SlideShare a Scribd company logo
The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017
DOI : 10.5121/ijma.2017.9101 1
A NOVEL IMAGE STEGANOGRAPHY APPROACH
USING MULTI-LAYERS DCT FEATURES BASED ON
SUPPORT VECTOR MACHINE CLASSIFIER
Akram AbdelQader1
and Fadel AlTamimi2
1
Department of Multimedia Systems, AL-Zaytoonah University Of Jordan, Amman,
Jordan
2
Department of Computer Science, AL-Zaytoonah University Of Jordan, Amman,
Jordan
ABSTRACT
Steganography is the science of hidden data in the cover image without any updating of the cover image.
The recent research of the steganography is significantly used to hide large amount of information within
an image and/or audio files. This paper proposed a new novel approach for hiding the data of secret image
using Discrete Cosine Transform (DCT) features based on linear Support Vector Machine (SVM)
classifier. The DCT features are used to decrease the image redundant information. Moreover, DCT is
used to embed the secrete message based on the least significant bits of the RGB. Each bit in the cover
image is changed only to the extent that is not seen by the eyes of human. The SVM used as a classifier to
speed up the hiding process via the DCT features. The proposed method is implemented and the results
show significant improvements. In addition, the performance analysis is calculated based on the
parameters MSE, PSNR, NC, processing time, capacity, and robustness.
KEYWORDS
Discrete Cosine Transform (DCT), Support Vector Machine (SVM), Classifier, Steganography, Peak
signal-to-noise ratio (PSNR).
1. INTRODUCTION
Recently, the growth of technology and social media communications over the internet motivate
the researchers to develop new steganography techniques. The objective of steganography is to
hide a secret message within a cover-media in such a way that others cannot discern the presence
of the hidden message. Today, steganography technology and steganalysis are attracted on much
attention. Steganalysis is focusing on the detection the present of hidden message. In the
literatures, many steganalytic research and schemes for digital images have been proposed [1]–
[3]. Recently, the security issues are very important research due to the wide amount of
information over the internet.
Steganography in the simple means hidden date in other, such as image, audio file or even a video
file [2]. An image is one type of steganographic, where the secret image is hidden in a cover
image based on some hiding algorithm. Form the state of the arte, many researchers use Least
Significant Bits (LSB) to reduce the distortion of the stegano image [22]. The original image used
The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017
2
to hide image is called a cover image in steganography, and the image to hide is called a secret
image [3].
The objective of steganography is hiding the data into the cover image such that the existence of
data in the cover image is not seen to the human beings [4]. The figure 1.1 shows the process of
hiding data.
Figure1. The process of hiding data
Many techniques were proposed to implement steganography such as Spatial-Domain methods
(LSB) where processing is applied directly on the pixel values of the image [22] and [23],
Transform Domain Methods (DCT) and Discrete Wavelet Transform (DWT) technique pixel
values are transformed and then processing is applied on the transformed coefficients, and
Statistical Methods [24] (Syndrome Trellis codes).
2. DISCRETE COSINE TRANSFORM (DCT)
Discrete Cosine Transform (DCT) techniques are used in frequency domain. The DCT is a
function that convert data from the spatial domain to the frequency domain. In DCT, after
converting the image in frequency domain, the data is hidden in the least significant bits of the
medium frequency components, secret messages are hidden in the high frequency coefficients
resulted from Discrete Wavelet Transform and provide maximum robustness. In the Least
Significant Bit (LSB), every pixel of an image is converting into the (1) or (0) and data is hidden
into the least significant position of the binary value of the pixels of the image.
DCTs are important to numerous applications in science and engineering, from lossy compression
of audio and images (where small high-frequency components can be discarded), to spectral
methods for the numerical solution of partial differential equations. The use of cosine functions is
critical in these applications: for compression, it turns out that cosine functions are much more
efficient (as described below, fewer functions are needed to approximate a typical signal),
whereas for differential equations the cosines express a particular choice of boundary conditions.
The most common variant of discrete cosine transform is the simply DCT, in addition to the
modified discrete cosine transforms (MDCT), which is based on a DCT of overlapping data.
[6][7]. Multidimensional variants of the various DCT types follow straightforwardly from the
one-dimensional definitions: they are simply a separable product (equivalently, a composition) of
DCTs along each dimension. Figure 2 shows a Discrete Cosine Transform of an Image.
The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017
3
Figure 2 Discrete Cosines Transform of an Image.
Where u= 0, 1, 2….. N-1
The general equation for a 2D (N by M image) DCT is defined by the following equation:
where u, v = 0,1,2….N-1
Here, the input image is of size N X M. c (i, j) is the value of the pixel in row i and column
j; C(u,v) is the DCT coefficient in row u and column v of the DCT matrix. DCT is used into
steganography as [8]. Image is segment into 8×8 blocks or 4X4 block of pixels. Working
from left to right, top to bottom, DCT is applied for each block. Each block is compressed
through quantization table to scale the DCT coefficients and message is hidden in DCT
coefficients. Figure 3 shows a two dimensional DCT frequencies from the RGB DCT image
of 8 X8 pixels.
Figure 3 Two-dimensional DCT frequencies from the RGB DCT image based on 8 X8 pixels
3. SUPPORT VECTOR MACHINE
Support vector machines (SVM) also support vector networks [25] are supervised learning
models with associated learning algorithms that analyses data used for classification and
regression analysis. Based on training example set, each marked as belonging to one of two
The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017
4
categories, since SVM builds a model that assigns new examples to one category or to the other.
In Linear SVM a training dataset of n points of the form as in the figure 4 below
where the yi are either 1 or −1, each indicating the class to which the point belongs. Each
is a p-dimensional real vector. We want to find the "maximum-margin hyperplane that divides the
group of points for which from the group of points for which , which is
defined so that the distance between the hyper-plane and the nearest point from either group
is maximized. Any hyperplane can be written as the set of points satisfying
where is the (not necessarily normalized) normal vector to the hyperplane. The
parameter determines the offset of the hyperplane from the origin along the normal vector .
Figure 4 Linear SVM classifier
4. THE LITERATURE REVIEW
Many researches were done on Steganography because it is very important in computer
multimedia fields, internet fields and in security systems. In addition, it is very important to know
how much data can be concealed without image distortion. In literature, the techniques of
steganography and its implementation were explained by J.R.Krenn in [1].
In [5], Chen Ming, et. al. focused on the steganography tools algorithms. Based on the analyses of
the algorithms, various tools are divided into five categories: (1). Spatial domain based
steganography tools; (2). Transform domain based steganography tools; (3). Document based
steganography tools; (4) File structure based Steganography tools; (5) other categories, e.g. video
compress encoding and spread spectrum technique based. Deshpande Neeta, et. al. [9], they
proposed the Least Significant Bit embedding technique suggests that data can be hidden in the
least significant bits (LSB) of the cover image and the human eye would be unable to see the
hidden data in the cover image. They explained the LSB embedding technique and presents the
evaluation results for 2, 4, 6 (LSB) for a PNG images and a .bmp images.
In [10] K.B.Raja, et. al., they proposed a challenging task of transferring the hidden data to the
cover without being detected. In addition, they used compression techniques on raw images to
The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017
enhance the security of the payload. Vijay Kumar Sharma,
steganography algorithm based on
operation to ensure the security against the steganalysis attack.
proposed a new steganography technique
and image quality, they embeds the secret messages in frequency domain
was divided into two modes and 5 cases. Ane
bitmap images with almost no perceptible difference between the original image and
image. Others in [14] they discusse
proposed a novel technique to hide data in a colorful image using least significant bit. Hassan
Mathkour,et. al. in [15] they
presented steganography techniques
that takes the advantages of the strengths and avoids the limitations
Finally, in [17] MamtaJuneja, et. al.
based on LSB and the RSA encryption t
5. THE PROPOSED APPROACH
In this paper we use the SVM classifier for training DCT Appling the linear SVM algorithm.
DCT2 is used as shown in the equation 1
Equation (1) DCT2 algorithm.
5.1 DCT FEATURES EXTRACTION
AND COVER IMAGES ALGORITHM
The proposed system has been designed to hide the secret message in the cover image
following algorithm shows the process of hidden a message:
The proposed algorithm 1 and methodology is shown in figure 5 and
following steps:
The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017
enhance the security of the payload. Vijay Kumar Sharma, et. al. [11] the proposed a
based on 8bit gray scale or 24bit color image, they used the
operation to ensure the security against the steganalysis attack. Other researchers in
proposed a new steganography technique based on different users demands on hiding capacity
embeds the secret messages in frequency domain the proposed algorithm
divided into two modes and 5 cases. Aneesh Jain, et. al. [13] they were hide the data in a
almost no perceptible difference between the original image and
discussed a survey of general steganography techniques and they
echnique to hide data in a colorful image using least significant bit. Hassan
in [15] they analyzed and evaluated the strengths and weaknesses of the
presented steganography techniques. In addition, they proposed a robust steganography technique
advantages of the strengths and avoids the limitations of the studied techniques
MamtaJuneja, et. al. they proposed a Robust image steganography technique
RSA encryption technique.
PPROACH
In this paper we use the SVM classifier for training DCT Appling the linear SVM algorithm.
DCT2 is used as shown in the equation 1.
XTRACTION AND SVM TRAINING PROCESS FOR THE
LGORITHM.
The proposed system has been designed to hide the secret message in the cover image
shows the process of hidden a message:
and methodology is shown in figure 5 and in our algorithm we use the
The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017
5
the proposed a new
they used the logical
r researchers in [12] they
based on different users demands on hiding capacity
the proposed algorithm
they were hide the data in a
almost no perceptible difference between the original image and the result
techniques and they
echnique to hide data in a colorful image using least significant bit. Hassan
the strengths and weaknesses of the
robust steganography technique
of the studied techniques.
a Robust image steganography technique
In this paper we use the SVM classifier for training DCT Appling the linear SVM algorithm.
HE ORIGINAL
The proposed system has been designed to hide the secret message in the cover image, the
n our algorithm we use the
The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017
6
Figure 5 the proposed algorithm and methodology
The proposed algorithm and methodology are tested and the results are shown the following
figures. Figure 6 shows the cover original image with size 256 *256 which used to hide the
message. Figure 7 shows the original message that used to hide in the cover image of size of 64*
64. Figure 8 shows the stego image after hiding the secrete in the cover image.
The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017
7
Figure 8 Stego image size 256*256
The proposed algorithm is implemented and tested and shows a significant results. To show the
algorithm accuracy and performance many comparisons is done. The PSNR comparison is PSNR
44.3058 dB and the histogram between the original and stego images as shown in figure 9 and
figure 10.
Figure 10 Histogram of cover image and stego image
The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017
8
5.2 IDCT FEATURES EXTRACTION AND SVM TRAINING PROCESS FOR THE STEGO
IMAGE ALGORITHM.
The next step of the proposed algorithm is to extracting the secret image from the stego image as
shown in Algorithm 2 and in the methodology in figure 11.
Figure 10 the proposed algorithm to regenerate the secret image from the stego image
6. SYSTEM IMPLEMENTATION
This system was implemented using Matlab programming language over a PC Core i7 CPU with
8 GB RAM on Windows 7 Operating System. Many other applications were running such as
anti-virus application which may be effect the performance rate. The proposed system is tested
for many images width different sizes and different resolutions, and it shows significant results
based on DCT and SVM classifier. The proposed algorithm was tested for processes; the process
of hiding the secret message in the cover image and the process of retrieving the secret image
from the stego image and show good results.
The proposed system is implemented and tested using many images width different sizes and
different resolutions, and it shows significant results using the proposed three layer DCT methods
and SVM classifier.
The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017
9
Many experiments were done using the proposed algorithm and the results are analyzed
and reported. Table 1 shows the comparisons of PSNR between cover image and stego
image. In addition table 2 shows the comparisons of PSNR between secret and message
image.
Table 1 Result of PSNR between cover and stego image
Table 2 Result of PSNR between secret and message image
The tables 1 and 2 show a significant improvement results based on the ratio between the
maximum possible power of a signal and the power of corrupting noise that affects the fidelity of
the two compared images.
7. CONCLUSIONS
The proposed approach shows significant results based DCT features and the using of fast linear
SVM classifier that used in both processes (hiding and retrieving). Moreover, the using of the
three layer of a color image based on RGB over DCT features add significant improves in the
performance and the accuracy. The future work may be done by using other classifier and other
features and compare the results.
REFERENCES
[1] J.R. Krenn, “Steganography and Steganalysis”, January 2004.
[2] BeenishMehboob and Rashid Aziz Faruqui, “A Steganography Implementation”, IEEE -4244-2427-
6/08/ 2008.
[3] M. M. Amin, M. Salleh, S. Ibrahim, M.R.Katmin, M.Z.I. Shamsuddin, “Information Hiding using
Steganography” Proceedings of 4th National Conference on Telecommunication Technology, Shah
Alam, Malaysia, 2003.
[4] K Suresh Babu, K B Raja, Kiran Kumar K, Manjula Devi T H, Venugopal K R, L M Patnaik,
“Authentication of Secret Information in Image Steganography”.
[5] Chen Ming, Zhang Ru, NiuXinxin, Yang Yixian, “Analysis of Current Steganography Tools:
Classifications & Features” , International Conference on Intelligent Information Hiding and
Multimedia Signal Processing (IIH-MSP'06),IEEE- 0-7695-2745-0/06 2006.
[6] Ahmed, N.; Natarajan, T.; Rao, K. R. (January 1974), "Discrete Cosine Transform", IEEE
Transactions on Computers C–23 (1): 90–93, doi:10.1109/T-C.1974.223784.
[7] Rao, K; Yip, P (1990), Discrete Cosine Transform: Algorithms, Advantages, Applications, Boston:
Academic Press, ISBN 0-12-580203-X
[8] NageswaraRaoThota, Srinivasa Kumar Devireddy, “Image Compression Using Discrete Cosine
Transform”, Georgian Electronic Scientific Journal: Computer Science and Telecommunications,
No.3 (17), 2008.
The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017
10
[9] Deshpande Neeta, KamalapurSnehal, Daisy Jacobs, “Implementation of LSB Steganography and Its
Evaluation for Various Bits”, 2004.
[10] K.B.Raja, C.R.Chowdary, Venugopal K R, L.M.Patnaik, “A Secure Image Steganography using LSB,
DCT and Compression Techniques on Raw Images”, IEEE-0-7803-9588-3/05 2005.
[11] Vijay KumarSharma, Vishalshrivastava, “A Steganography Algorithm for Hiding Images by
improved LSB substitution by minize detection.”Journal of Theoretical and Applied Information
Technology, Vol. 36 No.1, ISSN: 1992-8645, 15th February 2012.
[12] Po-Yueh Chen and Hung-Ju Lin, “A DWT Based Approach for Image Steganography”,International
Journal of Applied Science and Engineering 4, 3: 275-290, 2006.
[13] AneeshJain,IndranilSen. Gupta, “A JPEG Compression Resistant Steganography Scheme for Raster
Graphics Images”,IEEE-1-4244-1272-2/07 2007.
[14] BeenishMehboob and Rashid Aziz Faruqui, “A Steganography Implementation”, IEEE -4244-2427-
6/08 2008.
[15] Hassan Mathkour, Batool Al-Sadoon, AmeurTouir, “A New Image Steganography Technique”,IEEE-
978-1-4244-2108-4/08 2008.
[16] NageswaraRaoThota, Srinivasa Kumar Devireddy, “Image Compression Using Discrete Cosine
Transform”, Georgian Electronic Scientific Journal: Computer Science and Telecommunications,
No.3 (17), 2008.
[17] MamtaJuneja,Parvinder Singh Sandhu, “Designing of Robust Image Steganography Technique Based
on LSB Insertion and Encryption”, International Conference on Advances in Recent Technologies in
Communication and Computing, 2009.
[18] Vijay Kumar, Dinesh Kumar, “Performance Evaluation of DWT Based Image Steganography”
,IEEE- 978-1-4244-4791-6/10 2010.
[19] Ali Al-Ataby and Fawzi Al-Naima, “A Modified High Capacity Image Steganography Technique
Based on Wavelet Transform” The International Arab Journal of Information Technology, Vol. 7, No.
4, October 2010.
[20] T. Narasimmalou, Allen Joseph .R, “Optimized Discrete Wavelet Transform based Steganography” ,
IEEE International Conference on Advanced Communication Control and Computing Technologies
(ICACCCT),2012.
[21] NedaRaftari and Amir MasoudEftekhariMoghadam, “Digital Image Steganography Based on
Assignment Algorithm and Combination of DCT-IWT”, Fourth International Conference on
Computational Intelligence, Communication Systems and Networks, 2012.
[22] S. M. Mohadeseh, N. Hossein, "The pair-wise LSB matching steganography with a discrete quantum
behaved Gravitational Search Algorithm", Journal of Intelligent & Fuzzy Systems, vol. 30, no. 3, pp.
1547-1556, 2016.
[23] Mamta Juneja and Parvinder Singh Sandhu, “A New Approach for Information security using an
Improved Steganography Technique”, Journal of Info.Pro.Systems, Vol 9, No:3, pp.405-424, (2013) .
[24] Tomas Filler, Student Member, IEEE, Jan Judas and Jessica Fridrich, Member, IEEE, (2010)
“Minimizing Additive Distortion in Steganography using Syndrome Trellis Codes”, IEEE Article,
pp.1-17.
[25] Cortes, C.; Vapnik, V. "Support-vector networks". Machine Learning. 20 (3): 273–297.
doi:10.1007/BF00994018, (1995).

More Related Content

What's hot (20)

A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
ijctet
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
ijctet
 
A new image steganography algorithm based
A new image steganography algorithm basedA new image steganography algorithm based
A new image steganography algorithm based
IJNSA Journal
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ijcsit
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
Iasir Journals
 
IRJET- An Improved Technique for Hiding Secret Image on Colour Images usi...
IRJET-  	  An Improved Technique for Hiding Secret Image on Colour Images usi...IRJET-  	  An Improved Technique for Hiding Secret Image on Colour Images usi...
IRJET- An Improved Technique for Hiding Secret Image on Colour Images usi...
IRJET Journal
 
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATIONUSING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
IJNSA Journal
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
IJERA Editor
 
Image Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine LearningImage Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine Learning
ijtsrd
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
CSCJournals
 
Ijnsa050205
Ijnsa050205Ijnsa050205
Ijnsa050205
IJNSA Journal
 
Bp34412415
Bp34412415Bp34412415
Bp34412415
IJERA Editor
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
ijsrd.com
 
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingA Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
CSCJournals
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
IDES Editor
 
Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm
IJECEIAES
 
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and  secret map techniques Image steganography using least significant bit and  secret map techniques
Image steganography using least significant bit and secret map techniques
IJECEIAES
 
A simple framework for contrastive learning of visual representations
A simple framework for contrastive learning of visual representationsA simple framework for contrastive learning of visual representations
A simple framework for contrastive learning of visual representations
Devansh16
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
H0114857
H0114857H0114857
H0114857
IJRES Journal
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
ijctet
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
ijctet
 
A new image steganography algorithm based
A new image steganography algorithm basedA new image steganography algorithm based
A new image steganography algorithm based
IJNSA Journal
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ijcsit
 
IRJET- An Improved Technique for Hiding Secret Image on Colour Images usi...
IRJET-  	  An Improved Technique for Hiding Secret Image on Colour Images usi...IRJET-  	  An Improved Technique for Hiding Secret Image on Colour Images usi...
IRJET- An Improved Technique for Hiding Secret Image on Colour Images usi...
IRJET Journal
 
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATIONUSING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
IJNSA Journal
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
IJERA Editor
 
Image Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine LearningImage Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine Learning
ijtsrd
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
CSCJournals
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
ijsrd.com
 
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingA Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
CSCJournals
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
IDES Editor
 
Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm
IJECEIAES
 
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and  secret map techniques Image steganography using least significant bit and  secret map techniques
Image steganography using least significant bit and secret map techniques
IJECEIAES
 
A simple framework for contrastive learning of visual representations
A simple framework for contrastive learning of visual representationsA simple framework for contrastive learning of visual representations
A simple framework for contrastive learning of visual representations
Devansh16
 

Viewers also liked (20)

DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...
DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...
DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...
ijma
 
A COLLAGE IMAGE CREATION & “KANISEI” ANALYSIS SYSTEM BY COMBINING MULTIPLE IM...
A COLLAGE IMAGE CREATION & “KANISEI” ANALYSIS SYSTEM BY COMBINING MULTIPLE IM...A COLLAGE IMAGE CREATION & “KANISEI” ANALYSIS SYSTEM BY COMBINING MULTIPLE IM...
A COLLAGE IMAGE CREATION & “KANISEI” ANALYSIS SYSTEM BY COMBINING MULTIPLE IM...
ijma
 
IMAGE DENOISING BY MEDIAN FILTER IN WAVELET DOMAIN
IMAGE DENOISING BY MEDIAN FILTER IN WAVELET DOMAINIMAGE DENOISING BY MEDIAN FILTER IN WAVELET DOMAIN
IMAGE DENOISING BY MEDIAN FILTER IN WAVELET DOMAIN
ijma
 
Turisme sostenible
Turisme sostenibleTurisme sostenible
Turisme sostenible
gegantdelrec
 
Py definitive-guide-aecc-global (1)
Py definitive-guide-aecc-global (1)Py definitive-guide-aecc-global (1)
Py definitive-guide-aecc-global (1)
AECC GLOBAL
 
Things for intrapreneurs to keep ideas alive
Things for intrapreneurs to keep ideas aliveThings for intrapreneurs to keep ideas alive
Things for intrapreneurs to keep ideas alive
eTailing India
 
ACC 290 Final Exam Guide
ACC 290 Final Exam GuideACC 290 Final Exam Guide
ACC 290 Final Exam Guide
leonardjonh141
 
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...
sipij
 
ROBUST FEATURE EXTRACTION USING AUTOCORRELATION DOMAIN FOR NOISY SPEECH RECOG...
ROBUST FEATURE EXTRACTION USING AUTOCORRELATION DOMAIN FOR NOISY SPEECH RECOG...ROBUST FEATURE EXTRACTION USING AUTOCORRELATION DOMAIN FOR NOISY SPEECH RECOG...
ROBUST FEATURE EXTRACTION USING AUTOCORRELATION DOMAIN FOR NOISY SPEECH RECOG...
sipij
 
Highlights - MWC17
Highlights - MWC17Highlights - MWC17
Highlights - MWC17
Enzyme Advising Group
 
Tecnología como instrumento para el juego y aprendizaje
Tecnología como instrumento para el juego y aprendizajeTecnología como instrumento para el juego y aprendizaje
Tecnología como instrumento para el juego y aprendizaje
Karent Tatiana Perez Hernandez
 
Representation Revision: Age
Representation Revision: AgeRepresentation Revision: Age
Representation Revision: Age
hughes82
 
Patricia favourite place
Patricia favourite placePatricia favourite place
Patricia favourite place
Ana Arias Castro
 
มหาดไทย เปิดคัดเลือกข้าราชการดำรงตำแหน่ง นายอำเภอ ทดแทนอัตราว่าง 141 อัตรา
มหาดไทย เปิดคัดเลือกข้าราชการดำรงตำแหน่ง นายอำเภอ ทดแทนอัตราว่าง 141 อัตรามหาดไทย เปิดคัดเลือกข้าราชการดำรงตำแหน่ง นายอำเภอ ทดแทนอัตราว่าง 141 อัตรา
มหาดไทย เปิดคัดเลือกข้าราชการดำรงตำแหน่ง นายอำเภอ ทดแทนอัตราว่าง 141 อัตรา
ประพันธ์ เวารัมย์
 
Target audience
Target audienceTarget audience
Target audience
Molly Iveson
 
INNOVATIVE AND SOCIAL TECHNOLOGIES ARE REVOLUTIONIZING SAUDI CONSUMER ATTITUD...
INNOVATIVE AND SOCIAL TECHNOLOGIES ARE REVOLUTIONIZING SAUDI CONSUMER ATTITUD...INNOVATIVE AND SOCIAL TECHNOLOGIES ARE REVOLUTIONIZING SAUDI CONSUMER ATTITUD...
INNOVATIVE AND SOCIAL TECHNOLOGIES ARE REVOLUTIONIZING SAUDI CONSUMER ATTITUD...
ijsptm
 
A PROPOSED MULTI-DOMAIN APPROACH FOR AUTOMATIC CLASSIFICATION OF TEXT DOCUMENTS
A PROPOSED MULTI-DOMAIN APPROACH FOR AUTOMATIC CLASSIFICATION OF TEXT DOCUMENTSA PROPOSED MULTI-DOMAIN APPROACH FOR AUTOMATIC CLASSIFICATION OF TEXT DOCUMENTS
A PROPOSED MULTI-DOMAIN APPROACH FOR AUTOMATIC CLASSIFICATION OF TEXT DOCUMENTS
ijsc
 
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNINGMULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
sipij
 
A PREDICTION METHOD OF GESTURE TRAJECTORY BASED ON LEAST SQUARES FITTING MODEL
A PREDICTION METHOD OF GESTURE TRAJECTORY BASED ON LEAST SQUARES FITTING MODELA PREDICTION METHOD OF GESTURE TRAJECTORY BASED ON LEAST SQUARES FITTING MODEL
A PREDICTION METHOD OF GESTURE TRAJECTORY BASED ON LEAST SQUARES FITTING MODEL
VLSICS Design
 
ANALYSIS OF MWES IN HINDI TEXT USING NLTK
ANALYSIS OF MWES IN HINDI TEXT USING NLTKANALYSIS OF MWES IN HINDI TEXT USING NLTK
ANALYSIS OF MWES IN HINDI TEXT USING NLTK
ijnlc
 
DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...
DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...
DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...
ijma
 
A COLLAGE IMAGE CREATION & “KANISEI” ANALYSIS SYSTEM BY COMBINING MULTIPLE IM...
A COLLAGE IMAGE CREATION & “KANISEI” ANALYSIS SYSTEM BY COMBINING MULTIPLE IM...A COLLAGE IMAGE CREATION & “KANISEI” ANALYSIS SYSTEM BY COMBINING MULTIPLE IM...
A COLLAGE IMAGE CREATION & “KANISEI” ANALYSIS SYSTEM BY COMBINING MULTIPLE IM...
ijma
 
IMAGE DENOISING BY MEDIAN FILTER IN WAVELET DOMAIN
IMAGE DENOISING BY MEDIAN FILTER IN WAVELET DOMAINIMAGE DENOISING BY MEDIAN FILTER IN WAVELET DOMAIN
IMAGE DENOISING BY MEDIAN FILTER IN WAVELET DOMAIN
ijma
 
Turisme sostenible
Turisme sostenibleTurisme sostenible
Turisme sostenible
gegantdelrec
 
Py definitive-guide-aecc-global (1)
Py definitive-guide-aecc-global (1)Py definitive-guide-aecc-global (1)
Py definitive-guide-aecc-global (1)
AECC GLOBAL
 
Things for intrapreneurs to keep ideas alive
Things for intrapreneurs to keep ideas aliveThings for intrapreneurs to keep ideas alive
Things for intrapreneurs to keep ideas alive
eTailing India
 
ACC 290 Final Exam Guide
ACC 290 Final Exam GuideACC 290 Final Exam Guide
ACC 290 Final Exam Guide
leonardjonh141
 
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...
sipij
 
ROBUST FEATURE EXTRACTION USING AUTOCORRELATION DOMAIN FOR NOISY SPEECH RECOG...
ROBUST FEATURE EXTRACTION USING AUTOCORRELATION DOMAIN FOR NOISY SPEECH RECOG...ROBUST FEATURE EXTRACTION USING AUTOCORRELATION DOMAIN FOR NOISY SPEECH RECOG...
ROBUST FEATURE EXTRACTION USING AUTOCORRELATION DOMAIN FOR NOISY SPEECH RECOG...
sipij
 
Tecnología como instrumento para el juego y aprendizaje
Tecnología como instrumento para el juego y aprendizajeTecnología como instrumento para el juego y aprendizaje
Tecnología como instrumento para el juego y aprendizaje
Karent Tatiana Perez Hernandez
 
Representation Revision: Age
Representation Revision: AgeRepresentation Revision: Age
Representation Revision: Age
hughes82
 
มหาดไทย เปิดคัดเลือกข้าราชการดำรงตำแหน่ง นายอำเภอ ทดแทนอัตราว่าง 141 อัตรา
มหาดไทย เปิดคัดเลือกข้าราชการดำรงตำแหน่ง นายอำเภอ ทดแทนอัตราว่าง 141 อัตรามหาดไทย เปิดคัดเลือกข้าราชการดำรงตำแหน่ง นายอำเภอ ทดแทนอัตราว่าง 141 อัตรา
มหาดไทย เปิดคัดเลือกข้าราชการดำรงตำแหน่ง นายอำเภอ ทดแทนอัตราว่าง 141 อัตรา
ประพันธ์ เวารัมย์
 
INNOVATIVE AND SOCIAL TECHNOLOGIES ARE REVOLUTIONIZING SAUDI CONSUMER ATTITUD...
INNOVATIVE AND SOCIAL TECHNOLOGIES ARE REVOLUTIONIZING SAUDI CONSUMER ATTITUD...INNOVATIVE AND SOCIAL TECHNOLOGIES ARE REVOLUTIONIZING SAUDI CONSUMER ATTITUD...
INNOVATIVE AND SOCIAL TECHNOLOGIES ARE REVOLUTIONIZING SAUDI CONSUMER ATTITUD...
ijsptm
 
A PROPOSED MULTI-DOMAIN APPROACH FOR AUTOMATIC CLASSIFICATION OF TEXT DOCUMENTS
A PROPOSED MULTI-DOMAIN APPROACH FOR AUTOMATIC CLASSIFICATION OF TEXT DOCUMENTSA PROPOSED MULTI-DOMAIN APPROACH FOR AUTOMATIC CLASSIFICATION OF TEXT DOCUMENTS
A PROPOSED MULTI-DOMAIN APPROACH FOR AUTOMATIC CLASSIFICATION OF TEXT DOCUMENTS
ijsc
 
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNINGMULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
sipij
 
A PREDICTION METHOD OF GESTURE TRAJECTORY BASED ON LEAST SQUARES FITTING MODEL
A PREDICTION METHOD OF GESTURE TRAJECTORY BASED ON LEAST SQUARES FITTING MODELA PREDICTION METHOD OF GESTURE TRAJECTORY BASED ON LEAST SQUARES FITTING MODEL
A PREDICTION METHOD OF GESTURE TRAJECTORY BASED ON LEAST SQUARES FITTING MODEL
VLSICS Design
 
ANALYSIS OF MWES IN HINDI TEXT USING NLTK
ANALYSIS OF MWES IN HINDI TEXT USING NLTKANALYSIS OF MWES IN HINDI TEXT USING NLTK
ANALYSIS OF MWES IN HINDI TEXT USING NLTK
ijnlc
 

Similar to A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON SUPPORT VECTOR MACHINE CLASSIFIER (20)

A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image Steganography
IOSR Journals
 
A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit Goel
Mohit Goel
 
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
IJECEIAES
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
ijcisjournal
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
ijcisjournal
 
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
IJNSA Journal
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
ssusere02009
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
IRJET Journal
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD Editor
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
IOSR Journals
 
G017444651
G017444651G017444651
G017444651
IOSR Journals
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
Editor IJCATR
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
IOSR Journals
 
J017156874
J017156874J017156874
J017156874
IOSR Journals
 
Design secure multi-level communication system based on duffing chaotic map a...
Design secure multi-level communication system based on duffing chaotic map a...Design secure multi-level communication system based on duffing chaotic map a...
Design secure multi-level communication system based on duffing chaotic map a...
IJEECSIAES
 
Design secure multi-level communication system based on duffing chaotic map a...
Design secure multi-level communication system based on duffing chaotic map a...Design secure multi-level communication system based on duffing chaotic map a...
Design secure multi-level communication system based on duffing chaotic map a...
nooriasukmaningtyas
 
N043020970100
N043020970100N043020970100
N043020970100
ijceronline
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
CSCJournals
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image Steganography
IOSR Journals
 
A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit Goel
Mohit Goel
 
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
IJECEIAES
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
ijcisjournal
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
ijcisjournal
 
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
IJNSA Journal
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
ssusere02009
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
IRJET Journal
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD Editor
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
IOSR Journals
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
Editor IJCATR
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
IOSR Journals
 
Design secure multi-level communication system based on duffing chaotic map a...
Design secure multi-level communication system based on duffing chaotic map a...Design secure multi-level communication system based on duffing chaotic map a...
Design secure multi-level communication system based on duffing chaotic map a...
IJEECSIAES
 
Design secure multi-level communication system based on duffing chaotic map a...
Design secure multi-level communication system based on duffing chaotic map a...Design secure multi-level communication system based on duffing chaotic map a...
Design secure multi-level communication system based on duffing chaotic map a...
nooriasukmaningtyas
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
CSCJournals
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 

Recently uploaded (20)

AI in Java - MCP in Action, Langchain4J-CDI, SmallRye-LLM, Spring AI
AI in Java - MCP in Action, Langchain4J-CDI, SmallRye-LLM, Spring AIAI in Java - MCP in Action, Langchain4J-CDI, SmallRye-LLM, Spring AI
AI in Java - MCP in Action, Langchain4J-CDI, SmallRye-LLM, Spring AI
Buhake Sindi
 
Marko.js - Unsung Hero of Scalable Web Frameworks (DevDays 2025)
Marko.js - Unsung Hero of Scalable Web Frameworks (DevDays 2025)Marko.js - Unsung Hero of Scalable Web Frameworks (DevDays 2025)
Marko.js - Unsung Hero of Scalable Web Frameworks (DevDays 2025)
Eugene Fidelin
 
Agentic AI - The New Era of Intelligence
Agentic AI - The New Era of IntelligenceAgentic AI - The New Era of Intelligence
Agentic AI - The New Era of Intelligence
Muzammil Shah
 
AI against disinformation and why it is not enough
AI against disinformation and why it is not enoughAI against disinformation and why it is not enough
AI against disinformation and why it is not enough
Yiannis Kompatsiaris
 
Artificial Intelligence (Kecerdasan Buatan).pdf
Artificial Intelligence (Kecerdasan Buatan).pdfArtificial Intelligence (Kecerdasan Buatan).pdf
Artificial Intelligence (Kecerdasan Buatan).pdf
NufiEriKusumawati
 
GDG Cloud Southlake #43: Tommy Todd: The Quantum Apocalypse: A Looming Threat...
GDG Cloud Southlake #43: Tommy Todd: The Quantum Apocalypse: A Looming Threat...GDG Cloud Southlake #43: Tommy Todd: The Quantum Apocalypse: A Looming Threat...
GDG Cloud Southlake #43: Tommy Todd: The Quantum Apocalypse: A Looming Threat...
James Anderson
 
Security Operations and the Defense Analyst - Splunk Certificate
Security Operations and the Defense Analyst - Splunk CertificateSecurity Operations and the Defense Analyst - Splunk Certificate
Security Operations and the Defense Analyst - Splunk Certificate
VICTOR MAESTRE RAMIREZ
 
Cyber security cyber security cyber security cyber security cyber security cy...
Cyber security cyber security cyber security cyber security cyber security cy...Cyber security cyber security cyber security cyber security cyber security cy...
Cyber security cyber security cyber security cyber security cyber security cy...
pranavbodhak
 
With Claude 4, Anthropic redefines AI capabilities, effectively unleashing a ...
With Claude 4, Anthropic redefines AI capabilities, effectively unleashing a ...With Claude 4, Anthropic redefines AI capabilities, effectively unleashing a ...
With Claude 4, Anthropic redefines AI capabilities, effectively unleashing a ...
SOFTTECHHUB
 
Introducing Ensemble Cloudlet vRouter
Introducing Ensemble  Cloudlet vRouterIntroducing Ensemble  Cloudlet vRouter
Introducing Ensemble Cloudlet vRouter
Adtran
 
Offshore IT Support: Balancing In-House and Offshore Help Desk Technicians
Offshore IT Support: Balancing In-House and Offshore Help Desk TechniciansOffshore IT Support: Balancing In-House and Offshore Help Desk Technicians
Offshore IT Support: Balancing In-House and Offshore Help Desk Technicians
john823664
 
UiPath Community Zurich: Release Management and Build Pipelines
UiPath Community Zurich: Release Management and Build PipelinesUiPath Community Zurich: Release Management and Build Pipelines
UiPath Community Zurich: Release Management and Build Pipelines
UiPathCommunity
 
Build your own NES Emulator... with Kotlin
Build your own NES Emulator... with KotlinBuild your own NES Emulator... with Kotlin
Build your own NES Emulator... with Kotlin
Artur Skowroński
 
MCP Dev Summit - Pragmatic Scaling of Enterprise GenAI with MCP
MCP Dev Summit - Pragmatic Scaling of Enterprise GenAI with MCPMCP Dev Summit - Pragmatic Scaling of Enterprise GenAI with MCP
MCP Dev Summit - Pragmatic Scaling of Enterprise GenAI with MCP
Sambhav Kothari
 
Supercharge Your AI Development with Local LLMs
Supercharge Your AI Development with Local LLMsSupercharge Your AI Development with Local LLMs
Supercharge Your AI Development with Local LLMs
Francesco Corti
 
Building Agents with LangGraph & Gemini
Building Agents with LangGraph &  GeminiBuilding Agents with LangGraph &  Gemini
Building Agents with LangGraph & Gemini
HusseinMalikMammadli
 
Reducing Bugs With Static Code Analysis php tek 2025
Reducing Bugs With Static Code Analysis php tek 2025Reducing Bugs With Static Code Analysis php tek 2025
Reducing Bugs With Static Code Analysis php tek 2025
Scott Keck-Warren
 
System Card: Claude Opus 4 & Claude Sonnet 4
System Card: Claude Opus 4 & Claude Sonnet 4System Card: Claude Opus 4 & Claude Sonnet 4
System Card: Claude Opus 4 & Claude Sonnet 4
Razin Mustafiz
 
Content and eLearning Standards: Finding the Best Fit for Your-Training
Content and eLearning Standards: Finding the Best Fit for Your-TrainingContent and eLearning Standards: Finding the Best Fit for Your-Training
Content and eLearning Standards: Finding the Best Fit for Your-Training
Rustici Software
 
Wondershare Filmora 14.3.2 Crack + License Key Free for Windows PC
Wondershare Filmora 14.3.2 Crack + License Key Free for Windows PCWondershare Filmora 14.3.2 Crack + License Key Free for Windows PC
Wondershare Filmora 14.3.2 Crack + License Key Free for Windows PC
Mudasir
 
AI in Java - MCP in Action, Langchain4J-CDI, SmallRye-LLM, Spring AI
AI in Java - MCP in Action, Langchain4J-CDI, SmallRye-LLM, Spring AIAI in Java - MCP in Action, Langchain4J-CDI, SmallRye-LLM, Spring AI
AI in Java - MCP in Action, Langchain4J-CDI, SmallRye-LLM, Spring AI
Buhake Sindi
 
Marko.js - Unsung Hero of Scalable Web Frameworks (DevDays 2025)
Marko.js - Unsung Hero of Scalable Web Frameworks (DevDays 2025)Marko.js - Unsung Hero of Scalable Web Frameworks (DevDays 2025)
Marko.js - Unsung Hero of Scalable Web Frameworks (DevDays 2025)
Eugene Fidelin
 
Agentic AI - The New Era of Intelligence
Agentic AI - The New Era of IntelligenceAgentic AI - The New Era of Intelligence
Agentic AI - The New Era of Intelligence
Muzammil Shah
 
AI against disinformation and why it is not enough
AI against disinformation and why it is not enoughAI against disinformation and why it is not enough
AI against disinformation and why it is not enough
Yiannis Kompatsiaris
 
Artificial Intelligence (Kecerdasan Buatan).pdf
Artificial Intelligence (Kecerdasan Buatan).pdfArtificial Intelligence (Kecerdasan Buatan).pdf
Artificial Intelligence (Kecerdasan Buatan).pdf
NufiEriKusumawati
 
GDG Cloud Southlake #43: Tommy Todd: The Quantum Apocalypse: A Looming Threat...
GDG Cloud Southlake #43: Tommy Todd: The Quantum Apocalypse: A Looming Threat...GDG Cloud Southlake #43: Tommy Todd: The Quantum Apocalypse: A Looming Threat...
GDG Cloud Southlake #43: Tommy Todd: The Quantum Apocalypse: A Looming Threat...
James Anderson
 
Security Operations and the Defense Analyst - Splunk Certificate
Security Operations and the Defense Analyst - Splunk CertificateSecurity Operations and the Defense Analyst - Splunk Certificate
Security Operations and the Defense Analyst - Splunk Certificate
VICTOR MAESTRE RAMIREZ
 
Cyber security cyber security cyber security cyber security cyber security cy...
Cyber security cyber security cyber security cyber security cyber security cy...Cyber security cyber security cyber security cyber security cyber security cy...
Cyber security cyber security cyber security cyber security cyber security cy...
pranavbodhak
 
With Claude 4, Anthropic redefines AI capabilities, effectively unleashing a ...
With Claude 4, Anthropic redefines AI capabilities, effectively unleashing a ...With Claude 4, Anthropic redefines AI capabilities, effectively unleashing a ...
With Claude 4, Anthropic redefines AI capabilities, effectively unleashing a ...
SOFTTECHHUB
 
Introducing Ensemble Cloudlet vRouter
Introducing Ensemble  Cloudlet vRouterIntroducing Ensemble  Cloudlet vRouter
Introducing Ensemble Cloudlet vRouter
Adtran
 
Offshore IT Support: Balancing In-House and Offshore Help Desk Technicians
Offshore IT Support: Balancing In-House and Offshore Help Desk TechniciansOffshore IT Support: Balancing In-House and Offshore Help Desk Technicians
Offshore IT Support: Balancing In-House and Offshore Help Desk Technicians
john823664
 
UiPath Community Zurich: Release Management and Build Pipelines
UiPath Community Zurich: Release Management and Build PipelinesUiPath Community Zurich: Release Management and Build Pipelines
UiPath Community Zurich: Release Management and Build Pipelines
UiPathCommunity
 
Build your own NES Emulator... with Kotlin
Build your own NES Emulator... with KotlinBuild your own NES Emulator... with Kotlin
Build your own NES Emulator... with Kotlin
Artur Skowroński
 
MCP Dev Summit - Pragmatic Scaling of Enterprise GenAI with MCP
MCP Dev Summit - Pragmatic Scaling of Enterprise GenAI with MCPMCP Dev Summit - Pragmatic Scaling of Enterprise GenAI with MCP
MCP Dev Summit - Pragmatic Scaling of Enterprise GenAI with MCP
Sambhav Kothari
 
Supercharge Your AI Development with Local LLMs
Supercharge Your AI Development with Local LLMsSupercharge Your AI Development with Local LLMs
Supercharge Your AI Development with Local LLMs
Francesco Corti
 
Building Agents with LangGraph & Gemini
Building Agents with LangGraph &  GeminiBuilding Agents with LangGraph &  Gemini
Building Agents with LangGraph & Gemini
HusseinMalikMammadli
 
Reducing Bugs With Static Code Analysis php tek 2025
Reducing Bugs With Static Code Analysis php tek 2025Reducing Bugs With Static Code Analysis php tek 2025
Reducing Bugs With Static Code Analysis php tek 2025
Scott Keck-Warren
 
System Card: Claude Opus 4 & Claude Sonnet 4
System Card: Claude Opus 4 & Claude Sonnet 4System Card: Claude Opus 4 & Claude Sonnet 4
System Card: Claude Opus 4 & Claude Sonnet 4
Razin Mustafiz
 
Content and eLearning Standards: Finding the Best Fit for Your-Training
Content and eLearning Standards: Finding the Best Fit for Your-TrainingContent and eLearning Standards: Finding the Best Fit for Your-Training
Content and eLearning Standards: Finding the Best Fit for Your-Training
Rustici Software
 
Wondershare Filmora 14.3.2 Crack + License Key Free for Windows PC
Wondershare Filmora 14.3.2 Crack + License Key Free for Windows PCWondershare Filmora 14.3.2 Crack + License Key Free for Windows PC
Wondershare Filmora 14.3.2 Crack + License Key Free for Windows PC
Mudasir
 

A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON SUPPORT VECTOR MACHINE CLASSIFIER

  • 1. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017 DOI : 10.5121/ijma.2017.9101 1 A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON SUPPORT VECTOR MACHINE CLASSIFIER Akram AbdelQader1 and Fadel AlTamimi2 1 Department of Multimedia Systems, AL-Zaytoonah University Of Jordan, Amman, Jordan 2 Department of Computer Science, AL-Zaytoonah University Of Jordan, Amman, Jordan ABSTRACT Steganography is the science of hidden data in the cover image without any updating of the cover image. The recent research of the steganography is significantly used to hide large amount of information within an image and/or audio files. This paper proposed a new novel approach for hiding the data of secret image using Discrete Cosine Transform (DCT) features based on linear Support Vector Machine (SVM) classifier. The DCT features are used to decrease the image redundant information. Moreover, DCT is used to embed the secrete message based on the least significant bits of the RGB. Each bit in the cover image is changed only to the extent that is not seen by the eyes of human. The SVM used as a classifier to speed up the hiding process via the DCT features. The proposed method is implemented and the results show significant improvements. In addition, the performance analysis is calculated based on the parameters MSE, PSNR, NC, processing time, capacity, and robustness. KEYWORDS Discrete Cosine Transform (DCT), Support Vector Machine (SVM), Classifier, Steganography, Peak signal-to-noise ratio (PSNR). 1. INTRODUCTION Recently, the growth of technology and social media communications over the internet motivate the researchers to develop new steganography techniques. The objective of steganography is to hide a secret message within a cover-media in such a way that others cannot discern the presence of the hidden message. Today, steganography technology and steganalysis are attracted on much attention. Steganalysis is focusing on the detection the present of hidden message. In the literatures, many steganalytic research and schemes for digital images have been proposed [1]– [3]. Recently, the security issues are very important research due to the wide amount of information over the internet. Steganography in the simple means hidden date in other, such as image, audio file or even a video file [2]. An image is one type of steganographic, where the secret image is hidden in a cover image based on some hiding algorithm. Form the state of the arte, many researchers use Least Significant Bits (LSB) to reduce the distortion of the stegano image [22]. The original image used
  • 2. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017 2 to hide image is called a cover image in steganography, and the image to hide is called a secret image [3]. The objective of steganography is hiding the data into the cover image such that the existence of data in the cover image is not seen to the human beings [4]. The figure 1.1 shows the process of hiding data. Figure1. The process of hiding data Many techniques were proposed to implement steganography such as Spatial-Domain methods (LSB) where processing is applied directly on the pixel values of the image [22] and [23], Transform Domain Methods (DCT) and Discrete Wavelet Transform (DWT) technique pixel values are transformed and then processing is applied on the transformed coefficients, and Statistical Methods [24] (Syndrome Trellis codes). 2. DISCRETE COSINE TRANSFORM (DCT) Discrete Cosine Transform (DCT) techniques are used in frequency domain. The DCT is a function that convert data from the spatial domain to the frequency domain. In DCT, after converting the image in frequency domain, the data is hidden in the least significant bits of the medium frequency components, secret messages are hidden in the high frequency coefficients resulted from Discrete Wavelet Transform and provide maximum robustness. In the Least Significant Bit (LSB), every pixel of an image is converting into the (1) or (0) and data is hidden into the least significant position of the binary value of the pixels of the image. DCTs are important to numerous applications in science and engineering, from lossy compression of audio and images (where small high-frequency components can be discarded), to spectral methods for the numerical solution of partial differential equations. The use of cosine functions is critical in these applications: for compression, it turns out that cosine functions are much more efficient (as described below, fewer functions are needed to approximate a typical signal), whereas for differential equations the cosines express a particular choice of boundary conditions. The most common variant of discrete cosine transform is the simply DCT, in addition to the modified discrete cosine transforms (MDCT), which is based on a DCT of overlapping data. [6][7]. Multidimensional variants of the various DCT types follow straightforwardly from the one-dimensional definitions: they are simply a separable product (equivalently, a composition) of DCTs along each dimension. Figure 2 shows a Discrete Cosine Transform of an Image.
  • 3. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017 3 Figure 2 Discrete Cosines Transform of an Image. Where u= 0, 1, 2….. N-1 The general equation for a 2D (N by M image) DCT is defined by the following equation: where u, v = 0,1,2….N-1 Here, the input image is of size N X M. c (i, j) is the value of the pixel in row i and column j; C(u,v) is the DCT coefficient in row u and column v of the DCT matrix. DCT is used into steganography as [8]. Image is segment into 8×8 blocks or 4X4 block of pixels. Working from left to right, top to bottom, DCT is applied for each block. Each block is compressed through quantization table to scale the DCT coefficients and message is hidden in DCT coefficients. Figure 3 shows a two dimensional DCT frequencies from the RGB DCT image of 8 X8 pixels. Figure 3 Two-dimensional DCT frequencies from the RGB DCT image based on 8 X8 pixels 3. SUPPORT VECTOR MACHINE Support vector machines (SVM) also support vector networks [25] are supervised learning models with associated learning algorithms that analyses data used for classification and regression analysis. Based on training example set, each marked as belonging to one of two
  • 4. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017 4 categories, since SVM builds a model that assigns new examples to one category or to the other. In Linear SVM a training dataset of n points of the form as in the figure 4 below where the yi are either 1 or −1, each indicating the class to which the point belongs. Each is a p-dimensional real vector. We want to find the "maximum-margin hyperplane that divides the group of points for which from the group of points for which , which is defined so that the distance between the hyper-plane and the nearest point from either group is maximized. Any hyperplane can be written as the set of points satisfying where is the (not necessarily normalized) normal vector to the hyperplane. The parameter determines the offset of the hyperplane from the origin along the normal vector . Figure 4 Linear SVM classifier 4. THE LITERATURE REVIEW Many researches were done on Steganography because it is very important in computer multimedia fields, internet fields and in security systems. In addition, it is very important to know how much data can be concealed without image distortion. In literature, the techniques of steganography and its implementation were explained by J.R.Krenn in [1]. In [5], Chen Ming, et. al. focused on the steganography tools algorithms. Based on the analyses of the algorithms, various tools are divided into five categories: (1). Spatial domain based steganography tools; (2). Transform domain based steganography tools; (3). Document based steganography tools; (4) File structure based Steganography tools; (5) other categories, e.g. video compress encoding and spread spectrum technique based. Deshpande Neeta, et. al. [9], they proposed the Least Significant Bit embedding technique suggests that data can be hidden in the least significant bits (LSB) of the cover image and the human eye would be unable to see the hidden data in the cover image. They explained the LSB embedding technique and presents the evaluation results for 2, 4, 6 (LSB) for a PNG images and a .bmp images. In [10] K.B.Raja, et. al., they proposed a challenging task of transferring the hidden data to the cover without being detected. In addition, they used compression techniques on raw images to
  • 5. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017 enhance the security of the payload. Vijay Kumar Sharma, steganography algorithm based on operation to ensure the security against the steganalysis attack. proposed a new steganography technique and image quality, they embeds the secret messages in frequency domain was divided into two modes and 5 cases. Ane bitmap images with almost no perceptible difference between the original image and image. Others in [14] they discusse proposed a novel technique to hide data in a colorful image using least significant bit. Hassan Mathkour,et. al. in [15] they presented steganography techniques that takes the advantages of the strengths and avoids the limitations Finally, in [17] MamtaJuneja, et. al. based on LSB and the RSA encryption t 5. THE PROPOSED APPROACH In this paper we use the SVM classifier for training DCT Appling the linear SVM algorithm. DCT2 is used as shown in the equation 1 Equation (1) DCT2 algorithm. 5.1 DCT FEATURES EXTRACTION AND COVER IMAGES ALGORITHM The proposed system has been designed to hide the secret message in the cover image following algorithm shows the process of hidden a message: The proposed algorithm 1 and methodology is shown in figure 5 and following steps: The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017 enhance the security of the payload. Vijay Kumar Sharma, et. al. [11] the proposed a based on 8bit gray scale or 24bit color image, they used the operation to ensure the security against the steganalysis attack. Other researchers in proposed a new steganography technique based on different users demands on hiding capacity embeds the secret messages in frequency domain the proposed algorithm divided into two modes and 5 cases. Aneesh Jain, et. al. [13] they were hide the data in a almost no perceptible difference between the original image and discussed a survey of general steganography techniques and they echnique to hide data in a colorful image using least significant bit. Hassan in [15] they analyzed and evaluated the strengths and weaknesses of the presented steganography techniques. In addition, they proposed a robust steganography technique advantages of the strengths and avoids the limitations of the studied techniques MamtaJuneja, et. al. they proposed a Robust image steganography technique RSA encryption technique. PPROACH In this paper we use the SVM classifier for training DCT Appling the linear SVM algorithm. DCT2 is used as shown in the equation 1. XTRACTION AND SVM TRAINING PROCESS FOR THE LGORITHM. The proposed system has been designed to hide the secret message in the cover image shows the process of hidden a message: and methodology is shown in figure 5 and in our algorithm we use the The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017 5 the proposed a new they used the logical r researchers in [12] they based on different users demands on hiding capacity the proposed algorithm they were hide the data in a almost no perceptible difference between the original image and the result techniques and they echnique to hide data in a colorful image using least significant bit. Hassan the strengths and weaknesses of the robust steganography technique of the studied techniques. a Robust image steganography technique In this paper we use the SVM classifier for training DCT Appling the linear SVM algorithm. HE ORIGINAL The proposed system has been designed to hide the secret message in the cover image, the n our algorithm we use the
  • 6. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017 6 Figure 5 the proposed algorithm and methodology The proposed algorithm and methodology are tested and the results are shown the following figures. Figure 6 shows the cover original image with size 256 *256 which used to hide the message. Figure 7 shows the original message that used to hide in the cover image of size of 64* 64. Figure 8 shows the stego image after hiding the secrete in the cover image.
  • 7. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017 7 Figure 8 Stego image size 256*256 The proposed algorithm is implemented and tested and shows a significant results. To show the algorithm accuracy and performance many comparisons is done. The PSNR comparison is PSNR 44.3058 dB and the histogram between the original and stego images as shown in figure 9 and figure 10. Figure 10 Histogram of cover image and stego image
  • 8. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017 8 5.2 IDCT FEATURES EXTRACTION AND SVM TRAINING PROCESS FOR THE STEGO IMAGE ALGORITHM. The next step of the proposed algorithm is to extracting the secret image from the stego image as shown in Algorithm 2 and in the methodology in figure 11. Figure 10 the proposed algorithm to regenerate the secret image from the stego image 6. SYSTEM IMPLEMENTATION This system was implemented using Matlab programming language over a PC Core i7 CPU with 8 GB RAM on Windows 7 Operating System. Many other applications were running such as anti-virus application which may be effect the performance rate. The proposed system is tested for many images width different sizes and different resolutions, and it shows significant results based on DCT and SVM classifier. The proposed algorithm was tested for processes; the process of hiding the secret message in the cover image and the process of retrieving the secret image from the stego image and show good results. The proposed system is implemented and tested using many images width different sizes and different resolutions, and it shows significant results using the proposed three layer DCT methods and SVM classifier.
  • 9. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017 9 Many experiments were done using the proposed algorithm and the results are analyzed and reported. Table 1 shows the comparisons of PSNR between cover image and stego image. In addition table 2 shows the comparisons of PSNR between secret and message image. Table 1 Result of PSNR between cover and stego image Table 2 Result of PSNR between secret and message image The tables 1 and 2 show a significant improvement results based on the ratio between the maximum possible power of a signal and the power of corrupting noise that affects the fidelity of the two compared images. 7. CONCLUSIONS The proposed approach shows significant results based DCT features and the using of fast linear SVM classifier that used in both processes (hiding and retrieving). Moreover, the using of the three layer of a color image based on RGB over DCT features add significant improves in the performance and the accuracy. The future work may be done by using other classifier and other features and compare the results. REFERENCES [1] J.R. Krenn, “Steganography and Steganalysis”, January 2004. [2] BeenishMehboob and Rashid Aziz Faruqui, “A Steganography Implementation”, IEEE -4244-2427- 6/08/ 2008. [3] M. M. Amin, M. Salleh, S. Ibrahim, M.R.Katmin, M.Z.I. Shamsuddin, “Information Hiding using Steganography” Proceedings of 4th National Conference on Telecommunication Technology, Shah Alam, Malaysia, 2003. [4] K Suresh Babu, K B Raja, Kiran Kumar K, Manjula Devi T H, Venugopal K R, L M Patnaik, “Authentication of Secret Information in Image Steganography”. [5] Chen Ming, Zhang Ru, NiuXinxin, Yang Yixian, “Analysis of Current Steganography Tools: Classifications & Features” , International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP'06),IEEE- 0-7695-2745-0/06 2006. [6] Ahmed, N.; Natarajan, T.; Rao, K. R. (January 1974), "Discrete Cosine Transform", IEEE Transactions on Computers C–23 (1): 90–93, doi:10.1109/T-C.1974.223784. [7] Rao, K; Yip, P (1990), Discrete Cosine Transform: Algorithms, Advantages, Applications, Boston: Academic Press, ISBN 0-12-580203-X [8] NageswaraRaoThota, Srinivasa Kumar Devireddy, “Image Compression Using Discrete Cosine Transform”, Georgian Electronic Scientific Journal: Computer Science and Telecommunications, No.3 (17), 2008.
  • 10. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017 10 [9] Deshpande Neeta, KamalapurSnehal, Daisy Jacobs, “Implementation of LSB Steganography and Its Evaluation for Various Bits”, 2004. [10] K.B.Raja, C.R.Chowdary, Venugopal K R, L.M.Patnaik, “A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images”, IEEE-0-7803-9588-3/05 2005. [11] Vijay KumarSharma, Vishalshrivastava, “A Steganography Algorithm for Hiding Images by improved LSB substitution by minize detection.”Journal of Theoretical and Applied Information Technology, Vol. 36 No.1, ISSN: 1992-8645, 15th February 2012. [12] Po-Yueh Chen and Hung-Ju Lin, “A DWT Based Approach for Image Steganography”,International Journal of Applied Science and Engineering 4, 3: 275-290, 2006. [13] AneeshJain,IndranilSen. Gupta, “A JPEG Compression Resistant Steganography Scheme for Raster Graphics Images”,IEEE-1-4244-1272-2/07 2007. [14] BeenishMehboob and Rashid Aziz Faruqui, “A Steganography Implementation”, IEEE -4244-2427- 6/08 2008. [15] Hassan Mathkour, Batool Al-Sadoon, AmeurTouir, “A New Image Steganography Technique”,IEEE- 978-1-4244-2108-4/08 2008. [16] NageswaraRaoThota, Srinivasa Kumar Devireddy, “Image Compression Using Discrete Cosine Transform”, Georgian Electronic Scientific Journal: Computer Science and Telecommunications, No.3 (17), 2008. [17] MamtaJuneja,Parvinder Singh Sandhu, “Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption”, International Conference on Advances in Recent Technologies in Communication and Computing, 2009. [18] Vijay Kumar, Dinesh Kumar, “Performance Evaluation of DWT Based Image Steganography” ,IEEE- 978-1-4244-4791-6/10 2010. [19] Ali Al-Ataby and Fawzi Al-Naima, “A Modified High Capacity Image Steganography Technique Based on Wavelet Transform” The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010. [20] T. Narasimmalou, Allen Joseph .R, “Optimized Discrete Wavelet Transform based Steganography” , IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT),2012. [21] NedaRaftari and Amir MasoudEftekhariMoghadam, “Digital Image Steganography Based on Assignment Algorithm and Combination of DCT-IWT”, Fourth International Conference on Computational Intelligence, Communication Systems and Networks, 2012. [22] S. M. Mohadeseh, N. Hossein, "The pair-wise LSB matching steganography with a discrete quantum behaved Gravitational Search Algorithm", Journal of Intelligent & Fuzzy Systems, vol. 30, no. 3, pp. 1547-1556, 2016. [23] Mamta Juneja and Parvinder Singh Sandhu, “A New Approach for Information security using an Improved Steganography Technique”, Journal of Info.Pro.Systems, Vol 9, No:3, pp.405-424, (2013) . [24] Tomas Filler, Student Member, IEEE, Jan Judas and Jessica Fridrich, Member, IEEE, (2010) “Minimizing Additive Distortion in Steganography using Syndrome Trellis Codes”, IEEE Article, pp.1-17. [25] Cortes, C.; Vapnik, V. "Support-vector networks". Machine Learning. 20 (3): 273–297. doi:10.1007/BF00994018, (1995).