Abstract
In this paper, a copyright protection scheme that combines the Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) is proposed. The proposed scheme first extracts the DCT coefficients of secret image by applying DCT. After that, image features are extracted from cover image and from DCT coefficients by applying DWT on both separately. Hiding of extracted features of DCT coefficients in the features of cover image is done using two different secret keys. Experimentation has been done using eight different attacks. Experimental results demonstrate that combining the two transforms improves the performance of the steganography technique in terms of PSNR value and the performance is better as compared to that achieved using DWT transform only. The extracted image has good visual quality also.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chan, C.K., Chang, L.M.: Hiding data in image by simple LSB substitution. Pattern Recognition 37, 469–471 (2003)
Sinha, A., Singh, K.: A technique for image encryption using digital signature. Optics. Communications 218(4), 229–234 (2003)
Chang, C.C., Tseng, H.W.: A Steganographic method for digital images using side match. Pattern Recognition 25, 1431–1437 (2004)
Tarres, S., Nakano, M., Perez, H.: An Image Steganography Systems based on BPCS and IWT. In: 16th International Conference on Electronics, Communications and Computers, pp. 51–56 (2006)
Manikopoulos, C., Yun-Qing, S., Sui, S., Dekun, Z.: Detection of block DCT based stegnography in gray scale images. In: IEEE Workshop on Multimedia Signal Processing, pp. 355–358 (2002)
Tsung-Yuan, L., Wen-Hsiang, T.: A New Steganography method for data hiding in Microsoft Word documents by a Change Tracking Technique. IEEE Transaction on Information Forensics and Security 2(1), 24–30 (2007)
Kisik Chang, E., Chango, J., Sangjin, L.: High Quality Perceptual Steganography Techniques. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 518–531. Springer, Heidelberg (2004)
Satish, K., Jayakar, T., Tobin, C., Madhavi, K., Murali, K.: Chaos based spread spectrum image steganography. IEEE transactions on consumer Electronics 50(2), 587–590 (2004)
Zhang, X., Wang, S.Z.: Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recognition, 331–339 (2004)
McKeon, R.T.: Steganography Using the Fourier Transform and Zero-Padding Aliasing Properties. In: IEEE International Conference on Electro/Information Technology, pp. 492–497 (2006)
Mastronadri, G., Castellano, M., Marino, F.: Steganography Effects in various Formats of Images-A preliminary study. In: International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, pp. 116–119 (2001)
Abdelwahab, Ahmed, A., Hassan, Lobha, A.: A Discrete Wavelet Transform based Technique for Image Data Hiding. In: National Radio Conference, Egypt, pp. 1–9 (2008)
Chang, C.C., Chen, T.S., Chang, L.Z.: A Steganographic method based upon JPEG and Quantization table modification. Information Science 141, 123–138 (2002)
Younes, M.B., Jantan, A.: A New Steganography approach for image encryption exchange by using the Least Significant Bit Insertion. Computer Science and Network Security 8, 247–253 (2008)
Tsai, P., Hu, Y.C., Yeh, H.L.: Reversible image hiding scheme using predictive coding and histogram shifting. Signal Processing 89(6), 1129–1143 (2009)
Chao, M.W., Lin, C.H., Yu, C.W., Lee, T.Y.: A high capcity 3D steganography algorithm. IEEE Trnasctions on Visualtion and computer Graphics 15(2), 274–284 (2009)
Li, Z., Chen, X., Pan, X., Zeng, X.: Lossless data hiding scheme based on adjacent pixel difference. In: International Conference on Computer Engineering and Technology, pp. 588–592 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kumar, V., Kumar, D. (2010). Digital Image Steganography Based on Combination of DCT and DWT. In: Das, V.V., Vijaykumar, R. (eds) Information and Communication Technologies. ICT 2010. Communications in Computer and Information Science, vol 101. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15766-0_102
Download citation
DOI: https://doi.org/10.1007/978-3-642-15766-0_102
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15765-3
Online ISBN: 978-3-642-15766-0
eBook Packages: Computer ScienceComputer Science (R0)