Corpus ID: 18654910

Security Using LSB & DCT Steganography In Images

@inproceedings{Singla2012SecurityUL,
  title={Security Using LSB \& DCT Steganography In Images},
  author={Deepak Singla and Rupali Syal},
  year={2012}
}
Abstract Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists.In this paper, we propose a LSB & DCT-based steganographic method for hiding the data. Each bit of data is embedded by altering the least significant bit of low frequency DCT coefficients of cover image blocks. There are some techniques to utilizes the idea… Expand
1 Citations

Figures and Tables from this paper

PERFORMANCE ENHANCEMENT OF A TRANSFORM DOMAIN BASED STEGANOGRAPHIC TECHNIQUE USING SEGMENTATION
TLDR
As privacy concerns continue to develop along with the digital communication domain, steganography will undoubtedly play a growing role in society and it is important that the authors are aware of digital Steganography technology and its implications. Expand

References

SHOWING 1-10 OF 29 REFERENCES
Bit-4 of frequency domain-DCT steganography technique
TLDR
A new method of steganography based on embedding message bits in the 4th bit of the coefficients of a transform domain, such as the DCT and Wavelet, of an image, which provides better resistance against steganalysis processes is described. Expand
An Analysis of LSB & DCT based Steganography
TLDR
Analysis of Least Significant Bit (LSB) based Steganography and Discrete Cosine Transform (DCT) basedSteganography is presented, an implementation of both methods and their performance analysis has been done. Expand
An overview of image steganography
TLDR
This paper intends to give an overview of image steganography, its uses and techniques, and attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which Steganographic techniques are more suitable for which applications. Expand
Practical steganalysis of digital images: state of the art
TLDR
This paper classify and review current stego-detection algorithms that can be used to trace popular steganographic products, and presents some new results regarding the previously proposed detection of LSB embedding using sensitive dual statistics. Expand
A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion
Summary A new steganography approach for data hiding is proposed. This approach uses the Least Significant Bits (LSB) insertion to hide data within encrypted image data. The binary representation ofExpand
Steganalysis for Markov Feature of Difference Array in DCT Domain
  • Zhiping Zhou, Maomao Hui
  • Mathematics
  • 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery
  • 2009
In this paper, an effective steganalysis method based on Markov transition matrix is proposed to attacking the advanced JPEG steganographic schemes. As the horizontal and vertical scan modes failedExpand
Steganalysis of JPEG Images: Breaking the F5 Algorithm
TLDR
A steganalytic method that can reliably detect messages (and estimate their size) hidden in JPEG images using the steganographic algorithm F5 is presented. Expand
An Overview of Steganography
Steganography is a useful tool that allows covert transmission of information over an overt communications channel. Combining covert channel exploitation with the encryption methods of substitutionExpand
Blind detection for JPEG steganography
TLDR
A blind steganalytic scheme is proposed to effectively detect JPEG steganography and demonstrates that the proposed scheme provides the best detection accuracy comparing with the similar steganallytic schemes reported recently. Expand
Performance study of common image steganography and steganalysis techniques
TLDR
It is found that the performance of steganalysis techniques is affected by the JPEG quality factor, and JPEG recompression artifacts serve as a source of confusion for almost all steganalysed techniques. Expand
...
1
2
3
...