iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://link.springer.com/doi/10.1007/s11042-016-3722-6
A new adaptive image steganography scheme based on DCT and chaotic map | Multimedia Tools and Applications Skip to main content
Log in

A new adaptive image steganography scheme based on DCT and chaotic map

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a novel steganographic scheme is proposed based on chaotic map in the DCT domain. The proposed method apply the DCT on the cover image, scan the AC coefficients in a zigzag form from the least significant to the most significant one, this scan will lead us eventually to precise the embedding positions through a chaotic function as well as the maximum allowed payload relative to a computed SSIM threshold. A quantitative study shows the check of the designed method to the requirement of imperceptibility and flexibility.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Lin CC, Shiu PF (2010) High capacity data hiding scheme for dct-based images. J Inf Hiding Multimed Signal Process:220–240

  2. Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90(3):727–752

    Article  MATH  Google Scholar 

  3. Diqun Y, Rangdin W, Xianmin Y, Jie Z (2012) Steganography for mp3 audio by exploiting the rule of window switching. Comput Secur 31(5):704–716

    Article  Google Scholar 

  4. Diqun Y, Rangding W, Liguang Z (2009) Quantization step parity-based steganography for mp3 audio. Fundamenta Informaticae 97(1–2):1–14

    Google Scholar 

  5. Ghebleh M, Kanso A (2014) A robust chaotic algorithm for digital image steganography. Commun Nonlinear Sci Numer Simul 19(6):1898–1907

    Article  Google Scholar 

  6. Gupta S, Gujral G, Aggarwal N (2012) Enhanced least significant bit algorithm for image steganography. IJCEM Int J Comput Eng Manag 15(4):2230–7893

    Google Scholar 

  7. Kansoa A, Own S (2012) H: steganographic algorithm based on a chaotic map. Commun Nonlinear Sci Numer Simul 17(8):3287–3302

    Article  MathSciNet  Google Scholar 

  8. Kodovskỳ J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Infor Forensics and Secur 7(2):432–444

    Article  Google Scholar 

  9. Parah SA, Sheikh JA, Hafiz AM, Bhat G (2014) Data hiding in scrambled images: a new double layer security data hiding technique. Comput Electric Eng 40(1):70–82

    Article  Google Scholar 

  10. Li S, Chen G, Mou X (2005) On the dynamical degradation of digital piecewise linear chaotic maps. Int J Bifurc Chaos 15(10):3119–3151

    Article  MathSciNet  MATH  Google Scholar 

  11. Wang K, Lu ZM, Hu YJ (2013) A high capacity lossless ata hiding scheme for jpeg images. J Syst Softw 86(7):1965–1975

    Article  Google Scholar 

  12. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error measurement to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  13. Wei S, Zhe-Ming L, Yu-Chun W, Fa-Xin Y, Rong-Jun S (2013) High performance reversible data hiding for block truncation coding compressed images. Signal Image Video Process 7(2):297–306

    Article  Google Scholar 

  14. Yu CM, Wu KC, Wang CM (2011) A distortion-free data hiding scheme for high dynamic range images. Displays 32(5):225–236

    Article  Google Scholar 

  15. Zeng XT, Ping LD, Pan XZ (2010) A lossless robust data hiding scheme. Pattern Recog 43(4):1656–1667

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Houcemeddine Hermassi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Saidi, M., Hermassi, H., Rhouma, R. et al. A new adaptive image steganography scheme based on DCT and chaotic map. Multimed Tools Appl 76, 13493–13510 (2017). https://doi.org/10.1007/s11042-016-3722-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3722-6

Keywords

Navigation