CFP last date
20 January 2025
Reseach Article

A Modified Approach of Image Steganography based on Block DCT and Huffman Encoding without Embedding Dictionary into Stego-Image

by Anil N. Bhure, Vaishali S. Jabade
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 94 - Number 8
Year of Publication: 2014
Authors: Anil N. Bhure, Vaishali S. Jabade
10.5120/16364-5774

Anil N. Bhure, Vaishali S. Jabade . A Modified Approach of Image Steganography based on Block DCT and Huffman Encoding without Embedding Dictionary into Stego-Image. International Journal of Computer Applications. 94, 8 ( May 2014), 24-27. DOI=10.5120/16364-5774

@article{ 10.5120/16364-5774,
author = { Anil N. Bhure, Vaishali S. Jabade },
title = { A Modified Approach of Image Steganography based on Block DCT and Huffman Encoding without Embedding Dictionary into Stego-Image },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 94 },
number = { 8 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 24-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume94/number8/16364-5774/ },
doi = { 10.5120/16364-5774 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:17:07.568228+05:30
%A Anil N. Bhure
%A Vaishali S. Jabade
%T A Modified Approach of Image Steganography based on Block DCT and Huffman Encoding without Embedding Dictionary into Stego-Image
%J International Journal of Computer Applications
%@ 0975-8887
%V 94
%N 8
%P 24-27
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Image Steganography is superimposing a secret image into a cover image such a way that perceptability and properties of cover image remains unchanged. In this paper proposing a modified approach of Image Steganography which is based on Block DCT and Huffman Encoding without inserting a Huffman table into stego image. In the proposed method embedded an encoded secret image (Huffman Table) to the transformed cover image (Block DCT) by ± 1 embedding method. To working on N x N block DCT transforming cover image. The experimental result shows that the modified approach gives better Steganography properties of stego image in terms of PSNR, correlation coefficient than the existing algorithm.

References
  1. Krenn J. R. 2004, "Steganography and Steganalysis ", http://www. krenn. nl/univ/cry/steg/article. pdf.
  2. Wang Huaiqing & Wang Shuozhong 2004, "Cyber warfare: Steganography vs. Steganalysis", Communications of the ACM, Vol. No 47, Issue. No 10, pp 72-82.
  3. N. F. Johnson and S. Katzenbeisser 2000, "A survey of steganographic techniques", in S. Katzenbeisser and F. Peticolas (Eds. ):Information Hiding, pp. 43-78.
  4. Weiss M. 2012, "Principles of steganography", http://www. math. ucsd. edu/~crypto/Projects/MaxWeiss/steganography. pdf.
  5. Ying Wang and Pierre Moulin 2003, "Steganalysis of Block-DCT Image Steganography", IEEE workshop on Statistical Signal Process.
  6. A. Nag, S. Biswas, D. Sarkar, P. P. Sarkar 2010, " A novel technique for Image Steganography based on Block-DCT and Huffman Encoding", International Journal of Computer Science and Information Technology Vol. No 2, Issue. No 3, pp 103-112.
  7. K. D. Chinchkhede, Govind Sharan Yadav, S. R Hirekhan, D. R Solanke 2011, " On the Implementation of FIR Filter with Various Windows for Enhancement of ECG signal," International Journal of Engineering Science and Technology, Vol. No 3, Issue. No 3, pp. 2031-2040.
  8. N. Provos and P. Honeyman 2003, "Hide and Seek: An Introduction to Steganography", IEEE: Security & Privacy, Vol. No 1, pp 32-44.
  9. Fridrich, J. 2010, "Steganography in Digital media: Priciples, Algorithms and Applications," Cambride University Press.
  10. Lisa M. Marvel, Charles G. Boncelet, Jr. , and Charles T. Retter 1999, "Spread Spectrum Image Steganography," IEEE Transactions on Image Processing, Vol. No 8, Issue. No 8, pp. 2031-2040.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Block DCT Huffman Encoding.