International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.7, No.3, Feb. 2015

A Novel Approach of Image Based Steganography Using Pseudorandom Sequence Generator Function and DCT Coefficients

Full Text (PDF, 790KB), PP.42-49

Views:166   Downloads:9


Anupam Mondal, Shiladitya Pujari

Index Terms



This research paper present a novel approach of Image based steganography scheme where a pseudorandom sequence generator function is used to randomize the mapping sequence in a pseudorandom fashion. The embedding process of the secret message is done according to the pseudo-random sequence, and extraction is done using the same sequence at the other end. At the base level, 2D-DCT is used to hide the bits of secret message inside the stego image by replacing the LSBs of DCT coefficients. Since in previous paper the LSB substitution technique is already used, here in this paper the previous concept is extended and used DCT instead of LSB technique. A new text randomization algorithm (4-2 swap text randomization algorithm) is also used to modify the secret message before embedding.

Cite This Paper

Anupam Mondal, Shiladitya Pujari,"A Novel Approach of Image Based Steganography Using Pseudorandom Sequence Generator Function and DCT Coefficients", IJCNIS, vol.7, no.3, pp.42-49, 2015.DOI: 10.5815/ijcnis.2015.03.06


[1]Huang W, Zhao Y and Rong-Rong Ni, Block-based Adaptive Image Steganography using LSB Matching Revisited, Journal of Electronic Science and Technology, Vol. 9 (4), 2011.

[2]Luo W, Huang F and Huang J, Edge Adaptive Image Steganography Based on LSB Matching Revisited, IEEE.

[3]Transaction on Information Forensics and Security, Vol. 5 (4), June 2010. 

[4]S. Pujari, S. Mukhopadhyay, "An Image based Steganography Scheme Implying Pseudo-Random Mapping of Text Segments to Logical Region of Cover Image using a New Block Mapping Function and Randomization Technique", International Journal of Computer Applications (0975 – 8887) Volume 50 – No.2, July 2012.

[5]Yang C and Wang S, Transforming LSB Substitution for Image-based Steganography in Matching Algorithms, Journal of Information Science and Engineering 26, 1199-1212, 2010. 

[6]Shiva Kumar K B, Raja K B, Chhotaray R K, Pattanaik S, Bit Length Replacement Steganography Based On DCT Coefficients, International Journal of Engineering Science and Technology, Vol. 2 (8), 3561-3570, 2010. 

[7]T Mrkel, JHP Eloff and MS Olivier."An Overview of Image Steganography," in proceedings of the fifth annual Information Security South Africa Conference, 2005. 

[8]L.Y. Por and B. Delina, "Information Hiding: A New Approach in Text Steganography", 7th WSEAS International Conference on Applied Computer & Applied Computational Science, April 2008, pp- 689-695. 

[9]Analysis of LSB Based Image Steganography Techniques, R. Chandramouli, Nasir Memon, Proc. IEEE ICIP, 2001. 

[10]J.Y. Hsiao. C.C. Chang. and C.-S. Chan. Finding optimal least significant- bit substitution in image hiding by dynamic programming strategy. Pattern Recognition, 36:1583–1595, 2003. 

[11]Potdar V.and Chang E. Gray level modification steganography for secret communication. In IEEE International Conference on Industria lInformatics, pages 355–368, Berlin, Germany, 2004.

[12]HongmeiTang, GaochanJin, Cuixia Wu and Peijiao Song. (2010): "A New Image Encryption and Steganography Scheme," IEEEInternational Conference on Computer and Communication Security, pp 60 – 63.

[13]Mahdi Ramezani and Shahrokh Ghaemmaghami. (2010): "Adaptive Image Steganography with Mod-4 Embedding using Image Contrast", IEEE Consumer Communication And Networking Conference.

[14]Cheng-Hsing Yang, Shiuh-Jeng Wang, "Transforming LSB Substitution for Image-based Steganography in Matching Algorithms", Journal of Information Science and Engineering 26, 1199-1212 (2010).