An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images
To prove the origin of images in social media, this work proposes an efficient JPEG image steganography approach. After structuring the cover image into blocks of 8*8 pixels, Discrete Cosine Transform is applied to each block of pixels. The latter are quantified using a quantization...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
European Alliance for Innovation (EAI)
2020-10-01
|
Series: | EAI Endorsed Transactions on Industrial Networks and Intelligent Systems |
Subjects: | |
Online Access: | https://eudl.eu/pdf/10.4108/eai.28-9-2020.166365 |
_version_ | 1818265200220962816 |
---|---|
author | Franklin Tchakounté Priva Kamdem Jean Kamgang Hortense Tchapgnouo Marcellin Atemkeng |
author_facet | Franklin Tchakounté Priva Kamdem Jean Kamgang Hortense Tchapgnouo Marcellin Atemkeng |
author_sort | Franklin Tchakounté |
collection | DOAJ |
description | To prove the origin of images in social media, this work proposes an efficient JPEG image steganography approach. After structuring the cover image into blocks of 8*8 pixels, Discrete Cosine Transform is applied to each block of pixels. The latter are quantified using a quantization table and a matrix of DC coefficients from quantized blocks of pixels, is obtained. Singular Value Decomposition is applied to the previous matrix and the secret message is inserted within singular vectors. For extraction purposes, previous transformations are followed reversely. An experimentation is made on seven images and results show that the proposed system outperforms similar studies in three aspects (i) it preserves stego image quality with PSNR of stego images varying between 38 and 54 (ii) it is able to insert a secret message of 257600 bits with the capacity of 4 bits per pixel (iii) it is robust and resistant to attacks such as histogram analysis and chi-square test. |
first_indexed | 2024-12-12T19:47:01Z |
format | Article |
id | doaj.art-71a11b7db492420ebf9a515176da3a21 |
institution | Directory Open Access Journal |
issn | 2410-0218 |
language | English |
last_indexed | 2024-12-12T19:47:01Z |
publishDate | 2020-10-01 |
publisher | European Alliance for Innovation (EAI) |
record_format | Article |
series | EAI Endorsed Transactions on Industrial Networks and Intelligent Systems |
spelling | doaj.art-71a11b7db492420ebf9a515176da3a212022-12-22T00:14:03ZengEuropean Alliance for Innovation (EAI)EAI Endorsed Transactions on Industrial Networks and Intelligent Systems2410-02182020-10-0172410.4108/eai.28-9-2020.166365An Efficient DCT-SVD Steganographic Approach Applied to JPEG ImagesFranklin Tchakounté0Priva Kamdem1Jean Kamgang2Hortense Tchapgnouo3Marcellin Atemkeng4Mathematics and Computer Science, Faculty of Science, University of Ngaoundéré, CameroonMathematics and Computer Science, Faculty of Science, University of Ngaoundéré, CameroonDepartment of Mathematics and Computer Science , National School of Agro-Industrial Science, University of Ngaoundéré, CameroonDepartment of Computer Science and Telecommunications, National School of Polytechnic of Maraoua, University of Maroua, CameroonDepartment of Mathematics, Rhodes University, 6140 Grahamstown, South AfricaTo prove the origin of images in social media, this work proposes an efficient JPEG image steganography approach. After structuring the cover image into blocks of 8*8 pixels, Discrete Cosine Transform is applied to each block of pixels. The latter are quantified using a quantization table and a matrix of DC coefficients from quantized blocks of pixels, is obtained. Singular Value Decomposition is applied to the previous matrix and the secret message is inserted within singular vectors. For extraction purposes, previous transformations are followed reversely. An experimentation is made on seven images and results show that the proposed system outperforms similar studies in three aspects (i) it preserves stego image quality with PSNR of stego images varying between 38 and 54 (ii) it is able to insert a secret message of 257600 bits with the capacity of 4 bits per pixel (iii) it is robust and resistant to attacks such as histogram analysis and chi-square test.https://eudl.eu/pdf/10.4108/eai.28-9-2020.166365image steganographyjpegdiscrete cosine transforminsertionsingular value decompositionquantizationattackssocial media |
spellingShingle | Franklin Tchakounté Priva Kamdem Jean Kamgang Hortense Tchapgnouo Marcellin Atemkeng An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images EAI Endorsed Transactions on Industrial Networks and Intelligent Systems image steganography jpeg discrete cosine transform insertion singular value decomposition quantization attacks social media |
title | An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images |
title_full | An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images |
title_fullStr | An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images |
title_full_unstemmed | An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images |
title_short | An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images |
title_sort | efficient dct svd steganographic approach applied to jpeg images |
topic | image steganography jpeg discrete cosine transform insertion singular value decomposition quantization attacks social media |
url | https://eudl.eu/pdf/10.4108/eai.28-9-2020.166365 |
work_keys_str_mv | AT franklintchakounte anefficientdctsvdsteganographicapproachappliedtojpegimages AT privakamdem anefficientdctsvdsteganographicapproachappliedtojpegimages AT jeankamgang anefficientdctsvdsteganographicapproachappliedtojpegimages AT hortensetchapgnouo anefficientdctsvdsteganographicapproachappliedtojpegimages AT marcellinatemkeng anefficientdctsvdsteganographicapproachappliedtojpegimages AT franklintchakounte efficientdctsvdsteganographicapproachappliedtojpegimages AT privakamdem efficientdctsvdsteganographicapproachappliedtojpegimages AT jeankamgang efficientdctsvdsteganographicapproachappliedtojpegimages AT hortensetchapgnouo efficientdctsvdsteganographicapproachappliedtojpegimages AT marcellinatemkeng efficientdctsvdsteganographicapproachappliedtojpegimages |