Skip to main content

Digital Image Steganography Based on Combination of DCT and DWT

  • Conference paper
Information and Communication Technologies (ICT 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 101))

Abstract

In this paper, a copyright protection scheme that combines the Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) is proposed. The proposed scheme first extracts the DCT coefficients of secret image by applying DCT. After that, image features are extracted from cover image and from DCT coefficients by applying DWT on both separately. Hiding of extracted features of DCT coefficients in the features of cover image is done using two different secret keys. Experimentation has been done using eight different attacks. Experimental results demonstrate that combining the two transforms improves the performance of the steganography technique in terms of PSNR value and the performance is better as compared to that achieved using DWT transform only. The extracted image has good visual quality also.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chan, C.K., Chang, L.M.: Hiding data in image by simple LSB substitution. Pattern Recognition 37, 469–471 (2003)

    Article  Google Scholar 

  2. Sinha, A., Singh, K.: A technique for image encryption using digital signature. Optics. Communications 218(4), 229–234 (2003)

    Article  Google Scholar 

  3. Chang, C.C., Tseng, H.W.: A Steganographic method for digital images using side match. Pattern Recognition 25, 1431–1437 (2004)

    Article  Google Scholar 

  4. Tarres, S., Nakano, M., Perez, H.: An Image Steganography Systems based on BPCS and IWT. In: 16th International Conference on Electronics, Communications and Computers, pp. 51–56 (2006)

    Google Scholar 

  5. Manikopoulos, C., Yun-Qing, S., Sui, S., Dekun, Z.: Detection of block DCT based stegnography in gray scale images. In: IEEE Workshop on Multimedia Signal Processing, pp. 355–358 (2002)

    Google Scholar 

  6. Tsung-Yuan, L., Wen-Hsiang, T.: A New Steganography method for data hiding in Microsoft Word documents by a Change Tracking Technique. IEEE Transaction on Information Forensics and Security 2(1), 24–30 (2007)

    Article  Google Scholar 

  7. Kisik Chang, E., Chango, J., Sangjin, L.: High Quality Perceptual Steganography Techniques. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 518–531. Springer, Heidelberg (2004)

    Google Scholar 

  8. Satish, K., Jayakar, T., Tobin, C., Madhavi, K., Murali, K.: Chaos based spread spectrum image steganography. IEEE transactions on consumer Electronics 50(2), 587–590 (2004)

    Article  Google Scholar 

  9. Zhang, X., Wang, S.Z.: Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recognition, 331–339 (2004)

    Google Scholar 

  10. McKeon, R.T.: Steganography Using the Fourier Transform and Zero-Padding Aliasing Properties. In: IEEE International Conference on Electro/Information Technology, pp. 492–497 (2006)

    Google Scholar 

  11. Mastronadri, G., Castellano, M., Marino, F.: Steganography Effects in various Formats of Images-A preliminary study. In: International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, pp. 116–119 (2001)

    Google Scholar 

  12. Abdelwahab, Ahmed, A., Hassan, Lobha, A.: A Discrete Wavelet Transform based Technique for Image Data Hiding. In: National Radio Conference, Egypt, pp. 1–9 (2008)

    Google Scholar 

  13. Chang, C.C., Chen, T.S., Chang, L.Z.: A Steganographic method based upon JPEG and Quantization table modification. Information Science 141, 123–138 (2002)

    Article  MATH  Google Scholar 

  14. Younes, M.B., Jantan, A.: A New Steganography approach for image encryption exchange by using the Least Significant Bit Insertion. Computer Science and Network Security 8, 247–253 (2008)

    Google Scholar 

  15. Tsai, P., Hu, Y.C., Yeh, H.L.: Reversible image hiding scheme using predictive coding and histogram shifting. Signal Processing 89(6), 1129–1143 (2009)

    Article  MATH  Google Scholar 

  16. Chao, M.W., Lin, C.H., Yu, C.W., Lee, T.Y.: A high capcity 3D steganography algorithm. IEEE Trnasctions on Visualtion and computer Graphics 15(2), 274–284 (2009)

    Article  Google Scholar 

  17. Li, Z., Chen, X., Pan, X., Zeng, X.: Lossless data hiding scheme based on adjacent pixel difference. In: International Conference on Computer Engineering and Technology, pp. 588–592 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kumar, V., Kumar, D. (2010). Digital Image Steganography Based on Combination of DCT and DWT. In: Das, V.V., Vijaykumar, R. (eds) Information and Communication Technologies. ICT 2010. Communications in Computer and Information Science, vol 101. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15766-0_102

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15766-0_102

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15765-3

  • Online ISBN: 978-3-642-15766-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics