Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 5397082, 14 pages
Research Article

A Secure Steganographic Algorithm Based on Frequency Domain for the Transmission of Hidden Information

1Department of Basic Sciences, Granma University, Bayamo, Cuba
2Departamento de Ciencias Matemáticas y Físicas, Casilla 15 D, Universidad Católica de Temuco, Temuco, Chile

Correspondence should be addressed to A. Soria-Lorente; uc.oc.gdu@lairosa

Received 13 September 2016; Revised 1 December 2016; Accepted 20 December 2016; Published 1 March 2017

Academic Editor: Barbara Masucci

Copyright © 2017 A. Soria-Lorente and S. Berres. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


This contribution proposes a novel steganographic method based on the compression standard according to the Joint Photographic Expert Group and an Entropy Thresholding technique. The steganographic algorithm uses one public key and one private key to generate a binary sequence of pseudorandom numbers that indicate where the elements of the binary sequence of a secret message will be inserted. The insertion takes eventually place at the first seven AC coefficients in the transformed DCT domain. Before the insertion of the message the image undergoes several transformations. After the insertion the inverse transformations are applied in reverse order to the original transformations. The insertion itself takes only place if an entropy threshold of the corresponding block is satisfied and if the pseudorandom number indicates to do so. The experimental work on the validation of the algorithm consists of the calculation of the peak signal-to-noise ratio (PSNR), the difference and correlation distortion metrics, the histogram analysis, and the relative entropy, comparing the same characteristics for the cover and stego image. The proposed algorithm improves the level of imperceptibility analyzed through the PSNR values. A steganalysis experiment shows that the proposed algorithm is highly resistant against the Chi-square attack.