skip to main content
10.1145/2677855.2677937acmotherconferencesArticle/Chapter ViewAbstractPublication PagesictcsConference Proceedingsconference-collections
research-article

Performance Analysis of Digital Image Steganographic Algorithm

Authors Info & Claims
Published:27 October 2014Publication History

ABSTRACT

Steganography is the technique with which the confidential data is hidden under the cover medium such as image, without reflecting any clue on the cover image. Many algorithms are designed to provide the security for the communication of data over the Internet. The good steganographic algorithm is identified by the performance of the algorithm measured with the help of the parameters such as PSNR, MSE, robustness and capacity to hide the information in the cover image. This paper analyzed the Digital Image Steganographic algorithms in spatial and frequency domain.

References

  1. Chi-Kwong Chan, Cheng, L.M. 2004. Hiding data in images by simple LSB substitution. Pattern Recognition Society 37, pp. 469--474, Published by Elsevier Ltd.Google ScholarGoogle ScholarCross RefCross Ref
  2. Barni, M., (2001) "Improved Wavelet-Based Watermarking Through Pixel-Wise Masking", IEEE Transactions on Image Processing, Vol. 10, No. 5, ISSN: 1057-7149, pp. 783--791. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Fan-Hui Kong, (2009) "Image Retrieval using both Color and Texture Features", Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding, IEEE, vol. 4, pp.12--15.Google ScholarGoogle Scholar
  4. Demirel, H., Jafari, G. A., (2011) "Image Resolution Enhancement by Using Discrete and Stationary Wavelet Decomposition", IEEE Transactions on Image Processing, Vol. 20, No.5, pp. 1458--1460. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Fang, J. Liu, Gu, W., Tang, Y., (2011) "A method to improve the image enhancement result based on image fusion", International Conference on Multimedia Technology (ICMT), Hangzhou, pp. 55--58.Google ScholarGoogle Scholar
  6. Provos, N. Honeyman, P., (2003) "Hide and seek: an introduction to steganography", Security & Privacy, IEEE Journals & Magazines, Vol. 1, no. 3, pp. 32--44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Bender, D. G., Morimoto, N., Lu, A., (2010) "Techniques for data hiding", IBM Systems Journal, Vol. 35, No. 3 & 4, pp. 313--336. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Ker, A.D., (2005) "Steganalysis of LSB matching in grayscale images", Signal Processing Letters, IEEE, vol. 12, no.6, pp.441--444.Google ScholarGoogle Scholar
  9. Cheddad, A. Condell, J. Curran, K. McKevitt, P., (2010) "Digital image steganography: Survey and analysis of current methods", Signal Processing 90, pp. 727--752. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Yoo, J.-C., Ahn, C.W., (2012) "Image matching using peak signal-to-noise ratio-based occlusion detection", IEEE, Image Processing, IET, vol. 6, no. 5, pp. 483--495.Google ScholarGoogle Scholar
  11. Gonzalez, R.C., Woods, R.E., Eddins, S.L., (2010) "Digital Image Processing Using Matlab", Second Edition, Tata McGraw Hill Education Private Limited, New Delhi, ISBN-13: 978-0-07-070262-2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Wu, D.-C., Tsai, W.-H., (2003) "A steganographic method for images by pixel-value differencing", Pattern Recognition Letters 24, Published by Elsevier, pp. 1613--1626. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Wang, H., Wang, S., (2004) "Cyber warfare: Steganography vs. Steganalysis", Communications of the ACM, vol. 47, no. 10 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Marvel, L.M., Boncelet Jr., C.G., Retter, C., (1999) "Spread Spectrum Steganography", IEEE Transactions on image processing, vol. 8, no. 8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Chan C. K., Cheng, L., (2004) "Hiding data in images by simple LSB substitution", Pattern Recognition Society, Published by Elsevier, vol. 37, no. 3, pp. 469--474.Google ScholarGoogle Scholar
  16. Hashad, A.I., Madani, A.S., Wahdan, A.E.M.A., (2005) "A robust steganography technique using discrete cosine transform insertion", Enabling Technologies for the New Knowledge Society: ITI 3rd International Conference on Information and Communications Technology, Cairo, pp. 255--264.Google ScholarGoogle ScholarCross RefCross Ref
  17. Sakr, A.S., Ibrahem, H.M., Abdullkader, H.M. Amin, M., (2012) "A steganographic method based on DCT and new quantization technique", 22nd International Conference on Computer Theory and Applications (ICCTA), Alexandria, pp. 187--191.Google ScholarGoogle ScholarCross RefCross Ref
  18. Kumar, V., Kumar, D., (2010) "Performance evaluation of DWT based image steganography", IEEE 2nd International Advance Computing Conference (IACC), Patiala, pp. 223--228.Google ScholarGoogle ScholarCross RefCross Ref
  19. Shejul, A.A., Kulkarni, U.L., (2010) "A DWT Based Approach for Steganography using Biometrics", International Conference on Data Storage and Data Engineering (DSDE), Bangalore, pp. 39--43. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Ghasemi, E. Shanbehzadeh J., ZahirAzami, B. (2011) "A steganographic method based on Integer Wavelet Transform and Genetic Algorithm", International Conference on Communications and Signal Processing (ICCSP), Calicut, pp. 42--45.Google ScholarGoogle ScholarCross RefCross Ref
  21. Hemalatha, S., Acharya, U.D., Renuka, A., Kamath, P.R. (2012) "A secure image steganography technique using Integer Wavelet Transform", World Congress on Information and Communication Technologies (WICT), Trivandrum, pp.755--758.Google ScholarGoogle ScholarCross RefCross Ref
  22. Sun, F. Liu. (2010) "Selecting Cover for Image Steganography by Correlation Coefficient", Second International Workshop on Education Technology and Computer Science (ETCS), Wuhan, vol.2, pp. 159--162.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICTCS '14: Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies
    November 2014
    559 pages
    ISBN:9781450332163
    DOI:10.1145/2677855

    Copyright © 2014 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 27 October 2014

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    ICTCS '14 Paper Acceptance Rate97of270submissions,36%Overall Acceptance Rate97of270submissions,36%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader