An Efficient Data Hiding Technique for Steganography

  IJPTT-book-cover
 
International Journal of P2P Network Trends and Technology (IJPTT)          
 
© 2014 by IJPTT Journal
Volume - 4 Issue - 1                           
Year of Publication : 2014
Authors :P. Karthiga Lakshmi

MLA

P. Karthiga Lakshmi , "An Efficient Data Hiding Technique for Steganography", International Journal of P2P Network Trends and Technology (IJPTT), V4(1):17-20 Jan - Feb 2014, ISSN:2249-2615, www.ijpttjournal.org. Published by Seventh Sense Research Group.

Abstract

Bose Chaudhuri Hochquenghem (BCH) based data hiding scheme for JPEG steganography is presented. Traditional data hiding approaches hide data into each block, where all the blocks are not overlapping each other. Two consecutive blocks can be overlapped to form a combined block which is larger than a single block, but smaller than two consecutive non overlapping blocks in size. In order to embed more amounts of data into the combined block than a single block. A way to get a joint solution for hiding data into two blocks with intersected coefficients such that any modification of the intersected area does not affect the data hiding process into both blocks. Due to hiding more amounts of data into the intersected area, embedding capacity is increased. The nonzero DCT coefficient stream is modified to achieve better steganalysis and to reduce the distortion impact after data hiding. Reducing distortion between the cover object and stego object is an important issue for steganography.

References

[1] Sachnev and Kim, Modified BCH data hiding scheme for JPEG Steganography,in Proc of 10th USENIX Security Symposium, Washington, DC, 24–24(2012).
[2] R Zhang, V Sachnev, HJ Kim, Fast BCH syndrome coding for steganography. Lect Notes Comput Sci. 5806, 48–58 (2009).
[3] V Sachnev, HJ Kim,R Zhang,Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding, in Proc of ACM Workshop on Multimedia and Security, Princeton, NJ, 131–139 (September 7–8,2009).
[4] J Fridrich, T Filler, Practical methods for minimizing embedding impact in steganography, in Proc EI SPIE, San Jose, CA, 6505,2–3 (2007).
[5] K Solanki, A Sakar, BS Manjunath, YASS: Yet another steganographic scheme that resists blind steganalysis. Lect Notes Comput Sci. 2939, 154–167 (2007).
[6] J Fridrich, Minimizing the embedding impact in steganography, in Proc of ACM Multimedia and Security Workshop, Geneva, Switzerland, 2–10 (September 26–27, 2006).
[7] H Noda, M Niimi, E Kawaguchi, Application of QIM with dead zone for histogram preserving JPEG steganography, in Proc of ICIP, Geneva, Italy,(2005).
[8] J Fridrich, M Goljan, D Soukal, Wet paper coding with improved embedding efficiency. IEEE Trans Inf Secur Forensics. 1(1),102–110 (2005).
[9] J Fridrich, M Goljan, D Soukal, Perturbed quantization steganography using wet paper codes, in Proc of ACM Workshop on Multimedia and Security, Magdeburg, Germany, Z–15 (September 20–21, 2004).
[10] J Eggers, R Bauml, B Girod, A communications approach to steganography, in Proc of EI SPIE, San Jose, CA, 4675, 26– 37 (2002).
[11] N Provos, Defending against statistical steganalysis, in Proc of 10th USENIX Security Symposium, Washington, DC, 24–24 (2001).

Keywords

BCH, Steganography, Less Detectable Data Hiding.