eISSN:2278-5299

International Journal of Latest Research in Science and Technology

DOI:10.29111/ijlrst   ISRA Impact Factor:3.35

A News Letter Sign UP!
Colour Image Steganography Using Modified JPEG Quantization Technique

Research Paper Open Access

International Journal of Latest Research in Science and Technology Vol.1 Issue 1, pp 1-5,Year 2012

COLOUR IMAGE STEGANOGRAPHY USING MODIFIED JPEG QUANTIZATION TECHNIQUE

Sunny Sachdeva, Anurag Sharma, Vijay Gill

Correspondence should be addressed to :

Received : 15 May 2012; Accepted : 16 June 2012 ; Published : 30 June 2012

Share
Download 127
View 185
Article No. 10000
Abstract

Digital images are the most common cover files used for steganography. In this paper , a new steganography method called JMQT based on modified quantization table is proposed. This steganography method is compared with steganography method JPEG-JSteg. Two performance parameters namely capacity and stego size has been compared. As a result capacity increases and stego size increases. So JMQT provides better capacity and JPEG-JSteg provides better stego-size.

Key Words   
Steganography,data hiding, capacity, imperceptibility, chrominance, luminance, stego image
Copyright
References
  1. N. EL-Emam, ”Embedding a Large Amount of Information Using High Secure Neural Based Steganography Algorithm,” International Journal of Information and Communication Engineering ,4:2 ,2008.
  2. He, S. Tang and TingtingWu, “An Adaptive Image Steganography Based on Depth-varying Embedding,” Congress on Image and Signal Processing, vol.5, 2008, pp. 660-663, DOI 10.1109/CISP.2008.189.
  3. G.Yu1, E.J.Yoon2, S.H. Shin1 and K.Y. Yoo, “A New Image Steganography Based on 2k Correction and Edge-Detection”, Fifth International Conference on Information Technology: New Generations 978-0-7695-3099-4/08, April 2008.
  4. G. Sahoo1 and R. K. Tiwari2, “Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization,” IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.1, January 2008.
  5. N. EL-Emam, “Hiding a Large Amount of Data with High Security Using Steganography Algorithm,” Journal of Computer Science, vol.3(4), pp. 223-232, 2007, ISSN 1549-3636.
  6. S .K. Moon , R.S. Kawitkar, “Data Security using Data Hiding,” International Conference on Computational Intelligence and Multimedia Applications 2007.
  7. Y. Yang, “Color Image Steganography based on Module Substitutions,” Third International Conference on International Information Hiding and Multimedia Signal Processing Year of Publication: 2007 ISBN:0-7695-2994-1.
  8. -C. Wu, N.-I. Wu, C.-S. Tsai and M.-S. Hwang, “ Image steganographic scheme based on pixel-value differencing and LSB replacement methods,” IEEE Proc.-Vis. Image Signal Process., Vol. 152, No. 5, October 2005.
  9. W. Tseng and C.C.Chang, “Steganography Using JPEG-Compressed Images,” Proceedings of the Fourth International Conference on Computer and Information Technology (CIT’2004). Sept. 2004.
  10. C. Lou and C.H. Sung, “A Steganographic Scheme for Secure Communications Based on the Chaos and Euler Theorem,” IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 6, NO. 3, JUNE 2004.
  11. Rabah, “Steganography-The Art of Hiding Data,” Information Technology Journal, vol.3(3), pp. 245-269, 2004,ISSN 1682-6027.
  12. M Thampi, “Information Hiding Techniques: A Tutorial Review,” ISTE-STTP on Network Security & Cryptography, LBSCE 2004.
  13. Curran, K. Bailey, “An Evaluation of Image Based Steganography Methods,” International Journal of Digital Evidence Fall 2003, Volume 2, Issue 2.
  14. Fridrich, M. Goljan, Binghamton, “ Practical Steganalysis of Digital Images – State of the Art,” Conference , San Jose CA , ETATS-UNIS (21/01/2002).
  15. M. Marvel, Member, C. G. Boncelet and C. T. Retter, “Spread Spectrum Image Steganography,” IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 8, NO. 8, AUGUST 1999.
To cite this article

Sunny Sachdeva, Anurag Sharma, Vijay Gill , " Colour Image Steganography Using Modified Jpeg Quantization Technique ", International Journal of Latest Research in Science and Technology . Vol. 1, Issue 1, pp 1-5 , 2012


Responsive image

MNK Publication was founded in 2012 to upholder revolutionary ideas that would advance the research and practice of business and management. Today, we comply with to advance fresh thinking in latest scientific fields where we think we can make a real difference and growth now also including medical and social care, education,management and engineering.

Responsive image

We offers several opportunities for partnership and tie-up with individual, corporate and organizational level. We are working on the open access platform. Editors, authors, readers, librarians and conference organizer can work together. We are giving open opportunities to all. Our team is always willing to work and collaborate to promote open access publication.

Responsive image

Our Journals provide one of the strongest International open access platform for research communities. Our conference proceeding services provide conference organizers a privileged platform for publishing extended conference papers as journal publications. It is deliberated to disseminate scientific research and to establish long term International collaborations and partnerships with academic communities and conference organizers.