Page 49 - 2024-Vol20-Issue2
P. 49
Received: 14 June 2023 | Revised: 7 October 2023 | Accepted: 20 October 2023
DOI: 10.37917/ijeee.20.2.4 Vol. 20 | Issue 2 | December 2024
Open Access
Iraqi Journal for Electrical and Electronic Engineering
Original Article
An Adaptive Steganography Insertion Technique Based
on Cosine Transform
Taif Alobaidi*1, Wasfy Mikhael2
1Department of Mobile Communications and Computing Engineering, College of Engineering, University of Information Technology
and Communications (UOITC), Baghdad, Iraq
2Department of Electrical and Computer Engineering, University of Central Florida, Orlando, USA
Correspondence
*Taif Alobaidi
Department of Mobile Communications and Computing Engineering, College of Engineering,
University of Information Technology and Communications (UOITC), Baghdad, Iraq
Email: taif.alobaidi@uoitc.edu.iq
Abstract
In the last couple decades, several successful steganography approaches have been proposed. Least Significant Bit (LSB)
Insertion technique has been deployed due to its simplicity in implementation and reasonable payload capacity. The most
important design parameter in LSB techniques is the embedding location selection criterion. In this work, LSB insertion
technique is proposed which is based on selecting the embedding locations depending on the weights of coefficients in
Cosine domain (2D DCT). The cover image is transformed to the Cosine domain (by 2D DCT) and predefined number
of coefficients are selected to embed the secret message (which is in the binary form). Those weights are the outputs
of an adaptive algorithm that analyses the cover image in two domains (Haar and Cosine). Coefficients, in the Cosine
transform domain, with small weights are selected. The proposed approach is tested with samples from the BOSSbase,
and a custom-built databases. Two metrics are utilized to show the effectiveness of the technique, namely, Root Mean
Squared Error (RMSE), and Peak Signal-to-Noise Ratio (PSNR). In addition, human visual inspection of the result
image is also considered. As shown in the results, the proposed approach performs better, in terms of (RMSE, and PSNR)
than commonly employed truncation and energy based methods.
Keywords
Steganography, Digital Signal Processing, Cosine Transform, DWT
I. INTRODUCTION files, or text, without arousing suspicion. It has been used
throughout history as a means to covertly transmit sensitive
Steganography finds its etymological roots in the Greek lan- information or maintain clandestine communication channels.
guage. It is derived from the combination of two Greek Steganography’s roots can be traced back to ancient times
words: ”steganos,” which signifies ”covered” or ”protected,” when secret messages were concealed within wax tablets,
and ”graphia,” which means ”writing” or ”drawing.” These tattooed on messengers’ shaved heads, or written using invis-
two terms come together to form ”steganographia,” a term ible ink. However, one of the earliest recorded instances of
that can be interpreted as ”covered writing” or ”hidden writ- steganography dates back to Herodotus, the Greek historian,
ing.” As time progressed, the term underwent a transforma- who described a method where messages were written on a
tion, eventually becoming ”steganography” as we now un- slave’s shaved head, allowing the hair to regrow before the
derstand it. Today, steganography refers to the technique of messenger reached the intended recipient.
hiding information within different forms of media or carriers. Digital Steganography techniques include Image [1], Au-
Steganography is the art and science of hiding information dio [2], Text [3], and video [4]. In image steganography,
within seemingly innocuous carriers, such as images, audio involves embedding information within the pixels of digi-
This is an open-access article under the terms of the Creative Commons Attribution License,
which permits use, distribution, and reproduction in any medium, provided the original work is properly cited.
©2024 The Authors.
Published by Iraqi Journal for Electrical and Electronic Engineering | College of Engineering, University of Basrah.
https://doi.org/10.37917/ijeee.20.2.4 |https://www.ijeee.edu.iq 45