Abstract
This paper presents a novel steganography technique which combines Discrete Cosine Transform (DCT) and Least Significant Bit (LSB). The objective is to maximize the capacity and invisibility of the secret image with minimal modification to the cover image (at most k-bits per block). The secret image is transformed to frequency domain using DCT. An algorithm is employed to construct the optimum quantization to embed the DCT coefficients in k-bits. The k-bits are then hidden in the LSBs of the cover image. The performance (capacity and peak signal-to-noise ratio) of the proposed method is compared with LSB.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Morkel, T., Eloff, J., Olivier, M.: An Overview of Image Steganography. In: The Fifth Annual Information Security South Africa Conference (ISSA 2005), Sandton, South Africa (June/July 2005)
Wang, H., Wang, S.: Cyber warfare: Steganography vs. Steganalysis. Communications of the ACM 47(10), 76–82 (2004)
Walia, E., Jain, P., Navdeep: An Analysis of LSB & DCT based Steganography. Global Journal of Computer Science and Technology 10, 4–8 (2010)
Deshpande, N., Sneha, K., Jacobs, D.: Implementation of LSB Steganography and Its Evaluation for various Bits. In: 2006 1st International Conference on Digital Information Management, pp. 173–178 (2007)
Raja, K., Chowdary, C., Venugopal, R., Patnaik, L.: A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images. In: 3rd International Conference on Intelligent Sensing and Information Processing, pp. 170–176 (2005)
Walia, E., Jain, P., Navdeep: An Analysis of LSB & DCT based Stegnography. Global Journal of Computer Science 10, 4–8 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Mohd, B.J., Abed, S., Al-Naami, B., Alouneh, S. (2012). Image Steganography Optimization Technique. In: Das, V.V., Ariwa, E., Rahayu, S.B. (eds) Signal Processing and Information Technology. SPIT 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 62. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32573-1_35
Download citation
DOI: https://doi.org/10.1007/978-3-642-32573-1_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32572-4
Online ISBN: 978-3-642-32573-1
eBook Packages: Computer ScienceComputer Science (R0)