Implementation of Variable Tone Variable Bits Gray-Scale Image Stegnography Using Discrete Cosine Transform

Abstract

Secure exchange of information is the basic need of modern digital world of e-communication which is achieved either by encrypting information or by hiding information in other information called cover media. Concealing information requires a well designed technique of Stegnography. This work presents a technique, variable tone variable bits (VTVB) Stegnography, to hide information in a cover image. The VTVB Stegnography hides variable data in discrete cosine transform (DCT) coefficients of the cover image. VTVB Stegnography provides variable data hiding capacity and variable distortion. Additional large data hiding this technique provide extra security due to the large key size making VTVB Stegnography technique much more immune to steganalysis. The hiding makes the existence of information imperceptible for steganalysis and the key of keeping a secret makes the recovering of information difficult for an intruder. The key size is depending on cover image and numbers of bits of discrete cosine transform (DCT) coefficients used for information embedding. This is a very flexible technique and can be used for low payload applications, e.g. watermarking to high payload applications, e.g. network Stegnography.


Share and Cite:

S. Khan, M. Khan, S. Iqbal, S. Shah and N. Ahmad, "Implementation of Variable Tone Variable Bits Gray-Scale Image Stegnography Using Discrete Cosine Transform," Journal of Signal and Information Processing, Vol. 4 No. 4, 2013, pp. 343-350. doi: 10.4236/jsip.2013.44043.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] T. Moerland, “Stegnography and Steganalysis,” Leiden Institute of Advanced Computing Science, 2003. www.liacs.nl/home/ tmoerl/privtech.pdf
[2] D. Artz, “Digital Stegnography: Hiding Data within Data,” IEEE Internet Computing Journal, Vol. 5, No. 3, 2001, pp. 75-80.
[3] T. Handel and M. Sandford, “Hiding Data in the OSI Network Model,” Proceedings of the 1st International Workshop on Information Hiding, Vol. 1174, 1996, pp. 23-38. http://dx.doi.org/10.1007/3-540-61996-8_29
[4] K. Solanki, K. Sullivan and U. Madhow, Eds., “Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes,” Lecture Notes in Computer Science, Vol. 5284, 2008, pp. 60-71.
[5] K. Ahsan and D. Kundur, “Practical Data Hiding in TCP/ IP”, Proceedings of the Workshop on Multimedia Security at ACM Multimedia, 2002.
[6] R. J. Anderson and F. A. P. Petitcolas, “On the Limits of Stegnography,” IEEE Journal of Selected Areas in Communications, Vol. 16, No. 4, 1998, pp. 474-481. http://dx.doi.org/10.1109/49.668971
[7] R. Crandall, “Some Notes on Stegnography,” Steganography Mailing List, 1998. http://os.inf.tu-dresden.de/westfeld/crandall.pdf
[8] F. Galand and G. Kabatiansky, “Information Hiding by Coverings,” Proceedings of the IEEE Information Theory Workshop, 2004, pp. 151-154.
[9] K. Cabeen and P. Gent, “Image Compression and Discrete Cosine Transform,” College of Redwoods. http://online.redwoods.cc.ca.us/instruct/darnold/LAPROJ/Fall98/PKen/dct.pdf
[10] A. B. Watson, “Image Compression Using the Discrete Cosine Transform,” NASA Ames Research Center, Mathematica Journal, Vol. 4, No. 1, 1994, pp. 81-88.
[11] J. Fridrich, M. Goljan and R. Du, “Detecting LSB Steganography in Color and Gray-Scale Images,” Magazine of IEEE Multimedia, Special Issue on Multimedia and Security, Vol. 8, No. 4, 2001, pp. 22-28.
[12] J. Bierbrauer and J. Fridrich, “Constructing Good Covering Codes for Applications in Stegnography,” Transactions on Data Hiding and Multimedia Security, Springer, Heidelberg, 2007. http://www.math.mtu.edu/jbierbra/
[13] N. Provos and P. Honeyman, “Hide and Seek: An Introduction to Stegnography,” IEEE Security & Privacy, Vol. 1, No. 3, 2003, pp. 32-44.
[14] M. A. Shourian, R. C. Jain and Y.-S. Ho, “Dithered Quantization for Image Data Hiding in the DCT Domain,” Proceedings of IST 2003, 16-18 August 2003, Isfahan, pp. 171-175.
[15] J. R. Krenn, “Stegnography and Steganalysis,” 2004.
[16] R.-J. Hwang, T. K. Shih and C.-H. Kao, “A Lossy Compression Tolerant Data Hiding Method Based on JPEG and VQ,” Journal of Internet Technology, Vol. 5, No. 3, 2004, pp. 171-178
[17] H.-W. Tseng and C.-C. Chang, “High Capacity Data Hiding in JPEG Compressed Images,” Informatica, Vol. 15, No. 1, 2004, pp. 127-142.
[18] Y. Park, H. Kang, K. Yamaguchi and K. Kobayashi, “Integrity Verification of Secret Information in Image Steganography,” Symposium on Information Theory and Its Applications, Hakodate, 2006.
[19] N. Deshpande, K. Sneha and D. Jacobs, “Implementation of LSB Stegnography and Its Evaluation for Various Bits,” 1st International Conference on Digital Information Management, Bangalore, 6 December 2006, pp. 173-178. http://dx.doi.org/10.1109/ICDIM.2007.369349
[20] M. Chaumont and W. Puech, “DCT-Based Data Hiding Method to Embed the Color Information in a JPEG Grey Level Image,” 14th European Signal Processing Conference (EUSIPCO 2006), Florence, 4-8 September, 2006.
[21] A. Jain and I. S. Gupta, “A JPEG Compression Resistant Stegnography Scheme for Raster Graphics Images,” IEEE Region 10 Conference of TENCON, 30 October-2 November 2007, Taipei, pp. 1-4.
[22] K. Wong, X. J. Qi and K. Tanaka, “A DCT Based Mod4 Stegnography Method,” Signal Processing, Vol. 87, No. 6, 2007, pp. 1251-1263. http://dx.doi.org/10.1016/j.sigpro.2006.10.014
[23] T. Ishida, K. Yamawaki, H. Noda and M. Niimi, “Performance Improvement of JPEG2000 Stegnography Using QIM,” Journal of Communication and Computer, Vol. 6, No. 1, 2009.
[24] C.-T. Tsai, C. Liaw, Y.-H. Liao and C.-H. Ko, “Concealing Information in Image Mosaics Based on Tile Image Features,” Journal of the Chinese Institute of Engineers, Vol. 34, No. 3, 2011, pp. 429-440. http://dx.doi.org/10.1080/02533839.2011.565618
[25] C.-M. Wang and P.-C. Wang, “Data Hiding on Point-Sampled Geometry,” Journal of the Chinese Institute of Engineers, Vol. 29, No. 3, 2006, pp. 539-542.
[26] D. Bhattacharyya, T.-H. Kim and P. Dutta, “A Method of Data Hiding in Audio Signal,” Journal of the Chinese Institute of Engineers, Vol. 35, No. 5, 2012, pp. 523-528.
http://dx.doi.org/10.1080/02533839.2012.679054
[27] S. Khan, M. H. Yousaf and M. J. Akram, “Implementation of Variable Least Significant Bits Stegnography Using Decreasing Distance Decreasing Bits Algorithm,” International Journal of Computer Science Issues, Vol. 8, No. 6, 2011.
[28] S. Khan and M. H. Yousaf, “Implementation of VLSB Stegnography Using Modular Distance Technique,” Innovations and Advances in Computer, Information, Systems Sciences, and Engineering Lecture Notes in Electrical Engineering, Vol. 152, 2013, pp. 511-525. http://dx.doi.org/10.1007/978-1-4614-3535-8_43
[29] E. Walia and P. J. Navdeep, “An Analysis of LSB & DCT Based Stegnography,” Global Journal of Computer Science and Technology, Vol. 10, No. 1, 2010, pp. 4-8.
[30] E. Neuman, “MATLA B Tutorials,” Department of Mathematics, Board of Trustees, Southem Illinois University, Carbondale, 2009.
[31] R. C. Gonzalez and R. E. Woods, “Digital Image Processing,” 2nd Edition, Prentice-Hall, 2002.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.