Image Steganography Using Discrete Cosine Transform (DCT) and Blowfish Algorithm

نویسندگان

  • Monika Gunjal
  • Jasmine Jha
چکیده

Steganography is one of the methods of secret communication that hides the existence of message so that a viewer cannot detect the transmission of message and hence cannot try to decrypt it. It is the process of embedding secret data in the cover image without significant changes to the cover image. A cryptography algorithm is used to convert the secret messages to an unreadable form before embedding. These algorithms keep the messages from stealing, destroying from unintended users on the internet and hence provide security. Cryptography was introduced for making data secure. But alone cryptography cannot provide a better security approach because the scrambled message is still available to the eavesdropper. There arises a need of data hiding. So the propose technique use a combination of steganography and cryptography for improving the security. The proposed technique use Discrete Cosine Transform (DCT) and Blowfish algorithm. The proposed method calculates LSB of each DC coefficient and replace with each bit of secret message. The proposed embedding method using DCT with LSB obtained better PSNR values. Blowfish algorithm is used for encryption and decryption of text message using a secret-key block cipher. This technique makes sure that the message has been encrypted before hiding it into a cover image. Blowfish is an improvement over DES, 3DES, etc designed to increase security and to improve performance. KeywordsSteganography, Cryptography ,DCT, LSB, PSNR, MSE.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A review on Digital Image Steganography

Steganography is an important area of research in recent years involving a number of applications. It is the science of embedding information into the cover image viz., text, video, and image (payload) without causing statistically significant modification to the cover image. This paper deals with hiding text in an image file using using various Steganography techniques. Discrete Cosine Transfo...

متن کامل

A Review of Comparison Techniques of Image Steganography

Steganography is an important area of research in recent years involving a number of applications. It is the science of embedding information into the cover image viz., text, video, and image (payload) without causing statistically significant modification to the cover image. The modern secure image steganography presents a challenging task of transferring the embedded information to the destin...

متن کامل

Image Steganography Optimization Technique

This paper presents a novel steganography technique which combines Discrete Cosine Transform (DCT) and Least Significant Bit (LSB). The objective is to maximize the capacity and invisibility of the secret image with minimal modification to the cover image (at most k-bits per block). The secret image is transformed to frequency domain using DCT. An algorithm is employed to construct the optimum ...

متن کامل

A Novel Approach for Multilevel Steganography

The proposed scheme is a multi level steganography in which steganography is done at two places. The cover image is divided into fixed size blocks and then Discrete Cosine Transformation is applied into each block of cover image. The resulting DCT coefficients are quantized using quantization process. In the quantized DCT coefficient, the encrypted data file is embedded by using Least Significa...

متن کامل

A Security Enhanced Robust Steganography Algorithm for Data Hiding

In this paper, a new robust steganography algorithm based on discrete cosine transform (DCT), Arnold transform and chaotic system is proposed. The chaotic system is used to generate a random sequence to be used for spreading data in the middle frequency band DCT coefficient of the cover image. The security is further enhanced by scrambling the secret data using Arnold Cat map before embedding. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014