Open Access
ARTICLE
Increasing Distance Increasing Bits Substitution (IDIBS) Algorithm for Implementation of VTVB Steganography
1 Department of Electronics and Telecommunications, Politecnico di Torino, 10129 Torino, Italy.
2 DAUIN, Politecnico di Torino, 10129 Torino, Italy.
3 Department of Electronic and Electrical Engineering, Loughborough University, United Kingdom.
* Corresponding Author: Sahib Khan. Email: .
Computer Modeling in Engineering & Sciences 2018, 117(1), 1-16. https://doi.org/10.31614/cmes.2018.04141
Abstract
Cryptography and steganography are two important and related fields of infor- mation security. But, steganography is slightly different in the sense that it hides the ex- istence of secret information from unauthorized users. It is one of the most appealing research domains, have applications like copyright protection, data integrity protection and manipulation detection. Several steganography techniques have been proposed in literature. But, in this work a new information hiding algorithm is presented. The proposed technique de-correlates frequency components of cover image using discrete cosine transform and uses the least significant bits of frequency components for hiding secret information. The tech-nique hides variable number of bits of secret message in different frequency components. Therefore, it hides different amount of secret information in different regions of cover im-age and results in enhancement of security. The algorithm has the flexibility to change the hiding capacity and quality of final stego image. It has been observed from experimental results that a hiding a capacity from 3% to 43% can be achieved with significantly good quality of 41 dB to 37 dB in term of peak signal to noise ratio. The successful recovery of the hidden information need the pattern, called stego key, in which is used in hiding process. The algorithm provides twofold security; hiding keeps the existence of hidden information secret and the large key size makes the retrieval of hidden information difficult for intruders.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.