skip to main content
10.1145/1967486.1967583acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiiwasConference Proceedingsconference-collections
research-article

Using LZW compression technique for payload encoding in multiple frequency domain steganography

Published: 08 November 2010 Publication History

Abstract

In this paper the frequency domain steganography is proposed; it uses DWT (discrete wavelets transform) with DCT (discrete cosine transform) techniques, which are applied sequentially on the cover image. Embedding the secret message is done in the high frequency coefficients to provide a high imperceptibility; as it is the most important property of any steganography system. For secret message encoding, variable length encoding is used with a special character codes to encode the characters into binary data, by using the LZW compression technique. This encoding encrypts the secret message and reduces the number of bits used to encode each character, which results in the increment of the capacity. With this new technique, we got very good results through satisfying and improving the most important properties of steganography such as: Imperceptibility; improved by having the MSE (mean square error) → 0 and PSNR (peak signal to noise ratio) → 128 db, security; improved by using an encrypted Stego-key and secret message by the encoding, capacity; improved by encoding the secret message characters with variable length codes and embedding the secret message in the YCbCr components instead of the RGB.

References

[1]
Richard Popa, "An Analysis of Steganographic Techniques", The "Politehnica" University of Timisoara, 1998.
[2]
József LENTI, "STEGANOGRAPHIC METHODS", H-1521 Budapest, Hungary, June 5, 2000.
[3]
ANDERSON, R. J. -- PETITCOLAS, F. A. P., On The Limits of Steganography, IEEE Journal of Selected Areas in Communications, 16 (4) pp. 474--481, May 1998. Special Issue on Copyright & Privacy Protection. ISSN 0733--8716.
[4]
Khorsheed, Nizar Kamal, "Image Watermarking Using DCT Domain", University of Technology, M.sc. Thesis, 2005.
[5]
Uroba Ismail Ibrahim Al-dilaimy, "Text in Image Steganography", University of Technology, M.sc. thesis, 2001.
[6]
Hsu, C. T., & Wu, J. L. "Hidden Digital Watermarks in Images", IEEE Transactions on Image Processing, 8(1), pp. 58--68. 2003.
[7]
Christian Cachin, "An Information-Theoretic Model for Steganography", in Proceedings of 2nd Workshop on Information Hiding (D. Aucsmith, editor), Lecture Notes in Computer Science, Springer, 1998.
[8]
Pei-Chun Chen, May 1999, "On the Study of Watermarking Application in WWW-Modeling, Performance, Analysis, and Applications of Digital Image Watermarking Systems", Master Thesis, National Tsing Hua University.
[9]
Kurak, C., and J. McHughes, "A Cautionary Note On Image Downgrading" in IEEE Computer Security Application Conference 1992, proceedings, IEEE Press, 1992.
[10]
Zhao. J. and E. Koch, "Embedding Robust Labels into Image for Copyright Protection." in Proceedings of the International Conference of Intellectual Property Rights for Information, Knowledge and New Techniques, Munchen, Wein: Oldenbourge Verlag, 1995.
[11]
Jiri Fridrich, "A New Steganographic Method for Palette-Based Images", Center for Intelligent Systems, SUNY Binghamton, Binghamton, NY 13902--6000. IS&T PICS Conference, pages 285289, 1999.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
iiWAS '10: Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
November 2010
895 pages
ISBN:9781450304214
DOI:10.1145/1967486
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • IIWAS: International Organization for Information Integration
  • Web-b: Web-b

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 November 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. frequency domain
  2. information hiding
  3. security
  4. steganography

Qualifiers

  • Research-article

Conference

iiWAS '10
Sponsor:
  • IIWAS
  • Web-b

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 138
    Total Downloads
  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media