2014 First International Conference on Networks &Amp; Soft Computing (ICNSC2014) 2014
DOI: 10.1109/cnsc.2014.6906644
|View full text |Cite
|
Sign up to set email alerts
|

DCT coefficient dependent quantization table modification steganographic algorithm

Abstract: In frequency domain based image steganographic methods, especially Discrete Cosine Transformation (DCT), the selection of rounded quantized DCT coefficients in each block for data embedding is still an open issue. This paper presents a new data hiding technique based on the DCT coefficients and modified quantization table values. Embedding strength of each coefficients are determined by the mathematical formula which compare the DCT coefficient and appropriate quantization table value in order then the secrete… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…Next, according to the research conducted by V. Senthooran et al [12], it provides a novel data concealing strategy that is based on the values of the modified quantization table and the DCT coefficients. According to the mathematical formula, the embedding strength of each coefficient is obtained by comparing the suitable quantization table value and DCT coefficients in the correct sequence.…”
Section: Review Of Previous Researchesmentioning
confidence: 99%

Image Steganography:

Abd Aziz,
Mohd Sultan,
Mohamad Zulkufli
2024
IJPCC
“…Next, according to the research conducted by V. Senthooran et al [12], it provides a novel data concealing strategy that is based on the values of the modified quantization table and the DCT coefficients. According to the mathematical formula, the embedding strength of each coefficient is obtained by comparing the suitable quantization table value and DCT coefficients in the correct sequence.…”
Section: Review Of Previous Researchesmentioning
confidence: 99%

Image Steganography:

Abd Aziz,
Mohd Sultan,
Mohamad Zulkufli
2024
IJPCC
“…Furthermore, the results of the proposed method for frequency domain embedding have been compared with both the widely recognized Jsteg method and the method proposed by Senthooran and Ranathunga [27]. For comparison purposes, the same images and payloads used in [27] were utilized. The images involved in this comparison can be seen in Figure 9.…”
Section: Performance Metric On Spatial and Transform Domainmentioning
confidence: 99%
“…Thenmozhi and Chandrasekaran [12] use integer wavelet transform along with cropping. Senthooran and Ranathunga [13] apply DCT coefficients and modified quantization table values. Mazumder and Hemachandran [14] use DWT and change the stegomessage by optimizing message dispersion.…”
Section: Related Workmentioning
confidence: 99%