TITLE

ContSteg: Contourlet-Based Steganography Method

AUTHOR(S)
Sajedi, Hedieh; Jamzad, Mansour
PUB. DATE
October 2009
SOURCE
Wireless Sensor Network;Oct2009, Vol. 1 Issue 3, p163
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
A category of techniques for secret data communication called steganography hides data in multimedia mediums. It involves embedding secret data into a cover-medium by means of small perceptible and statistical degradation. In this paper, a new adaptive steganography method based on contourlet transform is presented that provides large embedding capacity. We called the proposed method ContSteg. In contourlet decomposition of an image, edges are represented by the coefficients with large magnitudes. In ContSteg, these coefficients are considered for data embedding because human eyes are less sensitive in edgy and non-smooth regions of images. For embedding the secret data, contourlet subbands are divided into 4x4 blocks. Each bit of secret data is hidden by exchanging the value of two coefficients in a block of contourlet coefficients. According to the experimental results, the proposed method is capable of providing a larger embedding capacity without causing noticeable distortions of stego-images in comparison with a similar wavelet-based steganography approach. The result of examining the proposed method with two of the most powerful steganalysis algorithms show that we could successfully embed data in cover-images with the average embedding capacity of 0.05 bits per pixel.
ACCESSION #
44959429

 

Related Articles

  • Research on DOA Estimation of Multi-Component LFM Signals Based on the FRFT. Haitao Qu; Rihua Wang; Wu Qu; Peng Zhao // Wireless Sensor Network;Oct2009, Vol. 1 Issue 3, p171 

    A novel algorithm for the direction of arrival (DOA) estimation based on the fractional Fourier transform (FRFT) is proposed. Firstly, using the properties of FRFT and mask processing, Multi-component LFM signals are filtered and demodulated into a number of stationary single frequency signals....

  • Data Encryption and Decryption Using RSA Algorithm in a Network Environment. Goshwe, Nentawe Y. // International Journal of Computer Science & Network Security;May2014, Vol. 14 Issue 5, p82 

    One of the principal challenges of resource sharing on data communication network is its security. This is premised on the fact that once there is connectivity between computers sharing some resources, the issue of data security becomes critical. This paper presents a design of data encryption...

  • An Imperceptible LSB Based Image Watermarking Algorithm. Abraham, Jobin // International Journal of Advanced Research in Computer Science;Nov/Dec2011, Vol. 2 Issue 6, p429 

    The main objective of digital watermarking is copyright protection of multimedia documents. A simple and fast blind watermarking algorithm applicable to any grayscale image is proposed in this paper. The watermark is embedded in the least significant bits of the original image. The algorithm is...

  • Detail Power Analysis of the SHA-3 Hashing Algorithm Candidates on Xilinx Spartan-3E. Jaffar, Amar; Martinez, Christopher J. // International Journal of Computer & Electrical Engineering;Aug2013, Vol. 5 Issue 4, p410 

    The United States National Institute of Standards and Technology (NIST) created an open competition to find a new standard for cryptographic hashing in 2007. The competition was composed of a number of rounds that ended with 5 finalists (BLAKE, Grostl, JH, Keccak, Skein) in December of 2010....

  • A New Approach for Chaotic Encrypted Data Hiding in Color Image. Talee, Ghada TH.; Jelmeran, Melad J.; Mohammed, Saja J. // International Journal of Computer Applications;Jan2014, Vol. 86, p23 

    Sending encrypted messages frequently will draw the attention of third parties, i.e. crackers and hackers, perhaps causing attempts and revealing the original messages. In digital world, Steganography is introduced to hide the existence of the communication by concealing encryption message...

  • Research on General Permutation Encryption Module based on Chaos Theory. Wenjie Sun // Applied Mechanics & Materials;2014, Issue 686, p381 

    Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modern cryptology. For example, in digital image encryption system, substitution can disrupt the original...

  • A chaotic block encryption algorithm. WEI Feng // Journal of Zhengzhou University of Light Industry, Natural Scien;Dec2014, Vol. 29 Issue 6, p73 

    Aiming at the security problem of chaos theory in cryptography application, a chaotic block encryption algorithm was designed based on the theory of discrete coupled map lattice and asymptotic deterministic randomness. The algorithm used aymptotic deterministic randomness key to diffuse the...

  • Cryptanalysis of Blind Signature Schemes. Singh, Nitu; Das, Sumanjit // International Journal of Computer Science & Network Security;May2014, Vol. 14 Issue 5, p73 

    Security of the consumer's data over internet is the major problem in present time. In this paper we have analyzed blind signature schemes based on RSA and with taking advantage of elliptic curve cryptography to achieve the security goals. Blind signature scheme is one of the security protocol...

  • A Survey On Some Encryption Algorithms And Verification Of RSA Technique. Al Hadi, Abdul Hai // International Journal of Scientific & Technology Research;Dec2013, Vol. 2 Issue 12, p285 

    Information security becomes much important in data storage and transmission. The term information security refers to the processes and methodologies which are designed and implemented to protect data from unauthorized access, use, misuse, disclosure, modification or disruption. Encryption...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics