Skip to main content

A Novel Steganographic Scheme Using Weighted Matrix in Transform Domain

  • Conference paper
  • First Online:
Mathematics and Computing (ICMC 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 834))

Included in the following conference series:

Abstract

In this paper a weighted matrix based steganographic scheme has been developed based on Discrete Cosine Transform (DCT). First, \((8 \times 8)\) quantized DCT coefficient blocks are obtained from the cover image. Instead of hiding the data directory to the quantized DCT coefficient blocks, a different approach has been taken here. The AC coefficients, except 0 coefficients, are used to form a series of \(3 \times 3\) temporary matrices. Then, each four bits secret data is converted into an integer value. An user defined weighted matrix is used to select the position in the temporary matrix where the data will be embedded. The integer value is then embedded into that particular position of the selected temporary matrix. The proposed method is tested using different steganographic attacks like RS analysis and NCC to show that the scheme is undetectable under these analysis and more robust that other schemes. This scheme provides good embedding capacity with high visual quality of stego images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chang, C.C., Lin, C.C., Tseng, C.S., Tai, W.L.: Reversible hiding in DCT-based compressed images. Inf. Sci. 177, 2768–2786 (2007)

    Article  Google Scholar 

  2. Lin, C.C., Shiu, P.F.: High capacity data hiding scheme for DCT-based images. J. Inf. Hiding Multimed. Signal Process. 1(3), 220–240 (2010)

    Google Scholar 

  3. Lutovac, B., et al.: An algorithm for robust image watermarking based on the DCT and Zernike moments. Multimed. Tools Appl. 76(22), 23333–23352 (2017)

    Article  Google Scholar 

  4. Kim, H.S., Lee, H.-K.: Invariant image watermark using Zernike moments. IEEE Trans. Circuits Syst. Video Technol. 13(8), 766–775 (2003)

    Article  Google Scholar 

  5. UCID Image Database, Nottingham Trent University, UK. http://jasoncantarella.com/downloads/ucid.v2.tar.gz

  6. Rahman, M.M., et al.: A semi blind watermarking technique for copyright protection of image based on DCT and SVD domain. Global J. Res. Eng. (2017)

    Google Scholar 

  7. Saidi, M., et al.: A new adaptive image steganography scheme based on DCT and chaotic map. Multimed. Tools Appl. 76(11), 13493–13510 (2017)

    Article  Google Scholar 

  8. Singh, D., Singh, S.K.: DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimed. Tools Appl. 76(1), 953–977 (2017)

    Article  Google Scholar 

  9. University of Southern California: The USC-SIPI Image Database. http://sipi.usc.edu/database/database.php

  10. Wei, S., Zhe-Ming, L., Yu-Chun, W., Fa-Xin, Y., Rong-Jun, S.: High performance reversible data hiding for block truncation coding compressed images. Signal Image Video Process. 7(2), 297–306 (2013)

    Article  Google Scholar 

  11. Weng, C.-Y., Huang, C.-T., Kao, H.-W.: DCT-based compressed image with reversibility using modified quantization. In: Pan, J.-S., Tsai, P.-W., Watada, J., Jain, L.C. (eds.) IIH-MSP 2017. SIST, vol. 81, pp. 214–221. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-63856-0_27

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Partha Chowdhuri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chowdhuri, P., Jana, B., Giri, D. (2018). A Novel Steganographic Scheme Using Weighted Matrix in Transform Domain. In: Ghosh, D., Giri, D., Mohapatra, R., Savas, E., Sakurai, K., Singh, L. (eds) Mathematics and Computing. ICMC 2018. Communications in Computer and Information Science, vol 834. Springer, Singapore. https://doi.org/10.1007/978-981-13-0023-3_3

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-0023-3_3

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-0022-6

  • Online ISBN: 978-981-13-0023-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics