Open Access Open Access  Restricted Access Subscription or Fee Access

A Steganography Method Based Upon JPEG and Quantization Table Modification

B.M. Alaudeen, G. Tholkappia Arasu

Abstract


Steganography is an alternative to cryptography in which the secret data is embedded into the carrier in such way that only carrier is visible which is sent from transmitter to receiver without scrambling. The combination of cryptography and steganography provide high level security to the secrete information. Cover image is known as carrier image and is the original
image in which the secret data i.e., the payload is embedded. The unified image obtained after embedding the payload into the cover image is called the stego image. The recent boom in IT industry facilitates embedding data and security issues effectively. This paper presents an efficient authentication method for JPEG images based on genetic algorithms (GA). The current authentication methods for JPEG images require the receivers to know the quantization table beforehand in order to authenticate the images. Moreover, the quantization tables used in the JPEG compression are different for different quality factors, thus increasing the burden on the receivers to maintain several quantization tables. We propose a novel GAbased method which possesses three advantages. First, the computation at the receiver end is implified.

Cite this Article
Alaudeen BM, Tholkappia Arasu G..A Steganography Method Based Upon
JPEG and Quantization Table Modification. Journal of Advanced
Database Management & Systems. 2016; 3(2): 17–20p.


Keywords


Genetic algorithms, steganography, JPEG-JSteg

Full Text:

PDF

References


Raja KB, Chowdary CR, Venugopal KR, et al. A Secure Steganography using LSB, DCT and Compression Techniques on

Raw Images. IEEE International Conference on Intelligence Sensing and Information Processing. 2005; 171–176p.

Kumar V, Kumar D. Performance Evaluation of DWT Based Image Steganography. IEEE International Conference on Advance Computing. 2010; 223–228p.

Weiqi Luo, Fangjun Huang, Jiwu Huang. Edge Adaptive Image Steganography Based on LSB Matching Revisited. IEEE

Trans Inf Forensic Secur. 2010; 5(2): 201–214p.

El Safy RO, Zayed HH, El Dessouki A. An Adaptive Steganographic Technique Based on Integer Wavelet Transform. International Conference on Networking and Media Convergence. 2009; 111–117p.

Mathkour H, Al-Sadoon B, Touir A. A New Image Steganography Technique. International Conference on Wireless Communications, Networking and Mobile Computing. 2008; 1–4p.

Vijaylakshmi V, Zayaraz G, Nagaraj V. A Modulo Based LSB Steganography Method. International Conference on Control, Automation, Communication and Energy Conservation. 2009; 1–4p.

Wien Hong, Tung-Shou Chen, Chih-Wei. Lossless Steganography for AMBT CCompressed Images. Congress on Image and Signal Processing. 2008; 13–17p.

Naji AW, Gunawan Teddy S, Hameed Shihab A, et al. Stego-Analysis Chain, Session One. International Spring Conference on Computer Science and Information Technology. 2009; 405–409p.

Hassan Shirali-Shahreza M, Mohammad Shirali-Shahreza. A New Synonym Text Steganography. International Conference on Intelligent Information Hiding and Multimedia Signal Processing. 2008; 1524–1526p.

Vladimir Banoci, Gabriel Bugar, Dusan Levicky. Steganography Systems by using CDMA Techniques. International Conference on Radio Electronika. 2009; 183–186p.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/