IJTEEE

Open Access Journal of Scientific, Technology & Engineering Research


International Journal of Technology Enhancements and Emerging Engineering Research (ISSN 2347-4289)
QUICK LINKS
CURRENT PUBLICATIONS



IJTEEE >> Volume 3 - Issue 4, April 2015 Edition



International Journal of Technology Enhancements and Emerging Engineering Research  
International Journal of Technology Enhancements and Emerging Engineering Research

Website: http://www.ijteee.org

ISSN 2347-4289



Steganography Using DCT And Wavelet Transform

[Full Text]

 

AUTHOR(S)

S. Thenmozhy, Student, DR. S. J. S Paul, R.Suganya, DR. S. J. S Paul, S.Jayalakshmi, R. Rajasekar, DR. S. J. S Paul Memorial, DR. S. J. S Paul

 

KEYWORDS

Keywords: DCT, Wavelet Transform, PSNR value, Steganography

 

ABSTRACT

Abstract: Steganography is the technique used for communicating secret data. It is used for security purpose. The data can be image, video, aud io or text. We have kept secret data(image) under the cover image. In this work, we have used two algorithm one is DCT (Discret Cosine Transform) and the other one is Wavelet Transform.In DCT based technique insertion of secret information over the cover image depends upon the DCT coefficients. The main aim of our paper is to compare the PSNR value for DCT and Wavelet Transform. It is found that the PSNR value for DCT is better than the PSNR value for wavelet.

 

REFERENCES

[1] A chedded, J.Condell,K Curran, and P. McKevitt, “Digital image steganography: survey and analysis of current methods”, signal processing, vol.90,pp.727-752,2010.

[2] N. Hamid, A. Yahya, R B.Ahmad and Osamah M. Al-Qershi “Image steganography techniques: an overview International journal of computer science and security(IJCSS),Vol.6, No. 3, 2012.

[3] T. Morkel, JHP. Eloff and MS. Olivier, “An Overview An overview of image steganography,” in HS Venter, JHP Eloff, L Labuschagne and MM Eloff(eds), Proceedings of the fifth annual information security south Africa conference (ISSA2005), Sandton, south Africa, june/july 2005 (published electronically).

[4] A.Rocha, and S. Goldenstein,”Steganography and steganalysis in multimedia : hype or hallelujah?”, RITA, Vol. 15, No. 1, 2008.

[5] C. –T. Li, Y. Li, and C.H. Wei, “Protection of digital mammograms on PACSs using data hiding technique”, International journal of Digital Crime and Forensics , Vol. 1, No.1, pp. 75-88.

[6] H. S. Majunatha Reddy, and K. B. Raja, “High capacity and security steganograph using wavelet transform”, International journal of computer science and security (IJCSS), Vol. 3, issues 6, 2010, 462-472.

[7] A-A. Ali and A-N. Fawzi , “ A modified high capacity image steganography technique based on wavelet transform”, The international arab journal of information technology, Vol. 7, No. 4, October 2010, pp.358-364.

[8] R. O.E1 Safy, H. H. Zayed, and A. E. Dessiouki, “An adaptive steganographic technique based on integer wavelet transform”, International conference on networking and media converence (ICNMM 2009), pp.111-117, March 2009 doi: 10.1109/ICNM.2009.4907200.

[9] C,-C. Lin, and P.-F.SHIU,”High Capacity Data Hiding Scheme for DCT- basedImages”, Journal of Information Hiding and Multimedia Signal Processing 2010 ISSN 2073-4212, Ubiquitous International, Vol 1, No.3, July 2010.

[10] F. S. Abed, N.A. A. Mustafa,”A Proposed Technique for Information Hiding Based on DCT”, International Journal of Advancements in Computing Technology Vol. 2, No.5, December 2010,pp.140-152.