International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2966
Hybrid DCT-DWT Digital Image Steganography
Ms. Anusha M N
1
, Ms. Ashwini S R
2
, Akshatha M K
3
, Lokesh H B
4
, Lubna Tabasum
5
, Monika N Y
6
1, 2
3,4,5,6
---------------------------------------------------------------------------***----------------------------------------------------------------------------
I. ABSTRACT- Steganography is a method of hiding
secret information in the multimedia carrier as image file,
audio file and video file. This differs from cryptography
concept which is applied to make as a message unreadable
by a third party; it does not hide the existence of secret
communication. By researching in image steganography
are to increase efficiency in terms of the payload capacity
of secret information, robustness against visual attacks
and statistical attacks. Image steganography in wavelet
transform domain have higher robustness against
statistical attacks compare to image steganography in
spatial domain and discrete cosine transform domain,
while DCT image steganography have higher
imperceptibility compared to DWT image steganography.
The hybrid technique of DWT and DCT provides more
advantages of both techniques. The proposed algorithm
presents hybrid DCT-DWT digital image steganography
algorithm.
Proposed approach Embedding image is done by
embedded is not detectable part of an image than other
methods as shown in results. The Steganography process is
done by embedding image in middle frequency coefficient
set of the 3-level DWT transform of host image followed by
block DCT transformation and embedding in selected HH
DWT coefficient sets.
Keywords: steganography, Digital image, DCT, DWT,
PSNR.
II. INTRODUCTION
A. Steganography
Steganography is the method of hiding secret
information, so that only sender and receiver know that
the message even exits so it does not attract unwanted
attention. Image steganography protects the data from
illegal access by hiding the data into a cover image such
that an unintended observer is not aware of the
existence of the hidden data. Steganography basically
consists of three things: cover object (used to hide secret
messages), secret messages to be, and stego object
(cover object hiding the secret data).
Steganography terminologies are as follows:
Cover image: Original object which are used as a
carrier for conceal the information.
Message: Actual information which is used to
hide. Message could be a text or some other
image.
Stego-Image: After embedding message or
secret information into cover object is known as
stego-object.
Stego-Key: A key is used for embedding or
extracting the messages from cover-object and
stego-objects.
Figure 1: Block diagram of process of
steganography.
As shown in Figure 1, Secret message +carrier +
steganography key = Steganography in medium. Image
steganography is a method of hiding the information into
cover-image and generates a stego-image. Stego-image
then sent to the other party by some known medium,
where the other party does not know that this stego-
image has hidden message. After receiving stego-image
hidden message can simply be extract with stego-key by
the receiving end.
B. Steganography v/s Other Hiding
Technique
1. Cryptography v/s Steganography:
Steganography and cryptography both are
techniques to protect information from untrusted party
but neither technology alone is perfect when the
presence of hidden information is revealed the
steganography is partly defeated. So the strength of
steganography can be amplified by combining it with
cryptography. In image steganography the information is
hidden in images only.