Multiple Image Steganography Using LSB DCT Technique
Multiple Image Steganography Using LSB DCT Technique
Multiple Image Steganography Using LSB DCT Technique
ISSN: 2278-0181
ICACT - 2016 Conference Proceedings
Annapurna D
Sajeevan K Professor,
Associate Professor, Department of CS&E,
Department of CS&E, PESIT South Campus,
PESIT South Campus, Bengaluru, India
Bengaluru, India
in Shaveta Mahajan et al. [13]. The major topic of all these B. Discrete Cosine Transform
papers are various techniques that embed the data.
Discrete Cosine Transform (DCT) [25] is used to
Least Significant Bit is one of the simple Spatial Domain transform the image from spatial domain to frequency
techniques and is commonly used technique to embed the domain. The cover image of size × is first divided into
data. [14] uses LSB technique to embed the data. The data 8×8 blocks and then DCT is applied on each block. DCT-II is
bits are embedded only in selected areas obtained using pixel used for two dimensional images of M×N. The equation for
selection filter. Immunity to noise and compression is poor DCT-II is given by:
using this method. Shailender Gupta et al. [15] uses one, two,
three and four LSBs to embed the data once it is encrypted.
But data embedded using this technique can be easily
decoded. LSB techniques are simple and easy to detect. The
robustness of these methods are low and hence other methods eq (2)
were explored. where
Transform domain techniques are more immune to noise
and variations. [17] proposes a DCT based technique where
bits are embedded in DCT coefficients which are below
certain threshold. Takeshi et al. [18] proposes a DCT based and
algorithm that embeds data with less distortion. A Shield
algorithm based on DCT to embed the data is proposed in
[19]. DCT, a transform domain technique is robust but the
for x=1 to 8 and y=1 to 8
amount of information that can be embedded using this
technique is less.
On applying DCT on a block of image matrix I, a matrix
An embedding technique that uses both LSB and DCT is K is obtained. Matrix I has pixels as its entries whereas
proposed in [20]. Analysis and results of LSB and DCT matrix K has DCT coefficients as its entry. The obtained
method is discussed in [21]. These methods use advantages of matrix K has higher values at the top left. This higher value
both LSB and DCT technique. indicates that it corresponds to lower frequencies and higher
signal energies. The values other than that are very small
In [22], a method to embed multiple images with bit plane
enough such that it can be neglected with no or less
slicing is proposed. The imperceptibility of this algorithm
distortion.
goes on decreasing as the payload capacity is increased.
DWT based method to hide multiple images is proposed in C. Quantization
[23]. This approach is susceptible to noise. In general, DCT
method is more robust and imperceptible compared to other Quantization [28] is done to compress the DCT
methods proposed. coefficients obtained in previous step. Since human eyes are
insensitive to high frequency components, these are made
zero using standard Quantization matrix [24] which is
III. PROPOSED METHOD
The main aim of this work is to maximize the payload
capacity without compromising imperceptibility. Proposed
method targets grayscale images. Up to eight images can be
embedded in a single image using the proposed technique
which is discussed in this section. Selection of images (III-A)
is discussed first, sub-sections III-B to III-F discusses the
proposed LSB-DCT technique for embedding and finally
extraction of hidden data is presented in III-G.
A. Image selection
When only one LSB of each DCT coefficients of cover
image of size M×N is used to embed the data, the amount of Quantization is done by dividing each values in matrix K
information that can be embedded in the cover image is M*N with corresponding values in quantization matrix Q. This will
bits. Considering each pixel is represented using eight bits, result in matrix P, which has the quantized DCT coefficients.
the ideal size of a single image that can be embedded is X×Y, P(i, j) = K(i, j) / Q(i, j) eq (3)
where
IV. EXPERIMENTAL RESULTS Table 2. PSNR values of extracted image for different
There are many factors that decide how good a capacity of cover image when Fig 3a is hidden.
Steganographic system is. We consider few of these to Payload Capacity MSE PSNR (dB)
analyze our method. Results with each of the factors 1 1.0000e-03 78.1308
considered are discussed in this section. 2 77.4396 29.2412
4 1.3406e+03 16.8577
A. Imperceptibility 8 4.7548e+03 11.3595
e f g h
Fig 3. (a)(b)(c)(d)(e)(f)(g)(h) Secret Images a
b c d e
a b
REFERENCES
[1] Michael E. Whitman, Herbert J. Mattord, “Principles of Information
Security,” 4th Edition.
[2] Ashish Kumar Kendhe, Himani Agarwal, “A Survey Report on Various
Cryptanalysis Techniques,” IJSCE, vol 3, Issue 2, 2013.
b c d e [3] Vinod Saroha, Suman Mor, Jyoti Malik, “A Review of Various
Techniques of Cryptanalysis,” IJARCSSE, vol 2, Issue 10, 2012.
Fig 6. (a)Stego image with Fig 3a to 3d embedded
[4] Jasleen Kour, Deepankar Verma, “Steganography Techniques – A
(b)(c)(d)(e) Extracted images from Fig 6a Review Paper,” IJERMT, vol-3, Issue 5, 2014.
[5] Pooja Rai, Sandeep Gurung, M.K. Ghose, “Analysis of Image
Steganography Techniques: A Survey,” International Journal of
Computer Applications (0975-8887), vol 114, No. 1, 2015.
[6] S.G.Shelke, S.K.Jagtap, “Analysis of Spatial Domain Image [16] Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica Fridrich,
Steganography Techniques,” IEEE International Conference on Ton Kalker, “Digital Watermarking and Steganography”, Morgan
Computing Communication Control and Automation (ICCUBEA), Kaufmann Publishers, 2nd Edition, 2008.
2015. [17] Hardik Patel, Preeti Dave, “Steganography Technique based on DCT
[7] Falesh M. Shelke, Ashwini A. Dongre, Pravin D. Soni, “Comparision Coefficients,” IJERA, vol. 2, Issue 1, 2012.
of different Techniques for Steganography in Images,” IJAIEM, vol 3, [18] Takeshi Ogihara, Daisuke Nakamura, Naokazu Yokoya, “Data
Issue 2, 2014. Embedding into Pictorial Images with Less Distortion Using Discrete
[8] Nan-I Wu, Chung-Ming Wang, Min-Shiang Hwang, “Data Hiding: Cosine Transform,” IEEE Proceedings of ICPR, 1996.
Current Status and Key Issues,” International Journal of Network [19] Deepika Bansal, Rita Chhikara, “An Improved DCT based
Security, vol 4, No. 1, pp. 1-9, January 2007. Steganography Technique,” IJCA, vol 102, No. 14, 2014.
[9] Chengjie Tu, Trac D. Tran, “Context-Based Entropy Coding of Block [20] Deepak Singla, Rupali Syal, “Data Security Using LSB & DCT
Transform Coeffiecients for Image Compression,” IEEE Transactions Steganography In Images”, IJCER, vol 2, Issue 2, 2012.
on Image Processing, vol 11, No. 11, 2002.
[21] Ekta Walia, Payal Jain, Navdeep, “An Analysis of LSB & DCT based
[10] R Poornima, R J Iswarya, “An Overview of Digital Image Steganography,” GJCST, vol 10, Issue 1, 2010.
Steganography,” IJCSES, vol 4, No. 1, 2013.
[22] H Faheem Ahmed, U Rizwan, “Embedding Multiple Images in an
[11] C.P.Sumathi, T.Santanam, G.Umamaheswari, “A Study of Various Image Using Bit Plane Slicing”, IJARCSSE, vol 3, Issue 1, 2013.
Steganographic Techniques Used for Information Hiding,” IJCSES, vol
4, No. 6, 2013. [23] Hemalatha S, U Dinesh Acharya, Renuka A, Priya R. Kamath, “A
secure and high capacity Image Steganography technique,” SIPIJ, vol
[12] Gurmeet Kaur, Aarti Kochhar, “Transform Domain Analysis of Image 4, No. 1, 2013.
Steganography,” IJSETT, 6(1): 29-37, 2013.
[24] Andrew B. Watson, “Image Compression Using the Discrete Cosine
[13] Shaveta Mahajan, Arpinder Singh, “A Review of Methods and Transform,” Mathematica Journal, 4(1), 1994.
Approach for Secure Stegnography,” IJARCSSE, vol 2, Issue 10, 2012.
[25] https://en.wikipedia.org/wiki/Discrete_cosine_transform.
[14] Rahul Joshi, Lokesh Gagnani, Salony Pandey, “Image Steganography
[26] https://en.wikipedia.org/wiki/Mean_squared_error.
With LSB,” IJARCET, vol 2, Issue 1, 2013.
[27] https://en.wikipedia.org/wiki/Peak_signal-to-noise_ratio.
[15] Shailender Gupta, Ankur Goyal, Bharat Bhushan, “Information Hiding
Using Least Significant Bit Steganography and Cryptography,” [28] Jessica Fridrich, “Steganography in Digital Media”, Cambridge
IJMECS, 6, 27-34, 2012. University Press, 2010.