A New Steganography Technique using JPEG Images
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 11
Abstract
Steganography is a form of security technique that using ambiguity to hide a secret message within an ordinary message between senders and receivers. In this paper, we propose a new steganography technique for hiding data in Joint Photo-graphic Experts Group (JPEG) images as it is the most known type of image compression between the lossy type compressions. Our proposed work is based on lossy compression (frequency domain) in images. This type of compression is susceptible to change even for the smallest amount of change which raises a difficulty to find a proper location to embed data. This should be done without affecting the image quality and without allowing anyone to notice the hidden message. From the senders side, first, we divide the image into 8*8 blocks, then apply a Discrete Cosine Transform (DCT), Quantization, and zigzag processes respectively. Second, the secret message is embedded at the end of each selected zigzag block array using the best method of our experimental results. Third, the rest of the code applies the Run Length Code (RLC), Different Pulse Code Modularity (DPCM) and Huffman encoder to obtain the compressed image that includes the embedded message. From the receiver’s side, we will reverse the previous steps to extract the secret message using an encrypted shared key via a secure channel. Our experimental results show that the best array content size of zigzag computed coefficients are between 1 to 20. This selection allows us to utilize more than half of the image blocks to embed the secret message and the difference between the cover image that holds the secret message and the original cover image is very minimal and hard to detect.
Authors and Affiliations
Rand A. Watheq, Fadi Almasalha, Mahmoud H. Qutqut
Camera Self-Calibration with Varying Intrinsic Parameters by an Unknown Three-Dimensional Scene
In the present paper, we will propose a new and robust method of camera self-calibration having varying intrinsic parameters from a sequence of images of an unknown 3D object. The projection of two points of the 3D scene...
Criminal Investigation EIDSS Based on Cooperative Mapping Mechanism
On purpose of improving the research in extension intelligence systems when the knowledge in hand is not sufficient, an intuition evidence model (IEM) based on human-computer cooperative is presented. From the initial in...
Towards Agile Implementation of Test Maturity Model Integration (TMMI) Level 2 using Scrum Practices
the software industry has invested the substantial effort to improve the quality of its products like ISO, CMMI and TMMI. Although applying of TMMI maturity criteria has a positive impact on product quality, test enginee...
Distance Prediction for Commercial Serial Crime Cases Using Time Delay Neural Networks
The prediction of the next serial criminal time is important in the field of criminology for preventing the recurring actions of serial criminals. In the associated dynamic systems, one of the main sources of instability...
A Review of Ontology Development Aspects
Although it is widely recognized that ontology is the main approach towards semantic interoperability among information systems and services, the understanding of ontology aspects among researchers is limited. To provide...