Abstract
In this paper, we used a new technique for payload encoding in hided text in a bitmap image. The technique based on using an index of the dictionary representing the characters of the secret messages instead of the characters themselves. The technique uses multiple frequency domains for embedding these indexes in an arbitrary chosen bitmap image. By using discrete cosine transform DCT, discrete wavelets transform DWT, and a combination of both of them. We test the technique in a software package designed specially for implementing this technique, and we got very good results in terms of capacity of hiding, imperceptibility which are the most two important properties of steganography, the time of hiding the text, and the security issues, especially by using a new approach in payload encoding that gives the technique a powerful behavior in both encoding and extracting sides. Imperceptibility; improved by increasing PSNR (between 106.58 and 122.28 db), security; improved by using an encrypted Stego-key and secret message by the dictionary, capacity; improved by a factor = 1.3 by encoding the secret message characters with 6-bits only and embedding the secret message in all three color components RGB, efficiency; improved by having a embedding/ extraction time in msec (for example 256x256 Lena image it is 638 msec, in the worst case).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Moerland, T.: Steganography and Steganalysis. Leiden Institute of Advanced Computing Science, http://www.liacs.nl/home/tmoerl/privtech.pdf
Marvel, L.M., Boncelet Jr., C.G., Retter, C.: Spread Spectrum Steganography. IEEE Transactions on image processing 8, 8 (1999)
Wang, H., Wang, S.: Cyber warfare: Steganography vs. Steganalysis. Communications of the ACMÂ 47, 10 (2004)
Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE Journal of selected Areasin Communications (May 1998)
Johnson, N.F., Jajodia, S.: Exploring Steganography: Seeing the Unseen. Computer Journal (February 1998)
Tariq, A., Smko, R., Salem, O.: Dictionary Based Steganography Using Multiple Frequency Domain. Gulf University Journal 1(1) (2009)
Owens, M.: A discussion of covert channels and steganography. SANS Institute (2002)
Dunbar, B.: Steganographic techniques and their use in an Open-Systems environment. SANS Institute (January 2002)
Silman, J.: Steganography and Steganalysis: An Overview. SANS Institute (2001)
Lee, Y.K., Chen, L.H.: High capacity image steganographic model. Visual Image Signal Processing 147, 3 (2000)
Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, p. 306. Springer, Heidelberg (1998)
Chen, P.-C.: On the Study of Watermarking Application in WWW-Modeling, Performance, Analysis, and Applications of Digital Image Watermarking Systems. Master Thesis, National Tsing Hua University (May 1999)
Kurak, C., McHughes, J.: A Cautionary Note On Image Downgrading. In: Proceedings of IEEE Computer Security Application Conference 1992. IEEE Press, Los Alamitos (1992)
Zhao, J., Koch, E.: Embedding Robust Labels into Image for Copyright Protection. In: Proceedings of the International Conference of Intellectual Property Rights for Information, Knowledge and New Techniques. Oldenbourge Verlag, Munchen (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Smko, R., Almarimi, A., Negrat, K. (2010). Payload Encoding for Secure Extraction Process in Multiple Frequency Domain Steganography. In: Zavoral, F., Yaghob, J., Pichappan, P., El-Qawasmeh, E. (eds) Networked Digital Technologies. NDT 2010. Communications in Computer and Information Science, vol 87. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14292-5_32
Download citation
DOI: https://doi.org/10.1007/978-3-642-14292-5_32
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14291-8
Online ISBN: 978-3-642-14292-5
eBook Packages: Computer ScienceComputer Science (R0)