High Secure Image Steganography in BCBS Using DCT and Fractal Compression

被引:0
作者
Prasad, K. Munivara [1 ]
Jyothsna, V. [2 ]
Raju, S. H. K. [3 ]
Indraneel, S. [4 ]
机构
[1] SVEC, Dept CSE, Tirupati, Andhra Pradesh, India
[2] SVEC, Dept IT, Tirupati, Andhra Pradesh, India
[3] Narayana Engn Coll, Dept CSE, Nellore, India
[4] St Anns Coll Engn & Technol, Dept CSE, Chirla, India
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2010年 / 10卷 / 04期
关键词
Steganography; Data Hiding; BCBS; DCT and Fractal Compression;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a new approach to steganography for hiding secret images in the digital media. Steganography differs from digital watermarking because both the information and the very existence of the information are hidden. We refer it as Blind Consistency based Steganography, which provides high imperceptibility and security for information from subterfuge attack. The Existing Steganographic approaches are unable to handle the Subterfuge attack i.e, they cannot deal with the opponents not only detects a message, but also render it useless, or even worse, modify it to opponent favor. The advantage of BCBS is the decoding can be operated without access to the cover image and it also detects if the message has been tampered without using any extra error correction. To improve the imperceptibility of the BCBS, DCT is used in combination to transfer stego-image from spatial domain to the frequency domain. The hiding capacity of the information is improved by introducing Fractal Compression and the security is enhanced using by encrypting stego-image using DES. Finally the Embedding and Extraction process are detailed in the paper, along with the analysis on capacity, security and imperceptibility. The experimental results are provided as well.
引用
收藏
页码:162 / 170
页数:9
相关论文
共 15 条
  • [1] BENDER W, 1996, IBM SYST J, V35, P3, DOI DOI 10.1147/SJ.353.0313
  • [2] Chang Chin-Chen, P 19 INT C ADV INF N
  • [3] Coconu C., 2002, P INT WORKSH TRENDS, P116
  • [4] Fisher Y., 1995, FRACTAL IMAGE COMPRE
  • [5] Hairong Qi, 2002, INT C IM STEG
  • [6] Hunt B. R., 1977, DIGITAL IMAGE RESTOR
  • [7] Johnson N. F., 1998, COMPUT J, V31, DOI [DOI 10.1109/MC.1998.4655281, 10.1109/MC.1998.4655281]
  • [8] Kahn D., 1996, Information Hiding. First International Workshop Proceedings, P1
  • [9] Katsaggelos A, 1991, DIGITAL IMAGE RESTOR
  • [10] Spread spectrum image steganography
    Marvel, LM
    Boncelet, CG
    Retter, CT
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1999, 8 (08) : 1075 - 1083