DCT based Steganographic Evaluation parameter analysis inFrequency domain by using modified JPEG luminanceQuantization Table

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1

Abstract

 Abstract : Steganography is the process of hiding one file inside another such that others can neither identifythe meaning of the embedded object, nor even recognize its existence. In this paper we want to increase thecapacity and performance of DCT based steganography by using modified JPEG quantization table embeddingtechnique in frequency domain. Our experimental results show that the proposed method will provide a betterresult in terms of some evaluation criteria named Peak Signal to noise ratio, square of error between cover &stego image, maximum no of bits that can be embedded in a cover image with a negligible probability ofdetection by an adversary of steganography system. Our proposed method shows that after modification offrequency values in default JPEG quantization table we can be able to increase the image quality by increasingthe value of Peak signal to noise ratio, capacity and also by decreasing mean square error of embedded image.So that’s why when we try to extract hidden data from stego image in receiving end we just get almost exacthidden data with less error possibilities. In our proposed method we first create modified default (8x8)quantization table from default 8X8 traditional JPEG quantization table and then by using the table we can also try to modify embedding as well as extracting algorithm in frequency domain steganography. It has been foundthat capacity which is the amount of information embedding in color images increases as the number ofmodified quantized DCT coefficients increases. So more data can be embedded in this innovative approach.

Authors and Affiliations

Sourish Mitra , Moloy Dhar , Ankur Mondal , Nirupam Saha , Rafiqul Islam

Keywords

Related Articles

 An Architecture to Achieve Anonymity and Traceability

 Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. On the...

 An Improvement on Route Recovery by Using Triangular Fuzzy  Numbers on Route Errors in MANET

 Based on mobile nature in MANET, there is no doubt that all routing protocols have some route errors. Usually, routing protocols try to recover a route after a route error has been happened on an exact route &nbs...

Establishing Point to Point Connections Among IoT Devices Over the Internet

The rapid growth in the number of devices connected to the internet, other than computers, has proposed the Internet of Things (IoT) era. These devices make use of the high availability of internet connection to intercha...

 IPv6: Threats Posed By Multicast Packets, Extension Headers  and Their Counter Measures

 Security issues concerning the spreading Internet Protocol version 6 (IPv6) is one of the major issues in the world of networking today. Since it is not the default network protocol deployed nowadays (but  s...

 Communist Manifesto Marx’s Published Work (1818-1883):A Critique

 This study titled “Communist Manifesto; Marx’s Published Work (1818-1883): A critique has been carried out to briefly examine the biography of Marx, his philosophical ideas and intellectual role, as the most great...

Download PDF file
  • EP ID EP137460
  • DOI -
  • Views 102
  • Downloads 0

How To Cite

Sourish Mitra, Moloy Dhar, Ankur Mondal, Nirupam Saha, Rafiqul Islam (2015).  DCT based Steganographic Evaluation parameter analysis inFrequency domain by using modified JPEG luminanceQuantization Table. IOSR Journals (IOSR Journal of Computer Engineering), 17(1), 68-74. https://www.europub.co.uk/articles/-A-137460