Implementation of Variable Tone Variable Bits Gray-Scale Image Stegnography Using Discrete Cosine Transform
350
23-38. http://dx.doi.org/10.1007/3-540-61996-8_29
[4] K. Solanki, K. Sullivan and U. Madhow, Eds., “Maxi-
mizing Steganographic Embedding Efficiency by Com-
bining Hamming Codes and Wet Paper Codes,” Lecture
Notes in Computer Science, Vol. 5284, 2008, pp. 60-71.
[5] K. Ahsan and D. Kundur, “Practical Data Hiding in TCP/
IP”, Proceedings of the Workshop on Multimedia Security
at ACM Multimedia, 2002.
[6] R. J. Anderson and F. A. P. Petitcolas, “On the Limits of
Stegnography,” IEEE Journal of Selected Areas in Com-
munications, Vol. 16, No. 4, 1998, pp. 474-481.
http://dx.doi.org/10.1109/49.668971
[7] R. Crandall, “Some Notes on Stegnography,” Stegano-
graphy Mailing List, 1998.
http://os.inf.tu-dresden.de/westfeld/crandall.pdf
[8] F. Galand and G. Kabatiansky, “Information Hiding by
Coverings,” Proceedings of the IEEE Information Theory
Workshop, 2004, pp. 151-154.
[9] K. Cabeen and P. Gent, “Image Compression and Dis-
crete Cosine Transform,” College of Redwoods.
http://online.redwoods.cc.ca.us/instruct/darnold/LAPROJ/
Fall98/PKen/dct.pdf
[10] A. B. Watson, “Image Compression Using the Discrete
Cosine Transform,” NASA Ames Research Center, Mathe-
matica Journal, Vol. 4, No. 1, 1994, pp. 81-88.
[11] J. Fridrich, M. Goljan and R. Du, “Detecting LSB Steg-
anography in Color and Gray-Scale Images,” Magazine of
IEEE Multimedia, Special Issue on Multimedia and Secu-
rity, Vol. 8, No. 4, 2001, pp. 22-28.
[12] J. Bierbrauer and J. Fridrich, “Constructing Good Cover-
ing Codes for Applications in Stegnography,” Transac-
tions on Data Hiding and Multimedia Security, Springer,
Heidelberg, 2007. http://www.math.mtu.edu/jbierbra/
[13] N. Provos and P. Honeyman, “Hide and Seek: An Intro-
duction to Stegnography,” IEEE Security & Privacy, Vol.
1, No. 3, 2003, pp. 32-44.
[14] M. A. Shourian, R. C. Jain and Y.-S. Ho, “Dithered Qua n-
tization for Image Data Hiding in the DCT Domain,” Pro-
ceedings of IST 2003, 16-18 August 2003, Isfahan, pp. 171-
175.
[15] J. R. Krenn, “Stegnography and Steganalysis,” 2004.
[16] R.-J. Hwang, T. K. Shih and C.-H. Kao, “A Lossy Com-
pression Tolerant Data Hiding Method Based on JPEG
and VQ,” Journal of Internet Technology, Vol. 5, No. 3,
2004, pp. 171-178
[17] H.-W. Tseng and C.-C. Chang, “High Capacity Data Hi-
ding in JPEG Compressed Images,” Informatica, Vol. 15,
No. 1, 2004, pp. 127-142.
[18] Y. Park, H. Kang, K. Yamaguchi and K. Kobayashi, “In-
tegrity Verification of Secret Information in Image Steg-
anography,” Symposium on Information Theory and Its
Applications, Hakodate, 2006.
[19] N. Deshpande, K. Sneha and D. Jacobs, “Implementation
of LSB Stegnography and Its Evaluation for Various
Bits,” 1st International Conference on Digital Informa-
tion Management, Bangalore, 6 December 2006, pp. 173-
178. http://dx.doi.org/10.1109/ICDIM.2007.369349
[20] M. Chaumont and W. Puech, “DCT-Based Data Hiding
Method to Embed the Color Information in a JPEG Grey
Level Image,” 14th European Signal Processing Confer-
ence (EUSIPCO 2006), Florence, 4-8 September, 2006.
[21] A. Jain and I. S. Gupta, “A JPEG Compression Resistant
Stegnography Scheme for Raster Graphics Images,” IEEE
Region 10 Conference of TENCON, 30 October - 2 No-
vember 2007, Taipei, pp. 1-4.
[22] K. Wong, X. J. Qi and K. Tanaka, “A DCT Based Mod4
Stegnography Method,” Signal Processing, Vol. 87, No.
6, 2007, pp. 1251-1263.
http://dx.doi.org/10.1016/j.sigpro.2006.10.014
[23] T. Ishida, K. Yamawaki, H. Noda and M. Niimi, “Per-
formance Improvement of JPEG2000 Stegnography Us-
ing QIM,” Journal of Communication and Computer, Vol.
6, No. 1, 2009.
[24] C.-T. Tsai, C. Liaw, Y.-H. Liao and C.-H. Ko, “Conceal-
ing Information in Image Mosaics Based on Tile Image
Features,” Journal of the Chinese Institute of Engineers,
Vol. 34, No. 3, 2011, pp. 429-440.
http://dx.doi.org/10.1080/02533839.2011.565618
[25] C.-M. Wang and P.-C. Wang, “Data Hiding on Point-
Sampled Geometry,” Journal of the Chinese Institute of
Engineers, Vol. 29, No. 3, 2006, pp. 539-542.
[26] D. Bhattacharyya, T.-H. Kim and P. Dutta, “A Method of
Data Hiding in Audio Signal,” Journal of the Chinese In-
stitute of Engineers, Vol. 35, No. 5, 2012, pp. 523-528.
http://dx.doi.org/10.1080/02533839.2012.679054
[27] S. Khan, M. H. Yousaf and M. J. Akram, “Implementa-
tion of Variable Least Significant Bits Stegnography Us-
ing Decreasing Distance Decreasing Bits Algorithm,” In-
ternational Journal of Computer Science Issues, Vol. 8,
No. 6, 2011.
[28] S. Khan and M. H. Yousaf, “Implementation of VLSB
Stegnography Using Modular Distance Technique,” In-
novations and Advances in Computer, Information, Sys-
tems Sciences, and Engineering Lecture Notes in Electri-
cal Engineering, Vol. 152, 2013, pp. 511-525.
http://dx.doi.org/10.1007/978-1-4614-3535-8_43
[29] E. Walia and P. J. Navdeep, “An Analysis of LSB & DCT
Based Stegnography,” Global Journal of Computer Sci-
ence and Technology, Vol. 10, No. 1, 2010, pp. 4-8.
[30] E. Neuman, “MATLA B Tutorials,” Department of Ma-
thematics, Board of Trustees, Southem Illinois University,
Carbondale, 2009.
[31] R. C. Gonzalez and R. E. Woods, “Digital Image Proc-
essing,” 2nd Edition, Prentice-Hall, 2002.
Open Access JSIP