In Block DCT Domain", IEEE: 8th Workshop on Multimedia Signal Processing 2006, pp.
"JPEG Steganalysis Using Empirical Transition Matrix Steganography”, in19th National Information Systems Security Conference, 1996 & Irvine, C.E., “Surmounting the Effects of Lossy Compression on Of the Fifth Annual Information Security South Africa Conference ISSA, 2005. Olivier,”An Overview of Image Steganography”, In Proceedings Pitas, “Robust Image Watermarking in the Spatial Domain”, Signal Sayuthi Jaafar, Azizah A Manaf, Akram M Zeki, “Steganography Technique Using ModulusĪrithmetic”, in 9th International Symposium on Signal Processing and Its Applications, pp. Match”, Pattern Recognition Letters,No.12, Vol.25, pp. “A Steganographic Method for Digital Images Using Side “Hiding Data in Image by Simple LSB Substitution”, Pattern Mohit Kumar Goel & Neelu Jain “ A Novel Steganographic Technique Based on LSB-DCTĪpproach”, in National Conference on Emerging Trends in Information and Computing Ramandeep Kaur Toor and Ramanjot Kaur”A Steganographic Method Based Upon JPEGĪnd Quantization Table Modification”, International Journal of Information Technology and Knowledge Management ,NO.1,Vol.6, pp. Steganographic Method Based on DCT and New Quantization Technique”, International Substitution by Minimize Detection”, Theoretical and Applied Information Technology, Vol. Vijay and Vishal” A Steganography Algorithm for Hiding Image in Image by Improved LSB Replacement Method and Compare With JSteg Algorithm “,International Journal of ComputerĪnd Electrical Engineering, Vol. Hossein Sheisi, Jafar Mesgarian, and Mostafa Rahmani “Steganography: Dct Coefficient Hans “Image Steganography and Steganalysis”, M.S., Department ofĬomputing Faculty of Engineering and Physical Sciences, University of Surrey Guildford Surrey, Niels Provos and Peter Honeyman “Hide and Seek: An Introduction to Steganography” , The model presented here is based on JPEG images.
Results after calculating the capacity and PSNR for images proved that our approach is a good and acceptable steganography system.
Besides that, the priority given to the choice of a good image size and type in this approach further disguises the secret image and increases the chances that the image could go unnoticed. In this combine approach, the tricky nature of hiding an already hidden message is using two different algorithms increases the level of difficulty for a third party to suspect the existence of a secret image in the first place or even successful decode the it. In our proposed approach, the secret message (image) is first concealed inside another image using JSteg algorithm and the resultant stego-image is further hidden inside a final image using OutGuess 0.1 algorithm. In this paper, we combined two steganography algorithms namely JSteg and OutGuess algorithms, in order to exploit the beneficial characteristics and features of both algorithms to enhance the protection level for secret images. Steganography is the act of hiding a message inside another message in such a way that the hidden message can only be detected by its intended recipient.