JPEG Image Steganography based on Coefficients Selection and Partition

Full Text (PDF, 1154KB), PP.14-22

Views: 0 Downloads: 0

Author(s)

Arshiya Sajid Ansari 1,* Mohammad Sajid Mohammadi 2 Mohammad Tanvir Parvez 2

1. Noida International University, Department of Computer Science and Engineering NCR Delhi Noida, India

2. Qassim University, Computer Engineering Department, Qassim, Saudi Arabia

* Corresponding author.

DOI: https://doi.org/10.5815/ijigsp.2017.06.02

Received: 17 Feb. 2017 / Revised: 25 Mar. 2017 / Accepted: 8 May 2017 / Published: 8 Jun. 2017

Index Terms

JPEG Image Steganography, Partition Scheme, Indicator Sequence, Encoded Shared Key

Abstract

In this paper, we propose a novel JPEG image Steganography algorithm based on partition schemes on image coefficient values. Our method selects the AC and DC coefficients of a JPEG image according to a channel selection method and then identifies appropriate coefficients to store the secret data-bits. As opposed to other reported works, in our algorithm each selected coefficient can store a variable number of data-bits that are decided using the concept called ‘Partition Scheme’. Experimental results indicate the suitability of the proposed algorithm as compared to other existing methods. 

Cite This Paper

Arshiya Sajid Ansari, Mohammad Sajid Mohammadi, Mohammad Tanvir Parvez,"JPEG Image Steganography based on Coefficients Selection and Partition", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.9, No.6, pp.14-22, 2017. DOI: 10.5815/ijigsp.2017.06.02

Reference

[1]Pooja Rai, Sandeep Gurung, M K hose, (March 2015),"Analysis of Image Steganography Techniques", International Journal of Computer Applications, ISSN 0975-8887, Volume 114, Issue 1, pp. 11 – 17. 

[2]Hemalatha, S., U. Dinesh Acharya, A. Renuka, and Priya R. Kamath, (February 2013)."A secure and high Capacity image steganography technique. " Signal & Image Processing An international journal (SIPIJ)), Vol No 4:83. 

[3]Thangadurai, K., & Sudha Devi, G. (January 2014). “An analysis of LSB based image steganography techniques”. In Computer Communication and Informatics (ICCCI), International Conference on (pp. 1-4) IEEE. 

[4]Kaur, Sukhpreet, Sunny Bansal, and Rakesh K. Bansal. (2014) "Steganography and classification of image steganography techniques." In Computing for Sustainable Global Development (INDIACom), International Conference on, pp. 870-875. IEEE. 

[5]Zhang Y, Luo X, Yang C, Ye D, Liu F. (August 2015) “A JPEG-comparison Resistant Adaptive Steganography based on the Relative relationship between DCT coefficients”,10th international conference on Availability and Security on (pp. 461-466). IEEE.

[6]Guo, L., Ni, J. and Shi, Y.Q., (2014).” Uniform embedding for efficient JPEG steganography”. Information Forensics and Security, IEEE Transactions on, 9(5), pp.814-825.

[7]Wang, C. and Ni, J, (2012), March. “An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients”. In Acoustics, Speech and Signal Processing (ICASSP), IEEE International Conference (pp. 1785-1788). IEEE.

[8]Yoon, Sang Moon, and Hae-Yeoun Lee. (2015) "Security Enhancement of JPEG2000 Steganography with Prediction of Code-block Noise Variance Changes". International Information Institute (Tokyo). Information 18.5 (A): 1847. 

[9]Sathisha, N., Babu, K. S., Raja, K. B., & Venugopal, K. R. (March 2015). “Mantissa replacement steganography using LWT”. In Signal Processing, Communication and Networking (ICSCN), 3rd International Conference on (pp. 1-7). IEEE.

[10]Darvish Morshedi Hosseini, M., & Mahdavi, M. (September 2015). “Modification in spatial, extraction from transform: A new approach for JPEG steganography”. In Information Security and Cryptology (ISCISC), 12th International Iranian Society of Cryptology Conference on (pp. 134-140). IEEE.

[11]Chang, Chin-Chen, Chia-Chen Lin, Chun-Sen Tseng, and Wei-Liang Tai. (2007),"Reversible hiding in DCT-based compressed images." Information Sciences 177, no. 13- 2768-2786.

[12]Parvez, Mohammad Tanvir, and Adnan Abdul-Aziz Gutub. (2011) "Vibrant color image steganography using channel differences and secret data distribution." Kuwait J Sci Eng 38, no. 1B: 127-142.

[13]Luo, W., Heileman, G. L., & Pizano, C. E. (2002). “Fast and robust watermarking of JPEG files. In Image Analysis and Interpretation”. Proceedings. Fifth IEEE Southwest Symposium on (pp. 158-162). IEEE.

[14]Hiney, Jason, Tejas Dakve, Krzysztof Szczypiorski, and Kris Gaj.(2015) "Using Facebook for Image Steganography". In Availability, Reliability, and Security (ARES), 10th Intl. Conference on, pp. 442-447. IEEE

[15]Internet users: http://www.internetlivestats.com/internet-users, accessed July 1, 2016.

[16]JPEG Toolbox: http://www.philsallee.com, accessed Nov 10, 2015.

[17]Ajeeshvali, N & Rajasekhar, B. (2012). “Steganography based on integer wavelet transform and bicubic interpolation”, International Journal of Image, Graphics and Signal Processing (IJIGSP), 4(12), 26.