2nd International ICST Conference on Scalable Information Systems

Research Article

A Secure Image Steganography Based on DCT Domain

Download453 downloads
  • @INPROCEEDINGS{10.4108/infoscale.2007.985,
        author={Qi Gui and Sen Bai and Jing Sun},
        title={A Secure Image Steganography Based on DCT Domain},
        proceedings={2nd International ICST Conference on Scalable Information Systems},
        proceedings_a={INFOSCALE},
        year={2010},
        month={5},
        keywords={Information hiding steganography steganalysis image decorrelation Discrete Cosine Transform (DCT)},
        doi={10.4108/infoscale.2007.985}
    }
    
  • Qi Gui
    Sen Bai
    Jing Sun
    Year: 2010
    A Secure Image Steganography Based on DCT Domain
    INFOSCALE
    ICST
    DOI: 10.4108/infoscale.2007.985
Qi Gui1,*, Sen Bai2,*, Jing Sun3,*
  • 1: Lab of Images Communication, Chongqing Communication Institute, Chongqing, 400035, P.R.China. 86-23-68759665
  • 2: Lab of Images Communication, Chongqing Communication Institute, Chongqing, 400035, P.R.China. 86-23-68760819
  • 3: Lab of Signal and Information Processing, Chongqing Communication Institute, Chongqing, 400035, P.R.China. 86-23-68760924
*Contact email: guiqi2003@sina.com, baisenchina@tom.com, masktml@265.com

Abstract

Information hiding is an information security technology of secretly embedding information into digital multimedia such as image, video and audio signals without changing the perceptual quality of the cover-data. In this paper, we propose a high embedding capacity steganographic method in still image based on transform domain. With this method we embed the information in the transform domain after decorrelating the image in the spatial domain. The decorrelation processing results in a significant increase in the number of transform coefficients that can be used to embed the secret information into. Experimental results show that the proposed method can not only preserve good stego-image quality, but also have a good performance in resisting to chi-square analysis method, information quantity estimation method, RS analysis method and Jeremiah’s histogram analysis method.