CFP last date
20 December 2024
Reseach Article

Image Steganography Combination of Spatial and Frequency Domain

by Saurabh V. Joshi, Ajinkya A. Bokil, Nikhil A. Jain, Dipali Koshti
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 53 - Number 5
Year of Publication: 2012
Authors: Saurabh V. Joshi, Ajinkya A. Bokil, Nikhil A. Jain, Dipali Koshti
10.5120/8419-1319

Saurabh V. Joshi, Ajinkya A. Bokil, Nikhil A. Jain, Dipali Koshti . Image Steganography Combination of Spatial and Frequency Domain. International Journal of Computer Applications. 53, 5 ( September 2012), 25-29. DOI=10.5120/8419-1319

@article{ 10.5120/8419-1319,
author = { Saurabh V. Joshi, Ajinkya A. Bokil, Nikhil A. Jain, Dipali Koshti },
title = { Image Steganography Combination of Spatial and Frequency Domain },
journal = { International Journal of Computer Applications },
issue_date = { September 2012 },
volume = { 53 },
number = { 5 },
month = { September },
year = { 2012 },
issn = { 0975-8887 },
pages = { 25-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume53/number5/8419-1319/ },
doi = { 10.5120/8419-1319 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:53:22.020459+05:30
%A Saurabh V. Joshi
%A Ajinkya A. Bokil
%A Nikhil A. Jain
%A Dipali Koshti
%T Image Steganography Combination of Spatial and Frequency Domain
%J International Journal of Computer Applications
%@ 0975-8887
%V 53
%N 5
%P 25-29
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the art of hiding data inside a carrier file in such a way that an intruder or unwanted personnel is unable to detect the presence of data inside the carrier file. Audio, Video and Images are the different possible carrier files that can be used. This paper describes a steganographic technique which makes use of an image file as a carrier to hold the secret message and transfer it over the communication medium. There are two popular schemes used for image steganography: spatial domain embedding and transform domain embedding. Most of the steganographic techniques discussed in literature either use spatial domain or transform domain to embed the secret message. Here we have proposed a novel steganographic technique that combines both the spatial domain as well as the transform domain approach to achieve greater security. We have chosen LSB substitution technique for spatial domain embedding and Discrete Wavelet Transform (DWT) for transform domain embedding. The paper also proposes technique to combine cryptography with the proposed image steganography technique. Here we make use of the S-DES also known as the simplified DES algorithm for encryption. Our experimental results show that the proposed steganographic technique achieves moderate embedding capacity with high level of security.

References
  1. Wu, H. -C. ; Wu, N. -I. ; Tsai, C. -S. ; Hwang, M. -S ," Image steganographic scheme based on pixel-value differencing and LSB replacement methods," Vision, Image and Signal Processing, IEE Proceedings - Volume 152, Issue 5, 7 Oct. 2005.
  2. C. K Chan and L. M Cheng," Hiding data in images by simple LSB substitution", Pattern Recognition, pp. 469-474, Mar. 2004.
  3. Dr. H. B. Kekre, Ms. Archana Athawale and Ms. Pallavi N. Halarnkar, "Increased Capacity of Information Hiding in LSBs Method for Text and Image", International Journal of Electrical, Computer and Systems Engineering, Volume 2 Number 4. http://www. waset. org/ijecse/v2. html.
  4. Dr. H. B. Kekre, Ms. Archana Athawale, "Information Hiding using LSB Technique with Increased Capacity" International Journal of Cryptography and Security, Vol-I, No. 2, Oct-2008
  5. R. O. EI Safy, H. H. Zayed and A. EI Dessouki, "An Adaptive Steganographic Technique Based on Integer Wavelet Transform," International Conference on Networking and Media Convergence, 2009 (ICNM) 2009) on 24-25 March.
  6. Wu, H. -C. ; Wu, N. -I. ; Tsai, C. -S. ; Hwang, M. -S ," Image steganographic scheme based on pixel-value differencing and LSB replacement methods," Vision, Image and Signal Processing, IEE Proceedings - Volume 152, Issue 5, 7 Oct. 2005.
  7. C. K Chan and L. M Cheng," Hiding data in images by simple LSB substitution," Pattern Recognition, pp. 469-474, Mar. 2004.
  8. P. Chen and H. Lin, "A DWT Approach for Image Steganography", International Journal of Applied Science and Engineering 2006. 4,3.
  9. M. Fahmy Tolba, M. Al-aid Ghonemy, Ismail AbDoul-Hammed Taha and Amal Said Khalifa, 'High capacity Image Steganography using Wavelet Based Fusion', @2004 IEEE.
  10. Sujay Narayana and Gaurav Prasad, 'Two new approaches for secured image steganography using cryptographic techniques and type conversions', International Journal (SIPIJ) Vol. 1, No. 2, December 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography S-DES DWT Discrete Wavelet Transform Carrier Image Stego File Stego Image Brightness attack Cropping attack