We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Secured Image Steganography using Different Transform Domain

by Akanksha Kaushal, Vineeta Choudhary
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 77 - Number 2
Year of Publication: 2013
Authors: Akanksha Kaushal, Vineeta Choudhary
10.5120/13366-0965

Akanksha Kaushal, Vineeta Choudhary . Secured Image Steganography using Different Transform Domain. International Journal of Computer Applications. 77, 2 ( September 2013), 24-28. DOI=10.5120/13366-0965

@article{ 10.5120/13366-0965,
author = { Akanksha Kaushal, Vineeta Choudhary },
title = { Secured Image Steganography using Different Transform Domain },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 77 },
number = { 2 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 24-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume77/number2/13366-0965/ },
doi = { 10.5120/13366-0965 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:49:12.777522+05:30
%A Akanksha Kaushal
%A Vineeta Choudhary
%T Secured Image Steganography using Different Transform Domain
%J International Journal of Computer Applications
%@ 0975-8887
%V 77
%N 2
%P 24-28
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today's communication world, data sharing and transfer is increasing exponentially. The threat of an attacker accessing secret information has been an ever existing concern for the data communication experts. Cryptography and steganography are the most widely used techniques to overcome this threat. Steganography is the art of hiding the existence of the communication message before sending it to the receiver. In this paper it is proposed to use Discrete Fractional Fourier transform (DFrFT) as basic tool in image processing for data hiding technique called steganography. A comparative study of steganography in spatial domain and frequency domain based on Discrete Fourier transform (DFT), Discrete cosine transform (DCT), Discrete Fractional Fourier transform (DFrFT) is made. Peak signal to noise ratio (PSNR) and Mean square error (MSE) of cover image and stego image are used as performance index and it is found that among three frequency domain methods DFrFT based steganography gives better results in terms of PSNR and MSE and also provide more security for communication. MATLAB platform is used for simulation, results show that the proposed technique provides more security, better PSNR and lower MSE of cover image and stego image.

References
  1. Wang,H and Wang, S, "cyber warfare steganography vs steganalysis " communication of the ACM, 47:10, october 2004.
  2. Bracewell RN. The fourior transform and its application McGraw-Hill 1986.
  3. Morland,T steganography and steganalysis Leiden institute of advance Computing science.
  4. Anjali A. Shejul and Umesh L. Kulkarni, "A Secure Skin Tone based Steganography Using Wavelet Transform" International journal of Computer Theory and Engineering, vol. 3, No. 1, Feburary,2011, 1793-8201.
  5. John on, N. F. and Jajodia, S, "Exploring Steganography: Seeing the Unseen. " IEEE Computer , 31(2):26-34,Feb 1998.
  6. R. Fisher, S. Perkins, Awalker and Walfort "Fourier Transform".
  7. Rajiv Saxsena and Kulbir Singh" Fractional Fourier Transform: A Novel Tool for Signal Processing"Journal of Indian Inst Scn, Jan. -Feb. 2005,85,11-26.
  8. Luis B. Almeida, " The Fractional Fourier Transform and Time Frequency Representation" IEEE transactions on signal processing, vol 42, no. 11, November 1994.
  9. I. S. Yetik, M. A. Kutay, H. M. Ozktas," Image representation and compression with fractional fourier transform", Opt Communication. 197(2001)275-278.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Cryptography Discrete Fourier transform Discrete cosine transform Discrete fractional Fourier transform.