Paper title:

Image Hiding Using Magnitude Modulation on the DCT Coefficients

Published in: Issue 2, (Vol. 4) / 2010
Publishing date: 2010-04-30
Pages: 9-14
Author(s): AL - MOMEN M. A. Saad, GEORGE E. Loay
Abstract. In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the stego-image and also it is robust, to some extents against several levels of JPEG compression.
Keywords: Steganography, Information Hiding, DCT.

1. N. F. Johnson and S. Katzenbeisser, .A survey of steganographic techniques., in S. Katzenbeisser and F. Peticolas (Eds.): “Information Hiding”, pp.43-78. Artech House, Norwood, MA, 2000.

2. N.F. Johnson and S. Jajodia: “Exploring Steganography: Seeing the Unseen” Computer, vol. 31, no. 2, 1998, pp. 26–34.

3. N.F. Johnson, Z. Duric and S. Jajodia: “Information Hiding: Steganography and Watermarking – Attacks and Countermeasures”. Kluwer Academic, Dordrecht, The Netherlands, 2001.

4. R. Anderson, S. Goldenstein: “Steganography and Steganalysis in Digital Multimedia: Hype or Hallelujah?”, RITA, Volume XV, Número 1, pp. 83-110, 2008.

5. R. C. Gonzalez and R. E. Woods: “Digital Image Processing”. Prentice-Hall, Boston, MA, USA, second edition, 2002.

6. E. Scott, Umbaugh: “Computer Vision and Image Processing”, Prentice Hall PTR,1998.

7. T. Morkel, J. Eloff and M. Olivier, “An Overview of Image Steganography,” in Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, June/July 2005 (Published electronically).

8. K. WONG and K. TANAKA , “StegErmelc: A Novel DCT-Based Steganographic Method Using Three Strategies”, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2008 E91- A(10):2897-2908.

9. K.B. Raja, C.R. Chowdary, K.R. Venugopal, L.M. Patnaik, “A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images”, ICISIP 2005 Third International Conference on Intelligent Sensing and Information Processing 2005, p.p. 170- 176.

10.L. Chih-Yang, C. Chin-Chen, W. Yu-Zheng, “Reversible Steganographic Method with High Payload for JPEG Images”, IEICE Transactions on Information and Systems 2008 E91-D(3):836-84.

11.K. Wong, X. Qi, K. Tanaka, “A DCT-based Mod4 steganographic method”, Signal Processing 87 ,2007, p.p. 1251–1263.

12.D. Salomon, “Data Compression: The Complete Reference”, Springer, forth edition, 2007.

13.I. M. Pu, “Fundamental Data Compression”, ButterworthHeinemann, 2006.

Back to the journal content
Creative Commons License
This article is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License.
Home | Editorial Board | Author info | Archive | Contact
Copyright JACSM 2007-2022