Implementation of Variable Tone Variable Bits Gray-Scale Image Stegnography Using Discrete Cosine Transform

350

23-38. http://dx.doi.org/10.1007/3-540-61996-8_29

[4] K. Solanki, K. Sullivan and U. Madhow, Eds., “Maxi-

mizing Steganographic Embedding Efficiency by Com-

bining Hamming Codes and Wet Paper Codes,” Lecture

Notes in Computer Science, Vol. 5284, 2008, pp. 60-71.

[5] K. Ahsan and D. Kundur, “Practical Data Hiding in TCP/

IP”, Proceedings of the Workshop on Multimedia Security

at ACM Multimedia, 2002.

[6] R. J. Anderson and F. A. P. Petitcolas, “On the Limits of

Stegnography,” IEEE Journal of Selected Areas in Com-

munications, Vol. 16, No. 4, 1998, pp. 474-481.

http://dx.doi.org/10.1109/49.668971

[7] R. Crandall, “Some Notes on Stegnography,” Stegano-

graphy Mailing List, 1998.

http://os.inf.tu-dresden.de/westfeld/crandall.pdf

[8] F. Galand and G. Kabatiansky, “Information Hiding by

Coverings,” Proceedings of the IEEE Information Theory

Workshop, 2004, pp. 151-154.

[9] K. Cabeen and P. Gent, “Image Compression and Dis-

crete Cosine Transform,” College of Redwoods.

http://online.redwoods.cc.ca.us/instruct/darnold/LAPROJ/

Fall98/PKen/dct.pdf

[10] A. B. Watson, “Image Compression Using the Discrete

Cosine Transform,” NASA Ames Research Center, Mathe-

matica Journal, Vol. 4, No. 1, 1994, pp. 81-88.

[11] J. Fridrich, M. Goljan and R. Du, “Detecting LSB Steg-

anography in Color and Gray-Scale Images,” Magazine of

IEEE Multimedia, Special Issue on Multimedia and Secu-

rity, Vol. 8, No. 4, 2001, pp. 22-28.

[12] J. Bierbrauer and J. Fridrich, “Constructing Good Cover-

ing Codes for Applications in Stegnography,” Transac-

tions on Data Hiding and Multimedia Security, Springer,

Heidelberg, 2007. http://www.math.mtu.edu/jbierbra/

[13] N. Provos and P. Honeyman, “Hide and Seek: An Intro-

duction to Stegnography,” IEEE Security & Privacy, Vol.

1, No. 3, 2003, pp. 32-44.

[14] M. A. Shourian, R. C. Jain and Y.-S. Ho, “Dithered Qua n-

tization for Image Data Hiding in the DCT Domain,” Pro-

ceedings of IST 2003, 16-18 August 2003, Isfahan, pp. 171-

175.

[15] J. R. Krenn, “Stegnography and Steganalysis,” 2004.

[16] R.-J. Hwang, T. K. Shih and C.-H. Kao, “A Lossy Com-

pression Tolerant Data Hiding Method Based on JPEG

and VQ,” Journal of Internet Technology, Vol. 5, No. 3,

2004, pp. 171-178

[17] H.-W. Tseng and C.-C. Chang, “High Capacity Data Hi-

ding in JPEG Compressed Images,” Informatica, Vol. 15,

No. 1, 2004, pp. 127-142.

[18] Y. Park, H. Kang, K. Yamaguchi and K. Kobayashi, “In-

tegrity Verification of Secret Information in Image Steg-

anography,” Symposium on Information Theory and Its

Applications, Hakodate, 2006.

[19] N. Deshpande, K. Sneha and D. Jacobs, “Implementation

of LSB Stegnography and Its Evaluation for Various

Bits,” 1st International Conference on Digital Informa-

tion Management, Bangalore, 6 December 2006, pp. 173-

178. http://dx.doi.org/10.1109/ICDIM.2007.369349

[20] M. Chaumont and W. Puech, “DCT-Based Data Hiding

Method to Embed the Color Information in a JPEG Grey

Level Image,” 14th European Signal Processing Confer-

ence (EUSIPCO 2006), Florence, 4-8 September, 2006.

[21] A. Jain and I. S. Gupta, “A JPEG Compression Resistant

Stegnography Scheme for Raster Graphics Images,” IEEE

Region 10 Conference of TENCON, 30 October - 2 No-

vember 2007, Taipei, pp. 1-4.

[22] K. Wong, X. J. Qi and K. Tanaka, “A DCT Based Mod4

Stegnography Method,” Signal Processing, Vol. 87, No.

6, 2007, pp. 1251-1263.

http://dx.doi.org/10.1016/j.sigpro.2006.10.014

[23] T. Ishida, K. Yamawaki, H. Noda and M. Niimi, “Per-

formance Improvement of JPEG2000 Stegnography Us-

ing QIM,” Journal of Communication and Computer, Vol.

6, No. 1, 2009.

[24] C.-T. Tsai, C. Liaw, Y.-H. Liao and C.-H. Ko, “Conceal-

ing Information in Image Mosaics Based on Tile Image

Features,” Journal of the Chinese Institute of Engineers,

Vol. 34, No. 3, 2011, pp. 429-440.

http://dx.doi.org/10.1080/02533839.2011.565618

[25] C.-M. Wang and P.-C. Wang, “Data Hiding on Point-

Sampled Geometry,” Journal of the Chinese Institute of

Engineers, Vol. 29, No. 3, 2006, pp. 539-542.

[26] D. Bhattacharyya, T.-H. Kim and P. Dutta, “A Method of

Data Hiding in Audio Signal,” Journal of the Chinese In-

stitute of Engineers, Vol. 35, No. 5, 2012, pp. 523-528.

http://dx.doi.org/10.1080/02533839.2012.679054

[27] S. Khan, M. H. Yousaf and M. J. Akram, “Implementa-

tion of Variable Least Significant Bits Stegnography Us-

ing Decreasing Distance Decreasing Bits Algorithm,” In-

ternational Journal of Computer Science Issues, Vol. 8,

No. 6, 2011.

[28] S. Khan and M. H. Yousaf, “Implementation of VLSB

Stegnography Using Modular Distance Technique,” In-

novations and Advances in Computer, Information, Sys-

tems Sciences, and Engineering Lecture Notes in Electri-

cal Engineering, Vol. 152, 2013, pp. 511-525.

http://dx.doi.org/10.1007/978-1-4614-3535-8_43

[29] E. Walia and P. J. Navdeep, “An Analysis of LSB & DCT

Based Stegnography,” Global Journal of Computer Sci-

ence and Technology, Vol. 10, No. 1, 2010, pp. 4-8.

[30] E. Neuman, “MATLA B Tutorials,” Department of Ma-

thematics, Board of Trustees, Southem Illinois University,

Carbondale, 2009.

[31] R. C. Gonzalez and R. E. Woods, “Digital Image Proc-

essing,” 2nd Edition, Prentice-Hall, 2002.

Open Access JSIP