CFP last date
20 December 2024
Reseach Article

Block Mean Modulation: An Effective and Robust Image Steganographic Technique in the Spatial Domain

by A. Nagalinga Rajan, P. Eswaran, R. Sunder, S. Poonkuntran
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 19
Year of Publication: 2013
Authors: A. Nagalinga Rajan, P. Eswaran, R. Sunder, S. Poonkuntran
10.5120/12992-0064

A. Nagalinga Rajan, P. Eswaran, R. Sunder, S. Poonkuntran . Block Mean Modulation: An Effective and Robust Image Steganographic Technique in the Spatial Domain. International Journal of Computer Applications. 73, 19 ( July 2013), 14-20. DOI=10.5120/12992-0064

@article{ 10.5120/12992-0064,
author = { A. Nagalinga Rajan, P. Eswaran, R. Sunder, S. Poonkuntran },
title = { Block Mean Modulation: An Effective and Robust Image Steganographic Technique in the Spatial Domain },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 19 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 14-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number19/12992-0064/ },
doi = { 10.5120/12992-0064 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:40:31.136160+05:30
%A A. Nagalinga Rajan
%A P. Eswaran
%A R. Sunder
%A S. Poonkuntran
%T Block Mean Modulation: An Effective and Robust Image Steganographic Technique in the Spatial Domain
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 19
%P 14-20
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Image steganography is one of the emerging techniques for secret communication in the digital age. In order to have effective secret communication through image steganography, data hiding must be robust to image transformations and effective against analysis techniques. This paper proposes a novel spatial domain data hiding technique in which the secret message is embedded in the quantized mean of image blocks. The experimental results show that the message is preserved after applying common image modifications including jpeg compression, resizing and additive noise to some extent. The block size and quantization factor are optimized through trial and error. The mean of the intensity values in a block is the same as the DC coefficient of the DCT of the block. The effectiveness against common steganalysis methods is also established.

References
  1. Ingemar. J. Cox et al, "Digital Watermarking and Steganography,", 2nd ed. Morgan Kaufmann series in computer security.
  2. R. Chandramouli, M. Kharrazi, and N. Memon, Image steganography and steganalysis: Concepts and practice. In T. Kalker, Y. M. Ro, and I. Cox, editors, Digital Watermarking, 2nd International Workshop, IWDW 2003, Seoul, Korea, October 20–22, 2003, volume 2939 of LNCS, pages 35–49. Springer-Verlag, New York, 2004.
  3. W. Cary Huffman and Vera Pless, Fundamentals of error-correcting codes, Cambridge University Press 2003.
  4. N. F. Johnson, S. Katzenbeisser, "A Survey of steganographic techniques", in S. Katzenbeisser and F. Petitcolas (Eds. ): Information Hiding, pp. 43-78. Artech House, Norwood, MA, 2000.
  5. A. Westfeld and A. Pfitzmann. Attacks on steganographic systems. In A. Pfitzmann, editor, Information Hiding, 3rd International Workshop, IH'99, Dresden, Germany, September 29–October 1, 1999, volume 1768 of LNCS, pages 61–75. Springer-Verlag,New York, 2000.
  6. Reliable Detection of LSB Steganography in Grayscale and Color Images, with M. Goljan and R. Du, Proc. of the ACM Workshop on Multimedia and Security, Ottawa, Canada, October 5, 2001, pp. 27-30.
  7. S. Dumitrescu, X. Wu, and N. Memon. On steganalysis of random LSB embedding in continuous-tone images. In Proceedings ICIP, Rochester, NY, September 22–25, 2002, pages 324–339, 2002.
  8. T. Sharp, "An implementation of key-based digital signal steganography," in Proc. Information Hiding Workshop, Springer LNCS 2137, pp. 13–26, 2001.
  9. J. Harmsen and W. Pearlman, "Steganalysis of additive-noise modelable information hiding," in Proc. SPIE Security Watermarking Multimedia Contents, vol. 5020, 2003, pp. 131–142.
  10. A. Ker, "Steganalysis of LSB matching in greyscale images," IEEE
  11. Signal Process. Lett. , vol. 12, no. 6, pp. 441–444, Jun. 2005.
  12. Mielikainen,J, "LSB Matching Revisited", IEEE Signal Processing Letters, vol 13, Issue 5pg285-287, May 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Information hiding Steganography Image transformations JPEG compression Modulation Steganalysis