• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

NDFT-based Image Steganographic Scheme with Discrimination of Tampers

Vol. 5, No.12, December 31, 2011
10.3837/tiis.2011.12.005, Download Paper (Free):

Abstract

A new and secure image steganographic scheme based on nonuniform discrete Fourier transform (NDFT) is proposed in this paper. First, the chaotic system is introduced to select embedding points randomly in NDFT domain suitable range, and NDFT is implemented on every non-overlapping block of eight consecutive pixels. Second, the secret messages are scrambled by chaotic systems, and embedded into frequency coefficients by quantization method. The stego-image is obtained by inverse NDFT (INDFT). Besides, in order to discriminate tampers, the low frequency wavelet coefficients of 7 most significant bits (MSBs) of the stego-image are converted into the binary sequence after nonuniform scalar quantization. Then the obtained binary sequence is scrambled by the chaotic systems, and embedded into the least significant bit (LSB) of the stego-image. Finally, the watermarked stego-image can be obtained by a new improved LSB steganographic method. The embedded secret messages can be extracted from the watermarked stego-image without the original cover image. Experimental results show the validity of the proposed scheme, and dual statistics attacks are also conducted to indicate the security.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
Hongxia Wang and Mingquan Fan, "NDFT-based Image Steganographic Scheme with Discrimination of Tampers," KSII Transactions on Internet and Information Systems, vol. 5, no. 12, pp. 2340-2354, 2011. DOI: 10.3837/tiis.2011.12.005

[ACM Style]
Wang, H. and Fan, M. 2011. NDFT-based Image Steganographic Scheme with Discrimination of Tampers. KSII Transactions on Internet and Information Systems, 5, 12, (2011), 2340-2354. DOI: 10.3837/tiis.2011.12.005