Share Email Print

Journal of Electronic Imaging

Adaptive image steganography using contourlet transform
Author(s): Mohammad Fakhredanesh; Mohammad Rahmati; Reza Safabakhsh
Format Member Price Non-Member Price
PDF $20.00 $25.00

Paper Abstract

This work presents adaptive image steganography methods which locate suitable regions for embedding by contourlet transform, while embedded message bits are carried in discrete cosine transform coefficients. The first proposed method utilizes contourlet transform coefficients to select contour regions of the image. In the embedding procedure, some of the contourlet transform coefficients may change which may cause errors at the message extraction phase. We propose a novel iterative procedure to resolve such problems. In addition, we have proposed an improved version of the first method in which it uses an advanced embedding operation to boost its security. Experimental results show that the proposed base method is an imperceptible image steganography method with zero retrieval error rate. Comparisons with other steganography methods which utilize contourlet transform show that our proposed method is able to retrieve all messages perfectly, whereas the others fail. Moreover, the proposed method outperforms the ContSteg method in terms of PSNR and the higher-order statistics steganalysis method. Experimental evaluations of our methods with the well known DCT-based steganography algorithms have demonstrated that our improved method has superior performance in terms of PSNR and SSIM, and is more secure against the steganalysis attack.

Paper Details

Date Published: 16 October 2013
PDF: 14 pages
J. Electron. Imag. 22(4) 043007 doi: 10.1117/1.JEI.22.4.043007
Published in: Journal of Electronic Imaging Volume 22, Issue 4
Show Author Affiliations
Mohammad Fakhredanesh, Amirkabir Univ. of Technology (Iran, Islamic Republic of)
Mohammad Rahmati, Amirkabir Univ. of Technology (Iran, Islamic Republic of)
Reza Safabakhsh, Amirkabir Univ. of Technology (Iran, Islamic Republic of)

© SPIE. Terms of Use
Back to Top