Robust Spread Spectrum Steganography Based on the Nonuniform DCT Characteristic

Article Preview

Abstract:

In existing image hiding Spread Spectrum (SS) algorithm a reduction of scaling parameter is employed to improve imperceptibility but may lead to an increase in secret information extraction errors. A robust SS steganography, based on the Nonuniform Discrete Cosine Transform (NDCT) characteristic, is proposed. If the secret information, embedded in the NDCT coefficient matrixes of every N×N host image, is a real symmetric matrix, the difference matrix between stego-image and host image is also a real symmetric matrix. Due to the NDCT characteristic above, based on some corresponding change of stego-image, the proposed robust SS algorithm can improve imperceptibility of stego-image and the scaling parameter was not reduced. Simulation results verify the feasibility and validity of the algorithm.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 225-226)

Pages:

816-822

Citation:

Online since:

April 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt. Digital image steganography- Survey and analysis of current methods[C]. Signal Processing, Vol.90, No.3, March 2010:pp.727-752

DOI: 10.1016/j.sigpro.2009.08.010

Google Scholar

[2] Fabien A.P. Petitcolas; Ross J.Anderson; Markus G.Kuhn. Information hiding - a survey[C]. Proceeding of the IEEE, VOL.87, NO.7, JULY 1999:pp.1062-1077

Google Scholar

[3] Neil F. Johnson, Sushil Jajodia. Steganalysis of Images Created using Current Steganography Software[C].Workshop on Information Hiding Processing, April 1998:pp.273-276

DOI: 10.1007/3-540-49380-8_19

Google Scholar

[4] Zhao X F, Xia B B, Deng Y. Strengthening QIM-based watermarking by non-uniform discrete transform[C].Lecture Notes in Computer Science, 2008:pp.309-324

DOI: 10.1007/978-3-540-88961-8_22

Google Scholar

[5] Chen B. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding[C]. 2000 IEEE International Symposium on Information Theory. 2000: pp.1423-1443.

DOI: 10.1109/isit.2000.866336

Google Scholar

[6] I.J. Cox, J.Kilian, T.Leighton and T.Shamoon. Secure spread spectrum watermarking for multimedia[C]. IEEE Transactions on Image Processing. Piscataway, NJ, United States; IEEE Press, 1997: pp.1673-1687.

DOI: 10.1109/83.650120

Google Scholar

[7] ZHAO Hong yi. A Color Image Hiding and Restoring Scheme [J].Journal of Optoelectronics. laser. 2003(02):pp.178-181

Google Scholar

[8] LI Qing-zhong, YU Chen, CHU Dong-sheng. Robust Color Image Hiding Method in DCT Domain [J]. Application Research of Computers. 2007(01):pp.188-190.

Google Scholar

[9] Chen Weichao, Ao Jun, Ma Chunbo. DCT Domain Image Hiding Algorithms Based on Error Analysis [J]. Ship Electronic Engineering. 2010(08):138-141

Google Scholar

[10] Deng Yi, Zhao Xian-feng, Feng Deng-guo. Quantization Index Modulation Steganography Based on Nonuniform DCT[J]. Journal of Electronics & Information Technology.2010(02):pp.321-328

DOI: 10.3724/sp.j.1146.2008.01399

Google Scholar