A New Approach for Hiding Image Based on the Signature of Coeficients
DOI:
https://doi.org/10.9781/ijimai.2015.352Keywords:
Information Technology, Steganography, Chain Code, DCTAbstract
This paper presents a new approach for hiding the secret image inside another image file, depending on the signature of coefficients. The proposed system consists of two general stages. The first one is the hiding stage which consist of the following steps (Read the cover image and message image, Block collections using the chain code and similarity measure, Apply DCT Transform, Signature of coefficients, Hiding algorithm , Save information of block in boundary, Reconstruct block to stego image and checking process). The second stage is extraction stage which consist of the following steps ( read the stego image, Extract information of block from boundary, Block collection, Apply DCT transform, Extract bits of message and save it to buffer, Extracting message).Downloads
References
[1] Joshua Michael Buchanan, “creating a robust form of steganography”, department of computer science, Wake Forest University, North Carolina, USA, 2004.
[2] Peter Hanzlik,”Steganography in Reed-Solomon Codes”, Lulea University of Technology, Sweden, 2011.
[3] Hardik Patel, Preeti Dave, “Steganography Technique Based on DCT Coefficients”, International Journal of Engineering Research and Applications (IJERA), vol. 2, no. 1, pp.713-717, 2012.
[4] Zuheir H.Ali, “information hiding Using Chain code technique ˮ, AlTurath University College Magazine, vol. 1, no. 9, pp. 44 55, 2010.
[5] Ajit Danti and Preethi Acharya, “Randomized Embedding Scheme Based on DCT Coefficients for Image Steganography”, IJCA Special Issue on “Recent Trends in Image Processing and Pattern Recognition” RTIPPR, 2010.
[6] Deepak Singla and Rupali Syal, “Data Security Using LSB & DCT Steganography In Images”, International Journal Of Computational Engineering Research, vol. 2, no. 2, 2012.
[7] Harsh Vikram Singh, information hiding technique for image cover, LAMBERT Academic Publishing, 2010.
[8] Vidyabharati Mahavidyalaya, “INFORMATION HIDING TECHNOLOGY- A WATERMARKING”, Advances in Computational
Research, vol. 3, no. 1, PP-37-41, 2011.
[9] Mehdi Kharrazi, Husrev T. Sencar, and Nasir Memon, “Image Steganography: Concepts and Practice”, WSPC/Lecture Notes Series, Polytechnic University, Brooklyn, NY 11201, USA, 2004.
[10] Manish Mahajan , Dr. Navdeep Kaur, “Adaptive Steganography: A survey of Recent Statistical Aware Steganography Techniques”, Computer Network and Information Security, 2012.
[11] R. C. Gonzalez and R. E. Woods, “Digital Image Processing”, Second Edition, Prentice-Hall Inc, 2002.
[12] Swastik Das and Rasmi Ranjan Sethy, “Digital Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transform”, National Institute of Technology, Rourkela, India, 2009.
[13] Suchitra Shrestha, “Hybrid Dwt-Dct Algorithm For Image And Video Compression Applications”, Master thesis, University of Saskatchewan, Saskatoon, Canada, 2010.
[14] Vikas Thada, Dr Vivek Jaglan , “Comparison of Jaccard, Dice, Cosine Similarity Coefficient To Find Best Fitness Value for Web Retrieved Documents Using Genetic Algorithmˮ ,International Journal of Innovations in Engineering and Technology (IJIET), vol. 2 no. 4, pp. 202-205, 2013.
Downloads
Published
-
Abstract36
-
PDF27






