Zero-steganography using DCT and Spatial domain Muhammad Bilal * , Sana Imtiaz * , Wadood Abdul and Sanaa Ghouzali ‡§ * Department of Electrical Engineering COMSATS Institute of Information Technology, Islamabad, Pakistan Email: mbilal ce@live.com Department of Computer Engineering, College of Computer and Information Sciences King Saud University, Riyadh, Kingdom of Saudi Arabia Department of Information Technology, College of Computer and Information Sciences King Saud University, Riyadh, Kingdom of Saudi Arabia § LRIT Associate Unit to CNRST (URAC 29), Faculty of Sciences Mohamed V-agdal University, Rabat, Morocco Abstract—As the primary concern in conventional steganog- raphy techniques is to make the algorithm immune to ste- ganalysis, their primary focus is on imperceptibility. This paper discusses Zero-steganography, an imperceptible and un- detectable data hiding technique that does not require any steganalysis. The proposed algorithm hides the data based on a relationship between characteristic matrix of the cover image, chaotic sequence and payload; however, no change is made to the cover image. The proposed algorithm is analyzed for robustness against three attacks – low-pass filtering, noise and JPEG compression. Our results show that the proposed algorithm is robust against these attacks with Bit Error Rate (BER) below 20% even for the highest attack intensities. Keywords-Steganography; Zero-steganography; Steganaly- sis; Imperceptibility; Chaos based steganography; I. I NTRODUCTION With the advancement in the field of computer science and advent of digital computers, secure communications are increasingly making use of cryptography. Cryptography techniques are aimed at encrypting the data in order to ensure its security, thus making it incomprehensible for an adversary. However, encryption is not concerned with hiding the existence of secret data from the adversary. Hence, it leads to suspicion which in turn might make data transmission unsuccessful. On the other hand, information hiding techniques, namely steganography and watermarking [1], are methods that are used to hide the existence of secret data. Information hiding techniques are evaluated on the basis of their impercep- tibility, robustness, capacity and security. Steganography concentrates mainly on imperceptibility, and is used for com- municating secret messages using any regular digital carrier – such as audio, video, text files or images. Watermarking, on the other hand, concentrates relatively less on capacity as it is mainly used for protection of intellectual property rights and copyright purposes. The aim of digital watermarking is to attain robustness against removal, destruction and counterfeiting [2]. Steganography, in general, is the process of hiding in- formation in the cover medium such that it is undetectable, which makes it a prime candidate for secret communication. Image steganography is carried out by manipulating and altering image pixels to hide the secret data [3], [4]. In addition to spatial domain, image steganography is also carried out in several transform domains [5]. A generic description of the steganographic process is as follows: cover data + secret data embedding algorithm -----------→ stego data (1) The different requirements of steganography and water- marking techniques could be better understood by the visual requirement model given in Figure 1 [6]. While watermark- ing algorithms are primarily concerned with the robustness of the embedded watermark, steganography algorithms place prime importance on the imperceptibility and capacity of the algorithm. Figure 1: Requirement model Cao et al. proposed a digital image zero-watermarking method based on discrete wavelet transform (DWT) and chaotic modulation [7]. This concept works out logics in which no change is made to the carrier, hence rendering the algorithm undetectable. In this case, a key is developed by observing some relationships between the payload and cover image. Zero-watermarking is a relatively new field and can be effectively used to solve the problems which were difficult to address using conventional watermarking 978-1-4799-0792-2/13/$31.00 ©2013 IEEE