Scholar 

  8. Wu, N.-I., Hwang, M.-S.: Data Hiding: Current Status and Key Issues. International Journal of Network Security 4(1), 1–9 (2007)

    Google Scholar 

  9. Lai, B.-L., Chang, L.-W.: Adaptive Data Hiding for Images Based on Harr Discrete Wavelet Transform. In: Chang, L.-W., Lie, W.-N. (eds.) PSIVT 2006. LNCS, vol. 4319, pp. 1085–1093. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  10. Raja, K.B., Vikas, Venugopal, K.R., Patnaik, L.M.: High Capacity Lossless Secure Image Steganography using Wavelets. In: International Conference on Advances Computing and Communications, pp. 230–235 (2006)

    Google Scholar 

  11. H.-l. Zhang, G.-Z., Geng, C.-Q., Xiong, C.-Q.: Image Steganography using Pixel Value Differencing. In: Second International Symposium on Electronic Commerce and Security, pp. 109–112 (2009)

    Google Scholar 

  12. Francia III, G.A., Yang, M., Trifas, M.: Applied Image Processing to Multimedia Information Security. In: International Conference on Image Analysis and Signal Processing, pp. 104–107 (2009)

    Google Scholar 

  13. Hossain, M., Haque, S.A., Sharmin, F.: Variable Rate Steganography in Gray Scale Digital Images using Neighborhood Pixel Information. In: International Conference on Computer and Information Technology, pp. 21–23 (2009)

    Google Scholar 

  14. Zaker, N., Hamzeh, A., Katebi, S.D., Samavi, S.: Improving Security of Pixel Value Differencing Steganographic Method. In: Third International Conference on New Technologies, Mobility and Security, pp. 1–4 (2009)

    Google Scholar 

  15. Yao, X., Du, W., Wu, W., Huang, M., Fu, J.: A Robust EMD-like Stegnographic Scheme. In: Third International Symposium on Intelligent Information Technology and Security Informatics, pp. 134–137 (2010)

    Google Scholar 

  16. Bhattacharyya, S., Kshitij, A.P., Sanyal, G.: A Novel Approach to Develop a Secure Image based Steganographic Model using Integer Wavelet Transform. In: International Conference on Recent Trends in Information, Telecommunication and Computing, pp. 173–178 (2010)

    Google Scholar 

  17. Shejul, A.A., Kulkarni, U.L.: A DWT Based Approach for Steganography using Biometrics. In: International Conference on Data Storage and Data Engineering, pp. 39–43 (2010)

    Google Scholar 

  18. Juneja, M., Sindhu, P.S.: Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption. In: International Conference on Advances in Recent Technologies in Communication and Computing, pp. 302–305 (2009)

    Google Scholar 

  19. Bhattacharyya, D., Dutta, J., Das, P., Bandyopadhyay, R., Bandyopadhyay, S.K.: Discrete Fourier Transformation based Image Authentication Technique. In: Eighth IEEE International Conference on Cognitive Informatics, pp. 196–200 (2009)

    Google Scholar 

  20. Velasco, C., Nano, M., Perez, H., Martinez, R., Yamaguchik.: Adaptive JPEG Steganography using Convolutional Codes and Synchronization Bits in DCT Domain. In: Fifty Second IEEE International Midwest Symposium on Circuits and Systems, pp. 842–847 (2010)

    Google Scholar 

  21. El Safy, R.O., Zayed, H.H., El Dessouki, A.: An Adaptive Steganographic Technique Based on Integer Wavelet Transform. In: IEEE Proceedings on International Conference on Networks and Media, pp. 111–117 (March 2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sathisha, N., Babu, K.S., Raja, K.B., Venugopal, K.R., Patnaik, L.M. (2011). Covariance Based Steganography Using DCT. In: Abraham, A., Lloret Mauri, J., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 191. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22714-1_66

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22714-1_66

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22713-4

  • Online ISBN: 978-3-642-22714-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics