Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 5397082, 14 pages
https://doi.org/10.1155/2017/5397082
Research Article

A Secure Steganographic Algorithm Based on Frequency Domain for the Transmission of Hidden Information

1Department of Basic Sciences, Granma University, Bayamo, Cuba
2Departamento de Ciencias Matemáticas y Físicas, Casilla 15 D, Universidad Católica de Temuco, Temuco, Chile

Correspondence should be addressed to A. Soria-Lorente; uc.oc.gdu@lairosa

Received 13 September 2016; Revised 1 December 2016; Accepted 20 December 2016; Published 1 March 2017

Academic Editor: Barbara Masucci

Copyright © 2017 A. Soria-Lorente and S. Berres. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Soria, R. Cumbrera, and Y. Fonseca, “Steganographic algorithm of private key on the domain of the cosine discrete transform,” Revista Cubana de Ciencias Informáticas, vol. 10, no. 2, pp. 116–131, 2016. View at Google Scholar
  2. G. Kumar and A. Rana, “Data hiding techniques in digital multimedia,” International Journal of Engineering Science Invention Research and Development, vol. 1, pp. 333–337, 2015. View at Google Scholar
  3. V. M. Ladwani and S. Murthy K, “A new approach to securing images,” IJARCCE: International Journal of Advanced Research in Computer and Communication Engineering, vol. 4, no. 1, pp. 224–227, 2015. View at Publisher · View at Google Scholar
  4. P. Lino Babu, J. John, B. D. Parameshachari, C. Muruganantham, and H. S. DivakaraMurty, “Steganographic method for data hiding in audio signals with LSB and DCT,” International Journal of Computer Science and Mobile Computing, vol. 2, pp. 54–62, 2013. View at Google Scholar
  5. K. S. Jenifer, G. Yogaraj, and K. Rajalakshmi, “LSB approach for video steganography to embed images,” International Journal of Computer Science and Information Technologies, vol. 5, no. 1, pp. 319–322, 2014. View at Google Scholar
  6. D. Wu and W. Tsai, “A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1613–1626, 2003. View at Publisher · View at Google Scholar
  7. S. Sachdeva, A. Sharma, and V. Gill, “Colour image steganography using modified JPEG quantization technique,” International Journal of Latest Research in Science and Technology, vol. 1, pp. 1–5, 2012. View at Google Scholar
  8. X. Liao, Q. Wen, and J. Zhang, “A steganographic method for digital images with four-pixel differencing and modified LSB substitution,” Journal of Visual Communication and Image Representation, vol. 22, no. 1, pp. 1–8, 2011. View at Publisher · View at Google Scholar
  9. T. Lu, C. Tseng, and J. Wu, “Dual imaging-based reversible hiding technique using LSB matching,” Signal Processing, vol. 108, pp. 77–89, 2015. View at Publisher · View at Google Scholar
  10. M. Kumar and M. Yadav, “Image steganography using frequency domain,” International Journal of Scientific and Technology Research, vol. 3, pp. 226–230, 2014. View at Google Scholar
  11. M. Amin, H. M. Abdullkader, H. M. Ibrahem, and A. S. Sakr, “A steganographic method based on DCT and new quantization technique,” International Journal of Network Security, vol. 16, no. 4, pp. 265–270, 2014. View at Google Scholar · View at Scopus
  12. S. Mitra, M. Dhar, A. Mondal, N. Saha, and R. Islam, “DCT based Stegano graphic Evaluation parameter analysis in Frequency domain by using modified JPEG luminance Quantization Table,” Journal of Computer Engineering, vol. 17, no. 1, pp. 68–74, 2015. View at Google Scholar
  13. S. Kalaivanan, V. Ananth, and T. Manikandan, “A survey on digital image steganography,” International Journal of Emerging Trends & Technology in Computer Science, vol. 4, no. 1, pp. 30–33, 2015. View at Google Scholar
  14. J. Mazumder and K. Hemachandran, “A high capacity and secured color image steganographic technique using discrete wavelet transformation,” International Journal of Computer Science and Information Technologies, vol. 4, no. 4, pp. 583–589, 2013. View at Google Scholar
  15. P. Patil and D. S. Bormane, “DWT based invisible watermarking technique for digital images,” International Journal of Engineering and Advanced Technology, vol. 2, no. 4, pp. 603–605, 2013. View at Google Scholar
  16. J. Mali, V. Sonawane, and R. Awale, “Image steganography using block level entropy thresholding technique,” Journal of Biological Systems, vol. 3, pp. 141–152, 2013. View at Google Scholar
  17. P. Praveenkumar, G. Ashwin, S. P. Kartavya Agarwal et al., “Rubik's Cube Blend with logistic map on RGB: a way for image encryption,” Research Journal of Information Technology, vol. 6, no. 3, pp. 207–215, 2014. View at Publisher · View at Google Scholar · View at Scopus
  18. R. Amirtharajan, V. Rajesh, P. Archana, and J. B. B. Rayappan, “Pixel indicates, standard deviates: a way for random image steganography,” Research Journal of Information Technology, vol. 5, no. 3, pp. 383–392, 2013. View at Publisher · View at Google Scholar · View at Scopus
  19. V. Jain, L. Kumar, M. Mohan, M. Sadiq, and K. Rastogi, “Public-key steganography based on modified LSB method,” Journal of Global Research in Computer Science, vol. 3, no. 4, pp. 26–29, 2012. View at Google Scholar
  20. S. Ahmed Laskar, “Secure data transmission using steganography and encryption technique,” International Journal on Cryptography and Information Security, vol. 2, no. 3, pp. 161–172, 2012. View at Publisher · View at Google Scholar
  21. S. Narayana and G. Prasad, “Two new approaches for secured image steganography using cryptographic techniques and type conversions,” Signal & Image Processing, vol. 1, no. 2, pp. 60–73, 2010. View at Publisher · View at Google Scholar
  22. M. J. Saeed, “A new technique based on chaotic steganography and encryption text in DCT domain for color image,” Journal of Engineering Science and Technology, vol. 8, no. 5, pp. 508–520, 2013. View at Google Scholar · View at Scopus
  23. T. Shahanar, “A secure DCT image steganography based on public-key cryptography,” International Journal of Computer Trends and Technology, vol. 4, no. 7, pp. 2039–2043, 2013. View at Google Scholar
  24. M. S. Subhedar and V. H. Mankar, “Current status and key issues in image steganography: a survey,” Computer Science Review, vol. 13-14, pp. 95–113, 2014. View at Publisher · View at Google Scholar · View at Scopus
  25. N. Provos and P. Honeyman, “Hide and seek: an introduction to steganography,” IEEE Security and Privacy, vol. 1, no. 3, pp. 32–44, 2003. View at Publisher · View at Google Scholar · View at Scopus
  26. A. Westfeld, “F5-a steganographic algorithm: high capacity despite better steganalysis,” in Information Hiding: 4th International Workshop, IH 2001 Pittsburgh, PA, USA, April 25–27, 2001 Proceedings, vol. 2137 of Lecture Notes in Computer Science, pp. 289–302, Springer, Berlin, Germany, 2001. View at Publisher · View at Google Scholar
  27. N. Provos, “Defending against statistical steganalysis,” in Proceedings of the 10th Conference on USENIX Security Symposium (SSYM '01), vol. 10, pp. 323–336, Washington, DC, USA, 2001.
  28. T. Pevný, T. Filler, and P. Bas, “Using high-dimensional image models to perform highly undetectable steganography,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6387, pp. 161–177, 2010. View at Publisher · View at Google Scholar · View at Scopus
  29. R. Cogranne, C. Zitzmann, F. Retraint, I. V. Nikiforov, P. Cornu, and L. Fillatre, “A local adaptive model of natural images for almost optimal detection of hidden data,” Signal Processing, vol. 100, pp. 169–185, 2014. View at Publisher · View at Google Scholar · View at Scopus
  30. M. Afrakhteh and J.-A. Lee, “Adaptive least significant bit matching revisited with the help of error images,” Security and Communication Networks, vol. 8, no. 3, pp. 510–515, 2015. View at Publisher · View at Google Scholar · View at Scopus
  31. C. Chang, T. Chen, and L. Chung, “A steganographic method based upon JPEG and quantization table modification,” Information Sciences, vol. 141, no. 1-2, pp. 123–138, 2002. View at Publisher · View at Google Scholar
  32. H. Noda, M. Niimi, and E. Kawaguchi, “High-performance JPEG steganography using quantization index modulation in DCT domain,” Pattern Recognition Letters, vol. 27, no. 5, pp. 455–461, 2006. View at Publisher · View at Google Scholar · View at Scopus
  33. K. Wong, X. Qi, and K. Tanaka, “A DCT-based Mod4 steganographic method,” Signal Processing, vol. 87, no. 6, pp. 1251–1263, 2007. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  34. C.-C. Chang, C.-C. Lin, C.-S. Tseng, and W.-L. Tai, “Reversible hiding in DCT-based compressed images,” Information Sciences, vol. 177, no. 13, pp. 2768–2786, 2007. View at Publisher · View at Google Scholar · View at Scopus
  35. X. Li and J. Wang, “A steganographic method based upon JPEG and particle swarm optimization algorithm,” Information Sciences, vol. 177, no. 15, pp. 3099–3109, 2007. View at Publisher · View at Google Scholar · View at Scopus
  36. C. L. Velasco-Bautista, J. C. López-Hernández, M. Nakano-Miyatake, and H. M. Pérez-Meana, “Esteganografía en una imagen digital en el dominio DCT,” Científica, vol. 11, no. 4, pp. 169–176, 2007. View at Google Scholar
  37. C.-C. Lin and P.-F. Shiu, “High capacity data hiding scheme for DCT-based images,” Journal of Information Hiding and Multimedia Signal Processing, vol. 1, no. 3, pp. 220–240, 2010. View at Google Scholar · View at Scopus
  38. Y.-K. Lin, “High capacity reversible data hiding scheme based upon discrete cosine transformation,” The Journal of Systems and Software, vol. 85, no. 10, pp. 2395–2404, 2012. View at Publisher · View at Google Scholar · View at Scopus
  39. H. L. Jaheel and Z. Beiji, “A novel approach of combining steganography algorithms,” International Journal on Smart Sensing and Intelligent Systems, vol. 8, no. 1, pp. 90–106, 2015. View at Google Scholar · View at Scopus
  40. B. Schneier, Applied Cryptography. Protocols, Algorithms and Source Codein C, John Wiley & Sons, New York, NY, USA, 2nd edition, 1996.
  41. L. Yu, Y. Zhao, R. Ni, and Z. Zhu, “PM1 steganography in JPEG images using genetic algorithm,” Soft Computing, vol. 13, no. 4, pp. 393–400, 2009. View at Publisher · View at Google Scholar · View at Scopus
  42. İ. Coşkun, F. Akar, and Ö. Çetin, “A new digital image steganography algorithm based on visible wavelength,” Turkish Journal of Electrical Engineering and Computer Sciences, vol. 21, pp. 548–564, 2013. View at Google Scholar
  43. M. Kutter and A. P. Petitcolas, “A fair benchmark for image watermarking systems,” in Electronic Imaging '99. Security and Watermarking of Multimedia Contents, vol. 3657, pp. 1–14, 1999. View at Google Scholar
  44. C. Varnan, A. Jagan, J. Kaur, D. Jyoti, and D. Rao, “Image quality assessment techniques pn spatial domain,” International Journal of Computer Science and Technology, vol. 2, no. 3, pp. 177–184, 2011. View at Google Scholar
  45. A. K. Gulve and M. S. Joshi, “A high capacity secured image steganography method with five pixel pair differencing and lsb substitution,” International Journal of Image, Graphics and Signal Processing, vol. 7, no. 5, pp. 66–74, 2015. View at Publisher · View at Google Scholar
  46. C. Cachin, “An information-theoretic model for steganography,” Information and Computation, vol. 192, no. 1, pp. 41–56, 2004. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  47. O. Zanganeh and S. Ibrahim, “Adaptive image steganography based on optimal embedding and robust against chi-square attack,” Information Technology Journal, vol. 10, no. 7, pp. 1285–1294, 2011. View at Publisher · View at Google Scholar · View at Scopus
  48. C.-L. Liu and S.-R. Liao, “High-performance JPEG steganography using complementary embedding strategy,” Pattern Recognition, vol. 41, no. 9, pp. 2945–2955, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus