We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

An Optimized Trade-off Decomposition Steganography Algorithm

by Mazhar Tayel, Hamed Shawky
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 86 - Number 5
Year of Publication: 2014
Authors: Mazhar Tayel, Hamed Shawky
10.5120/14981-3187

Mazhar Tayel, Hamed Shawky . An Optimized Trade-off Decomposition Steganography Algorithm. International Journal of Computer Applications. 86, 5 ( January 2014), 19-23. DOI=10.5120/14981-3187

@article{ 10.5120/14981-3187,
author = { Mazhar Tayel, Hamed Shawky },
title = { An Optimized Trade-off Decomposition Steganography Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 86 },
number = { 5 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 19-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume86/number5/14981-3187/ },
doi = { 10.5120/14981-3187 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:03:25.557447+05:30
%A Mazhar Tayel
%A Hamed Shawky
%T An Optimized Trade-off Decomposition Steganography Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 86
%N 5
%P 19-23
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper a modified Steganography algorithm is proposed. A fuzzification is performed in the message channel to compress the decomposed coefficients before embedding in the cover-image to get a new Stego-image. A relative embedding strength factor (ESF) is used for embedding the secret in the cover-image. The well known metrics (MSE, PSNR, Cor. and Entropy) were used to evaluate quality of the modified algorithm. Also, the trade-off factor was introduced to determine an optimum value for the ESF to get an acceptable degradation in the Stego-image. In addition, the reconstruction algorithm mentioned in previous paper was modified using the optimum value of the ESF. Comparisons show improved results w. r. t. other algorithms.

References
  1. Nuno Roma, Leonel Sousa "A tutorial overview on the properties of the discrete cosine transform for encoded image and video processing" Rua Alves Redol, Lisboa – Portugal, February 2011.
  2. Ekta Walia, Payal Jain, Navdeep "An Analysis of LSB & DCT based Steganography " Global Journal of Computer Science and Technology, April 2010.
  3. Abbas Cheddad , Joan Condell, Kevin Curran, Paul Mc Kevitt" Digital image steganography: Survey and analysis of current methods " www. elsevier. com/locate/sigpro Signal Processing 2010.
  4. Hardik Patel, Preeti Dave " Steganography Technique Based on DCT Coefficients" International Journal of Engineering Research and Applications, Jan-Feb 2012.
  5. Hossein Malekmohamadi and Shahrokh Ghaemmaghami" stegoanalsis of lsb based image Steganography using spatial and frequency domain features" IEEE 2009.
  6. A. Nag, S. Biswas, D. Sarkar, P. P. Sarkar "A novel technique for image steganography based on Block-DCT and Huffman Encoding", International Journal of Computer Science and Information Technology, June 2010.
  7. Matus Jokay — Tomas Moravc?k " Image-Based JPEG Steganography", Tatra Mt. Math. Publ. 2010.
  8. Orea flores, M. A. acivedo "wavelet and discreet transforms for insetting information into BMB image ", July 2006.
  9. Mazhar Tayel, Alaa Hafez, Hamed Shawky "A New Hybrid Fuzzy-Decomposed Full Capacity Stego-System " under publication in IEEE Aerospace Conference 2014.
  10. George Corser," Entropy as an Estimate of Image Steganography" Oakland University Rochester, USA 2013, gpcorser@oakland. edu.
  11. Nedal M. S. Kafri and Hani Y. Suleiman "Bit-4 of Frequency Domain-DCT Steganography Technique" IEEE, 2009.
  12. Deepak Singla1, Rupali Syal "Data Security Using LSB & DCT Steganography in Images ", International Journal of Computational Engineering Research/ IJCER , Mar-Apr 2012.
  13. Blossom Kaur, Amandeep Kaur, Jasdeep Singh" steganographic approach for hiding image in DCT domain" IJAET, July 2011.
  14. Mazhar Tayel, Hamed Shawky, Alaa El-Din Sayed Hafez "New Chaos Steganography algorithm for Hiding Multimedia Data" advanced communication technology (ICACT), 2012.
  15. Mazhar Tayel, Alaa Hafez, Hamed Shawky," A Hybrid Chaos- Fuzzy –Threshold Steganography Algorithm for Hiding Secure Data" ICACT Transactions on Advanced Communications Technology (TACT), Jan. 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Cover-image Secret-message Decomposition Fuzzy set