Dct Domain Stegasvm-shifted Lsb Model for Highly Imperceptible and Robust Cover-image

نویسندگان

  • Saadiah Yahya
  • Hanizan Shaker Hussain
  • Hani M. Ali
چکیده

The importance of information security in protecting and hiding information has increased due to the increased use of computers and Internet. Information hiding technology such as Digital Image steganography embeds secret messages inside other files. Least Square Bit (LSB) is the most popular technique used in image steganography that hides data behind a cover-image in a spatial and discrete cosine transform (DCT) domain. Support Vector Machine (SVM) is another technique that is used to strengthen the embedding algorithm. The main aim of image steganography is to keep the secret-message remain secret regardless of the techniques used. But many of the previously proposed techniques failed to attain this aim. The main concerns to this problem are the non-random changes of a cover-image that constantly occurred after the embedding process and the non-robustness of the embedding algorithm to image processing operation. This study therefore proposes a new model that utilises Human Visual System (HVS) and embedding technique through shifted LSB called StegaSVM-Shifted LSB in DCT domain to preserve the imperseptibility and increase the robustness of stego-images. The proposed technique shows better performances compared to other existing techniques.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Eigenvalues-based LSB steganalysis

So far, various components of image characteristics have been used for steganalysis, including the histogram characteristic function, adjacent colors distribution, and sample pair analysis. However, some certain steganography methods have been proposed that can thwart some analysis approaches through managing the embedding patterns. In this regard, the present paper is intended to introduce a n...

متن کامل

Image Steganography Optimization Technique

This paper presents a novel steganography technique which combines Discrete Cosine Transform (DCT) and Least Significant Bit (LSB). The objective is to maximize the capacity and invisibility of the secret image with minimal modification to the cover image (at most k-bits per block). The secret image is transformed to frequency domain using DCT. An algorithm is employed to construct the optimum ...

متن کامل

Using PSO Algorithm for Simple LSB Substitution Based Steganography Scheme in DCT Transformation Domain

An improved method for embedding a secret message into a cover image with least significant bit (LSB) substitution in discrete cosine transformation (DCT) domain was proposed. The secret message was first split into partitions, while the cover image was divided into blocks of size 2x2, and DCT was used to convert the blocks from spatial domain to frequency domain. Then, Particle Swarm Optimizat...

متن کامل

Steganography Technique Based on DCT Coefficients

The least significant-bit (LSB) based techniques are very popular for steganography in spatial domain. The simplest LSB technique simply replaces the LSB in the cover image with the bits from secret information. Further advanced techniques use some criteria to identify the pixels in which LSB(s) can be replaced with the bits of secret information. In DCT based technique insertion of secret info...

متن کامل

An Efficient Method for Image and Audio Steganography using Least Significant Bit (LSB) Substitution

In order to improve the data hiding in all types of multimedia data formats such as image and audio and to make hidden message imperceptible, a novel method for steganography is introduced in this paper. It is based on Least Significant Bit (LSB) manipulation and inclusion of redundant noise as secret key in the message. This method is applied to data hiding in images. For data hiding in audio,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015