A Proposed Technique for Information Hiding Based on DCT
نویسندگان
چکیده
Abstract The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, any suspicion of the hidden text The proposed system depends upon preparing the image data for the next step (DCT Quantization) through steganographic process and using two levels of security: the RSA algorithm and the digital signature, then storing the image in a JPEG format. In this case, the secret message will be looked as plaintext with digital signature while the cover is a coloured image. Then, the results of the algorithm are submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm and its activity. Thus, the proposed algorithm for this research can be divided into two main parts: hiding the text of the sender, and extracting it by the receiver. Moreover, part can be divided into many procedures done by the program Delphi 5.
منابع مشابه
Detection of perturbed quantization (PQ) steganography based on empirical matrix
Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method distorts the dependencies of DCT coefficient values; especially changes much lower than significant bit planes. For steganalysis of PQ, we propose features extraction from the e...
متن کاملA New Algorithm for Enhanced Robustness of Copyright Mark
This paper discusses a new heavy tailed distribution based data hiding into discrete cosine transform (DCT) coefficients of image, which provides statistical security as well as robustness against steganalysis attacks. Unlike other data hiding algorithms, the proposed technique does not introduce much effect in the stegoimage’s DCT coefficient probability plots, thus making the presence of hidd...
متن کاملA Novel Steganographic Technique Based on 3D-DCT Approach
In this paper, a new technique for hiding the data of images has been proposed. This method uses 3-dimentional discrete cosine transformation scheme, along with 2-dimentional discrete cosine transformation. The method proposed in this paper hides two target images behind one cover image thereby increasing the data hiding capacity greatly. For the cause of security only the final stego-image is ...
متن کاملHigh Capacity Data Hiding Scheme for DCT-based Images
To enhance the hiding capacity of DCT-based images, in this paper we propose a new data hiding scheme based on a notation transformation concept. Without considering the reversibility function, experimental results confirm that the hiding capacity provided by our designed data hiding strategy is not only higher than that provided by the Iwata et al.’s, Chang et al.’s and Lin et al.’s schemes bu...
متن کاملA Grayscale Image Steganography Based upon Discrete Cosine Transformation
In this paper, a simple image steganography for secure communication is proposed. Our scheme is based on the discrete cosine transformation (DCT) technique. By using DCT, the most signifi cant information of each DCT secret block can be embedded into the non-signifi cant parts of each DCT cover block. To improve the image quality of the cover image, a quantization factor is used. According to o...
متن کاملA survey on digital data hiding schemes: principals, algorithms, and applications
This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Int. J. Adv. Comp. Techn.
دوره 2 شماره
صفحات -
تاریخ انتشار 2010