Steganography transmits data by actually hiding the existence of the message so that a viewer cannot detect the transmission of message and hence cannot try to decrypt it. During communication process LSB steganography based on Huffman encoding algorithm does not provide full security and good compression. So a secure DCT-based steganographic algorithm is proposed in integration with neural network. This algorithm provides more security and compression by combining cryptography with DCT-steganography. The proposed technique has two main algorithm i.e. Embedding Algorithm and Extraction algorithm. The whole simulation has taken place in MATLAB environment. The performance parameters are PSNR and MSE.
Chang, C.C., Chen, T.S. and Chung, L.Z., “A steganographic method based upon JPEG and quantization table modification”, Information Sciences, 2002, 141(1-2), pp.123-38.
T. Morkel, J.H.P. Eloff , M.S. Olivier,\"An Overview of Image Steganography,\" in Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, June/July 2005 .
Ankur M. Mehta, Steven Lanzisera, and Kristofer S. J. Pister, “Steganography 802.15.4 Wireless Communication”.
K Suresh Babu, K B Raja, Kiran Kumar K, Manjula Devi T H, Venugopal K R, L M Patnaik,“Authentication of Secret Information in Image Steganography” Microprocessor Applications Laboratory, Indian Institute of Science,Bangalore.
Proceedings of the 2006 International Conference on “Intelligent Information Hiding and Multimedia Signal Processing “(IIH-MSP\"06)0-7695-2745-0/06 © 2006 IEEE.
AsgharShahrzadKhashandarag and NaserEbrahimian, “A new method for color image steganography using SPIHT and DCT, sending with JPEG format”, International Conference on Computer Technology and Development, IEEE, 2008
CHEN Zhi-li, HUANG Liu-sheng, YU Zhen-shan, LI Ling-jun and YANG wei, “A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words”, 3RD International Conference on Availability, Reliability and Security, IEEE, 2008..
K Suresh Babu, K B Raja, Kiran Kumar K, Manjula Devi T H, Venugopal K R, L M Patnaik, “Authentication of Secret Information in Image Steganography” Microprocessor Applications Laboratory, Indian Institute of Science, Bangalore in 2008
MamtaJunejaParvinder Singh Sandhu, “Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption”2009 International Conference on Advances in Recent Technologies in Communication and Computing.
KokSheik Wong, Xiaojun Qi, and Kiyoshi Tanaka, ―A DCT based Mod4 Steganography Method‖ Signal Processing 87, 1251-1263, 2009.
Yi- Zhen Chen, Zhi Han, Shu-ping Li, Chun- hui Lu, Xiao- Hui Yao , “An Adaptive Steganography Algorithm Based on Block Sensitivity Vectors Using HVS Features “ 2010 3rd International Congress on Image and Signal Processing.
PSNR, MSE, DCT, Neural Network, Steganography.