About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
inis 20(24): e2

Research Article

An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images

Download1531 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/eai.28-9-2020.166365,
        author={Franklin Tchakount\^{e} and Priva Chassem Kamdem and Jean Claude Kamgang and Hortense Boudjou Tchapgnouo and Marcellin Atemkeng},
        title={An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images},
        journal={EAI Endorsed Transactions on Industrial Networks and Intelligent Systems},
        volume={7},
        number={24},
        publisher={EAI},
        journal_a={INIS},
        year={2020},
        month={9},
        keywords={Image steganography, JPEG, Discrete Cosine Transform, Insertion, Singular Value Decomposition, Quantization, Attacks, Social media},
        doi={10.4108/eai.28-9-2020.166365}
    }
    
  • Franklin Tchakounté
    Priva Chassem Kamdem
    Jean Claude Kamgang
    Hortense Boudjou Tchapgnouo
    Marcellin Atemkeng
    Year: 2020
    An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images
    INIS
    EAI
    DOI: 10.4108/eai.28-9-2020.166365
Franklin Tchakounté1,*, Priva Chassem Kamdem1, Jean Claude Kamgang2, Hortense Boudjou Tchapgnouo3, Marcellin Atemkeng4
  • 1: Mathematics and Computer Science, Faculty of Science, University of Ngaoundéré, Cameroon
  • 2: Department of Mathematics and Computer Science , National School of Agro-Industrial Science, University of Ngaoundéré, Cameroon
  • 3: Department of Computer Science and Telecommunications, National School of Polytechnic of Maraoua, University of Maroua, Cameroon
  • 4: Department of Mathematics, Rhodes University, 6140 Grahamstown, South Africa
*Contact email: tchafros@gmail.com

Abstract

To prove the origin of images in social media, this work proposes an efficient JPEG image steganography approach. After structuring the cover image into blocks of 8*8 pixels, Discrete Cosine Transform is applied to each block of pixels. The latter are quantified using a quantization table and a matrix of DC coefficients from quantized blocks of pixels, is obtained. Singular Value Decomposition is applied to the previous matrix and the secret message is inserted within singular vectors. For extraction purposes, previous transformations are followed reversely. An experimentation is made on seven images and results show that the proposed system outperforms similar studies in three aspects (i) it preserves stego image quality with PSNR of stego images varying between 38 and 54 (ii) it is able to insert a secret message of 257600 bits with the capacity of 4 bits per pixel (iii) it is robust and resistant to attacks such as histogram analysis and chi-square test.

Keywords
Image steganography, JPEG, Discrete Cosine Transform, Insertion, Singular Value Decomposition, Quantization, Attacks, Social media
Received
2020-06-19
Accepted
2020-09-22
Published
2020-09-28
Publisher
EAI
http://dx.doi.org/10.4108/eai.28-9-2020.166365

Copyright © 2020 Franklin Tchakounté et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL