Secure Image Steganography Algorithm Based on DCT with OTP Encryption (original) (raw)
Related papers
Secure and Secret Transmission of Messages Using the DCT Technique of Steganography
2014
Steganography is the art and technique for hiding the secret message in some cover. The cover may be an image or audio or video. Similarly, the message to be sent may be anything like some form of text, any form of the image etc. There are many techniques available for doing the same. In this paper, we are trying to present the new technique which is Discrete Cosine Transformations and the Vector Quantization for improving the capacity of the cover medium.
A Secure Image Steganography Using Advanced Encryption Standard and Discrete Cosine Transform
Journal of Information Security, 2019
Cryptography and Steganography are two prominent techniques to obtain secure communication over the shared media like the Internet. Steganogra-phy is slightly ahead of cryptography because of its stealthy characteristics. In this paper, a new method has been proposed which combines cryptography and steganography to ensure even more secure communication. The Advanced Encryption Standard (AES) in spatial domain of the carrier/cover image and Least Significant Bit (LSB) replacement in the transformed domain of the same image has been used after performing a Discrete Cosine Transform (DCT) on the pixels. An additional layer of security has been introduced by applying XOR operation on the AES encrypted message with the pixel values of the carrier image. The Peak Signal to Noise Ratio (PSNR) of the proposed algorithm is better than most of the similar algorithms. With better PSNR, the proposed method depicts a three layer of security of the information and error free decryption.
A Review Of Image Security With Steganography Using Dct Coefficient And Encryption
2016
In the mid 1998s the rise of the internet & multimedia techniques has prompted increasing interest in hiding data in digital media. Early research concentrated on watermarking to protect copyrighted multimedia products. In today's growing world Image data security is the essential portion in communication and multimedia world .The least significant-bit (LSB) based technique is one of the popular for steganography. Medium integrity is an important issue in steganography, whenever one media is hidden into other the originality of cover media should not affect. Image Security with Steganography using DCT Coefficient and Encryption providing security of data & helps to avoid third party access of data is the challenging world. https://journalnx.com/journal-article/20150087
Concealing Encrypted Messages using DCT in JPEG Images
Steganography is an important area of research in recent years involving a number of applications. It is the science of embedding information into the cover image viz., text, video, and image (payload) without causing statistically significant modification to the cover image. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected. In this paper we present an image based steganography that combines Discrete Cosine Transform (DCT), and compression techniques with LSB techniques on raw images to enhance the security of the payload. Initially the coverimage is transformed from spatial domain to the frequency domain using DCT. The image is then quantized. and LSB technique is used to insert in pixels specified according to a range.
Survey:Image Steganography Using DCT Technique
Steganography is defined as the study of invisible communication. Steganography usually deals with the ways of hiding the existence of the communicated data in such a way that it remains confidential. It maintains secrecy between two communicating parties. In image steganography, secrecy is achieved by embedding data into cover image and generating a stego-image. There are different types of steganography techniques each have their strengths and weaknesses. Using Steganography techniques on Stego image we can improve the security. For improving second level security we can also apply blowfish algorithm on stego image. so that the result in improvement of security in terms of execution can be achieved.
A Secure DCT Image Steganography based on Public-Key Cryptography
Abstract—Steganography is the method of hiding information in a multimedia carrier. The carrier(cover) can be an image, audio or video. In this case image is taken as the carrier and the hidden information or secret information. So here dealing with image steganography. Gray level image is taken as both cover and secret images. This paper implements the steganography in frequency domain. A DCT transformation technique is used to convert the cover image from spatial to frequency domain. To provide more security public key cryptography is combined with steganography. A public key encryptionn algorithm RSA is used here. Secret image is encrypted before embedding in the cover image. PSNR value is calculated for both stego and extracted image. An analysis shows that high PSNR value is obtained when the size of secret image is less compared to the size of cover image.
A Good Performance OTP Encryption Image based on DCT-DWT Steganography
TELKOMNIKA (Telecommunication Computing Electronics and Control), 2017
The security aspect is very important in data transmission. One way to secure data is with steganography and cryptography. Surely research on this should continue to be developed to improve security. In this paper, we proposed a combination of steganographic and cryptographic algorithms for double protection during data transmission. The selected steganographic algorithm is the use of a combination of DCT and DWT domain transformations. Because the Imperceptibility aspect is a very important aspect of steganographic techniques, this aspect needs to be greatly improved. In the proposed method of DCT transformation first, proceed with DWT transformation. From the experimental results obtained better imperceptibility quality, compared with existing methods. To add OTP message security applied algorithm to encrypt the message image, before it is inserted. This is evidenced by experiments conducted on 20 grayscale images measuring 512x512 with performance tests using MSE, PSNR, and NC. Experimental results prove that DCT-DWT-OTP generates PNSR more than 50 dB, and NC of all images is 1.
High Security Steganography Model Based on DWT, DCT and RSA
The steganography is the science of concealing secret information in media files (i.e image, text, audio, etc.), so that such information is not noticeable by the eavesdropper. There are many techniques are used to hide secret information to achieve high quality of stego image and high embedding capacity. Also many challenges in steganography including the attempts to reveal these secret information that has been hidden. A plenty of researches have tried to develop a lot of techniques and algorithms to find solutions to this problem.This paper proposed high security model for hiding image (secret image) in another image (cover image), where more than one algorithm has been utilized such as: Discrete Wavelet Transform (DWT) algorithm and applied DCT algorithm to compression the secret image and provide more space for hiding secret image and applied RSA algorithm to encryption and provide more secure. Certain quality metrics such as peak signal to noise ratio (PSNR) and Mean Square Error (MSE) also compression ratio (C.R) have been used to calculate the quality of the this model. The proposed model is implemented using Visual basic.6 programming language.
A proposed Technique for Information Hiding Based on DCT
International Journal of Advancements in Computing Technology, 2010
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, any suspicion of the hidden text The proposed system depends upon preparing the image data for the next step (DCT Quantization) through steganographic process and using two levels of security: the RSA algorithm and the digital signature, then storing the image in a JPEG format. In this case, the secret message will be looked as plaintext with digital signature while the cover is a coloured image. Then, the results of the algorithm are submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm and its activity. Thus, the proposed algorithm for this research can be divided into two main parts: hiding the text of the sender, and extracting it by the receiver. Moreover, part can be divided into many procedures done by the program Delphi 5.
Image Steganography using DCT, DST, Haar and Walsh Transform
International Journal of Computer Applications, 2013
Steganography is a means of hiding information within a more obvious form of communication. It exploits the use of host data to hide a piece of information in such a way that it is imperceptible to human observer. The major goals of effective steganography are High Embedding Capacity, Imperceptibility and Robustness. In this paper, the transform domain techniques of Image steganography have been discussed. The Orthogonal Transforms tested were DCT, DST, Haar and Walsh transform. The resultant stego images contained 4 different message images giving a 50% embedding capacity using these transforms. The message images have been normalized and then transformed to reduce the embedding error. The pixel values have been divided by a constant value of 255 to bring all the values into the range of 0.1 to 1.0.Therefore, High Embedding capacity has been achieved through the use of orthogonal transforms using the technique discussed in this paper. The paper compares image steganography schemes that hide secret message into simple orthogonal transforms such as DCT [Discrete Cosine Transform], DST [Discrete Sine Transform], Hartley, Walsh and Haar. The experimental results show that using DCT transform for image steganography achieve much better results as compared to DST, Walsh and Haar.