Adaptive image steganography using contourlet transform

نویسندگان

  • Mohammad Fakhredanesh
  • Mohammad Rahmati
  • Reza Safabakhsh
چکیده

This work presents adaptive image steganography methods which locate suitable regions for embedding by contourlet transform, while embedded message bits are carried in discrete cosine transform coefficients. The first proposed method utilizes contourlet transform coefficients to select contour regions of the image. In the embedding procedure, some of the contourlet transform coefficients may change which may cause errors at the message extraction phase. We propose a novel iterative procedure to resolve such problems. In addition, we have proposed an improved version of the first method in which it uses an advanced embedding operation to boost its security. Experimental results show that the proposed base method is an imperceptible image steganography method with zero retrieval error rate. Comparisons with other steganography methods which utilize contourlet transform show that our proposed method is able to retrieve all messages perfectly, whereas the others fail. Moreover, the proposed method outperforms the ContSteg method in terms of PSNR and the higher-order statistics steganalysis method. Experimental evaluations of our methods with the well known DCTbased steganography algorithms have demonstrated that our improved method has superior performance in terms of PSNR and SSIM, and is more secure against the steganalysis attack. © 2013 SPIE and IS&T [DOI: 10.1117/1.JEI.22.4.043007]

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

High Capacity Secure Image Steganography Based on Contourlet Transform

In this paper we propose an image steganography technique which embeds secret data without making explicit modifications to the image. The proposed method simultaneously provides both imperceptibility and undetectability. We decompose image by contourlet transform and determine nonsmooth regions. Embedding data in these regions cause less degradation in image quality. Contourlet sub-bands are d...

متن کامل

An extended feature set for blind image steganalysis in contourlet domain

The aim of image steganalysis is to detect the presence of hidden messages in stego images. We propose a blind image steganalysis method in Contourlet domain and then show that the embedding process changes statistics of Contourlet coefficients. The suspicious image is transformed into Contourlet space, and then the statistics of Contourlet subbands coefficients are extracted as features. We us...

متن کامل

ContSteg: Contourlet-Based Steganography Method

A category of techniques for secret data communication called steganography hides data in multimedia mediums. It involves embedding secret data into a cover-medium by means of small perceptible and statistical degradation. In this paper, a new adaptive steganography method based on contourlet transform is presented that provides large embedding capacity. We called the proposed method ContSteg. ...

متن کامل

Efficient Image Steganogrphic Algorithms Utilizing Transforms: Wavelet and Contourlet with Blowfish Encryption

Steganography is a means to hide the existence of information exchange. Using this technique the sender embeds the secret information in some other media. This is done by replacing useless data in ordinary computer files with some other secret information. The secret information could be simple text, encoded text or images. The media used as the embedding plane could be an image, audio, video o...

متن کامل

A Robust Image Denoising Technique in the Contourlet Transform Domain

The contourlet transform has the benefit of efficiently capturing the oriented geometrical structures of images. In this paper, by incorporating the ideas of Stein’s Unbiased Risk Estimator (SURE) approach in Nonsubsampled Contourlet Transform (NSCT) domain, a new image denoising technique is devised. We utilize the characteristics of NSCT coefficients in high and low subbands and apply SURE sh...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Electronic Imaging

دوره 22  شماره 

صفحات  -

تاریخ انتشار 2013