ContSteg: Contourlet-Based Steganography Method

نویسندگان

  • Hedieh Sajedi
  • Mansour Jamzad
چکیده

A category of techniques for secret data communication called steganography hides data in multimedia mediums. It involves embedding secret data into a cover-medium by means of small perceptible and statistical degradation. In this paper, a new adaptive steganography method based on contourlet transform is presented that provides large embedding capacity. We called the proposed method ContSteg. In contourlet decomposition of an image, edges are represented by the coefficients with large magnitudes. In ContSteg, these coefficients are considered for data embedding because human eyes are less sensitive in edgy and non-smooth regions of images. For embedding the secret data, contourlet subbands are divided into 4×4 blocks. Each bit of secret data is hidden by exchanging the value of two coefficients in a block of contourlet coefficients. According to the experimental results, the proposed method is capable of providing a larger embedding capacity without causing noticeable distortions of stego-images in comparison with a similar wavelet-based steganography approach. The result of examining the proposed method with two of the most powerful steganalysis algorithms show that we could successfully embed data in cover-images with the average embedding capacity of 0.05 bits per pixel.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Adaptive image steganography using contourlet transform

This work presents adaptive image steganography methods which locate suitable regions for embedding by contourlet transform, while embedded message bits are carried in discrete cosine transform coefficients. The first proposed method utilizes contourlet transform coefficients to select contour regions of the image. In the embedding procedure, some of the contourlet transform coefficients may ch...

متن کامل

High Capacity Secure Image Steganography Based on Contourlet Transform

In this paper we propose an image steganography technique which embeds secret data without making explicit modifications to the image. The proposed method simultaneously provides both imperceptibility and undetectability. We decompose image by contourlet transform and determine nonsmooth regions. Embedding data in these regions cause less degradation in image quality. Contourlet sub-bands are d...

متن کامل

Efficient Image Steganogrphic Algorithms Utilizing Transforms: Wavelet and Contourlet with Blowfish Encryption

Steganography is a means to hide the existence of information exchange. Using this technique the sender embeds the secret information in some other media. This is done by replacing useless data in ordinary computer files with some other secret information. The secret information could be simple text, encoded text or images. The media used as the embedding plane could be an image, audio, video o...

متن کامل

An extended feature set for blind image steganalysis in contourlet domain

The aim of image steganalysis is to detect the presence of hidden messages in stego images. We propose a blind image steganalysis method in Contourlet domain and then show that the embedding process changes statistics of Contourlet coefficients. The suspicious image is transformed into Contourlet space, and then the statistics of Contourlet subbands coefficients are extracted as features. We us...

متن کامل

Blind Image Steganalysis Based on Contourlet Transform

This paper presents a new blind approach of image Steganalysis based on contourlet transform and non linear support vector machine. Properties of Contourlet transform are used to extract features of images, and non linear support vector machine is used to classify the stego and cover images. The important aspect of this paper is that, it uses the minimum number of features in the transform doma...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Wireless Sensor Network

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2009