Authors:Prithwish Das,Kushal Chakraborty,Sayak Sinha,Atanu Das,
Keywords:Image Steganograph, DCT,Message Bit Shuffling,
AbstractSteganography has been considered as a technique of message hiding within another carrier multimedia data. Messages in the form of image (with embedded handwritten or typed texts) are often embedded in several ways within another image in image steganography. DCT based schemes are undertaken in the frequency domain methods in addition to usual plain text message embedding. Most of the message image hiding techniques embeds image bit string without considering any shuffling schemes to deal with the said string before embedding. Present work targeted to incorporate message hiding essentially with shuffled and re-shuffled bit strings in different ways prior to DCT operation. A new method has been proposed with these shuffling schemes to enhance the security level of the encryption. Investigations with the proposed image steganography method show that the new methods performed better than normal image steganography techniques without shuffling schemes. Performance of the proposed method is evaluated using Peak-Signal-to-Noise Ratio (PSNR) and Mean Square Error (MSE). Results show that the shuffling bit steganography method outperformed the common DCT based schemes without shuffling.
I. A. ElSayed, A. Elleithy, P. ThungaandZ. Wu,“Highly secure image steganography algorithm using curvelet transform and DCT encryption”, Proc. of Systems, Applications and Technology Conference (LISAT), 2015 IEEE Long Island, pp. 1-6. May, 2015.
II. A. Jawedand A. Das,“Security Enhancement in Audio Steganography by RSA Algorithm”, Int.Journal of Electronics and Communication Technology, Vol.: 6, Issue:1, spl-1, pp. 139-142, Jan 2015.
III.A. K. GulveandM. S. Joshi, “A High Capacity Secured Image Steganography Method with Five Pixel Pair Differencing and LSB Substitution”, Int. J. of Image, Graphics and Signal Processing, Vol.:7, No. 5, pp. 66-74, 2015,DOI: 10.5815/ijigsp.2015.05.08
IV.B. G. BanikandS. K. Bandyopadhyay,“Implementation of image steganography algorithm using scrambled image and quantization coefficient modification in DCT”, Proc. of IEEE Int. Conf. on Research in Computational Intelligence and Communication Networks (ICRCICN), pp. 400-405, 2015
V.B. Mann,“How many times should you shuffle a deck of cards”, Topics in Contemporary Probability and Its Applications, Vol.:15, pp. 1-33, 1995
VI.C. C.Chang, T. S. Chen and L. Z. Chung,“A steganographic method based upon JPEG and quantization table modification”, Information Sciences, Vol.: 141, Issue: 1, pp. 123-138, 2002
VII.E Walia, P Jain and N Navdeep,“An Analysis of LSB & DCT based Steganography”, Global Journal of Computer Science and Technology, 10(1)(Ver 1.0), pp. 4-8, April 2010
VIII.F. Yonggang, “Anovel public key watermarking scheme based on shuffling”, Proc. of IEEE International Conference on Convergence Information Technology-2007, pp. 312-317, 2007
IX.K. Hwang andF. Briggs,Parallel processing and computer architecture, Me Graw Hill 164, 1984
X.K. Peng and B. Feng,“A shuffling scheme with strict and strong security”, Proc of Fourth IEEE International Conference on Emerging Security Information Systems andTechnologies (SECURWARE), 2010
XI.K.S.Shete, M.PatilandJ. S. Chitode, “Least Significant Bit and Discrete Wavelet Transform Algorithm Realization for Image Steganography Employing FPGA”, Int. J. of Image, Graphics and Signal Processing, Vol.: 8, No.6, pp.48-56, 2016.DOI: 10.5815/ijigsp.2016.06.06
XII.L. Guo, J. Ni, W. Su, C. Tang and Y. Q. Shi, “Using statistical image model for JPEG steganography: uniform embedding revisited”,IEEE Transactions on Information Forensics and Security, Vol.: 10, Issue:12, pp. 2669-2680, 2015
XIII.M. Bilal, S. Imtiaz, W. Abdul andS. Ghouzali. “Zero-steganography using DCT and spatial domain”, Proc. of 2013 ACS Int. Conf. on in Computer Systems and Applications (AICCSA), IEEE, pp. 1-7, May, 2013
XIV.M. Zamani, A. A.Manaf, R. B. Ahmad, A. M. Zeki andS. Abdullah,“A Genetic Algorithm-Based Approach for Audio Steganography”, World Academy of Science, Engineering and Technology, 2009
XV.M. Zamani, A.A. Manaf, R. Ahmad, F. Jaryani, H. Taherdoost, S. S. Chaeikar andH.R. Zeidanloo. “A novel approach for genetic audio watermarking”, Journal of Information Assurance and Security,Vol.: 5, pp.102-111, 2010
XVI.P. Das, S. Rayand A. Das, “An Efficient Embedding Technique in Image Steganography Using Lucas Sequence”, International Journal of Image, Graphics & Signal Processing, Vol.: 9, Issue: 9, pp. 51-58, 2017
XVII.S. Chandran, and K. Bhattacharyya, “Performance analysis of LSB, DCT, and DWT for digital watermarking application using steganography”, Proc. of IEEE Int. Conf. on Electrical, Electronics, Signals, Communicationand Optimization (EESCO), 2015
XVIII.S. Hemalatha, U. D. Acharya, A. RenukaandR. K.Priya, “A Secure Color Image Steganography in Transform Domain”, International Journal on Cryptography and Information Security (IJCIS), Vol. 3, Issue: 1, March 2013
XIX.S. Lahiri, P. Paul, S.Banerjee, S.Mitra, A. MukhopadhyayandM. Gangopadhyaya,“Image steganography on coloured images using edge based Data Hiding in DCT domain”, Proc. of 2016 IEEE 7thAnnual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 1-8, October 2016
XX.S. S. Jaber, H. A. Fadhil, A. Khalib, I. ZahereelandR. A. Kadhim, “Survey on Recent Digital Image Steganography Techniques”, Journal of Theoretical & Applied Information Technology, Vol.: 66, Issue:3, pp. 714-728, 2014
XXI.W. B. PennebakerandJ.L. Mitchell,JPEG: Still Image Data Compression Standard, Van Nostrand Reinhold, New York, 1993Author(s): Prithwish Das, Kushal Chakraborty, Sayak Sinha, Atanu Das View Download