Skip to main content

Payload Encoding for Secure Extraction Process in Multiple Frequency Domain Steganography

  • Conference paper
Networked Digital Technologies (NDT 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 87))

Included in the following conference series:

  • 1329 Accesses

Abstract

In this paper, we used a new technique for payload encoding in hided text in a bitmap image. The technique based on using an index of the dictionary representing the characters of the secret messages instead of the characters themselves. The technique uses multiple frequency domains for embedding these indexes in an arbitrary chosen bitmap image. By using discrete cosine transform DCT, discrete wavelets transform DWT, and a combination of both of them. We test the technique in a software package designed specially for implementing this technique, and we got very good results in terms of capacity of hiding, imperceptibility which are the most two important properties of steganography, the time of hiding the text, and the security issues, especially by using a new approach in payload encoding that gives the technique a powerful behavior in both encoding and extracting sides. Imperceptibility; improved by increasing PSNR (between 106.58 and 122.28 db), security; improved by using an encrypted Stego-key and secret message by the dictionary, capacity; improved by a factor = 1.3 by encoding the secret message characters with 6-bits only and embedding the secret message in all three color components RGB, efficiency; improved by having a embedding/ extraction time in msec (for example 256x256 Lena image it is 638 msec, in the worst case).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Moerland, T.: Steganography and Steganalysis. Leiden Institute of Advanced Computing Science, http://www.liacs.nl/home/tmoerl/privtech.pdf

  2. Marvel, L.M., Boncelet Jr., C.G., Retter, C.: Spread Spectrum Steganography. IEEE Transactions on image processing 8, 8 (1999)

    Article  Google Scholar 

  3. Wang, H., Wang, S.: Cyber warfare: Steganography vs. Steganalysis. Communications of the ACM 47, 10 (2004)

    Google Scholar 

  4. Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE Journal of selected Areasin Communications (May 1998)

    Google Scholar 

  5. Johnson, N.F., Jajodia, S.: Exploring Steganography: Seeing the Unseen. Computer Journal (February 1998)

    Google Scholar 

  6. Tariq, A., Smko, R., Salem, O.: Dictionary Based Steganography Using Multiple Frequency Domain. Gulf University Journal 1(1) (2009)

    Google Scholar 

  7. Owens, M.: A discussion of covert channels and steganography. SANS Institute (2002)

    Google Scholar 

  8. Dunbar, B.: Steganographic techniques and their use in an Open-Systems environment. SANS Institute (January 2002)

    Google Scholar 

  9. Silman, J.: Steganography and Steganalysis: An Overview. SANS Institute (2001)

    Google Scholar 

  10. Lee, Y.K., Chen, L.H.: High capacity image steganographic model. Visual Image Signal Processing 147, 3 (2000)

    Google Scholar 

  11. Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, p. 306. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  12. Chen, P.-C.: On the Study of Watermarking Application in WWW-Modeling, Performance, Analysis, and Applications of Digital Image Watermarking Systems. Master Thesis, National Tsing Hua University (May 1999)

    Google Scholar 

  13. Kurak, C., McHughes, J.: A Cautionary Note On Image Downgrading. In: Proceedings of IEEE Computer Security Application Conference 1992. IEEE Press, Los Alamitos (1992)

    Google Scholar 

  14. Zhao, J., Koch, E.: Embedding Robust Labels into Image for Copyright Protection. In: Proceedings of the International Conference of Intellectual Property Rights for Information, Knowledge and New Techniques. Oldenbourge Verlag, Munchen (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Smko, R., Almarimi, A., Negrat, K. (2010). Payload Encoding for Secure Extraction Process in Multiple Frequency Domain Steganography. In: Zavoral, F., Yaghob, J., Pichappan, P., El-Qawasmeh, E. (eds) Networked Digital Technologies. NDT 2010. Communications in Computer and Information Science, vol 87. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14292-5_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14292-5_32

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14291-8

  • Online ISBN: 978-3-642-14292-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics