DCT based Steganographic Evaluation parameter analysis inFrequency domain by using modified JPEG luminanceQuantization Table
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1
Abstract
Abstract : Steganography is the process of hiding one file inside another such that others can neither identifythe meaning of the embedded object, nor even recognize its existence. In this paper we want to increase thecapacity and performance of DCT based steganography by using modified JPEG quantization table embeddingtechnique in frequency domain. Our experimental results show that the proposed method will provide a betterresult in terms of some evaluation criteria named Peak Signal to noise ratio, square of error between cover &stego image, maximum no of bits that can be embedded in a cover image with a negligible probability ofdetection by an adversary of steganography system. Our proposed method shows that after modification offrequency values in default JPEG quantization table we can be able to increase the image quality by increasingthe value of Peak signal to noise ratio, capacity and also by decreasing mean square error of embedded image.So that’s why when we try to extract hidden data from stego image in receiving end we just get almost exacthidden data with less error possibilities. In our proposed method we first create modified default (8x8)quantization table from default 8X8 traditional JPEG quantization table and then by using the table we can also try to modify embedding as well as extracting algorithm in frequency domain steganography. It has been foundthat capacity which is the amount of information embedding in color images increases as the number ofmodified quantized DCT coefficients increases. So more data can be embedded in this innovative approach.
Authors and Affiliations
Sourish Mitra , Moloy Dhar , Ankur Mondal , Nirupam Saha , Rafiqul Islam
An Efficient Content Based Image Retrieval System
Abstract : Content based image retrieval is an active research issue that had been famous from 1990s till present. The main target of CBIR is to get accurate results with lower computational time. This paper discus...
Comparative Study of AODV, FSR and IERP on MANET usingGrid topology
Abstract: Over the recent many of years, the use of wireless networks has become very popular. A MANET is acollection of wireless mobile nodes without the use of any fixed network infrastructure or centralizedadministrat...
Towards a new ontology of the Moroccan Post-baccalaureatelearner profile for the E-orientation system “MMSyOrientation”
Abstract: Today E-orientation systems are interested in helping learners to choose a suitable branch to theirskills and preferences. In this context the research center within the University Hassan II Mohammedia AinChock...
Brain Bridge: A Comparative Study between Database Querying and Human Memory Querying
The human memory is always been subject to many innovations and research since a very long time. As far as our knowledge exceeds, it is the fastest information retrieval system present. Further, the database &nbs...
A Novel Approach for Workload Optimization and ImprovingSecurity in Cloud Computing Environments
Abstract: This paper discusses a propose cloud infrastructure that combines On-Demand allocation ofresources with improved utilization, opportunistic provisioning of cycles from idle cloud nodes to otherprocesses.B...