Page 49 - 2024-Vol20-Issue2
P. 49

Received: 14 June 2023 | Revised: 7 October 2023 | Accepted: 20 October 2023

DOI: 10.37917/ijeee.20.2.4                                       Vol. 20 | Issue 2 | December 2024

                                                                              Open Access

Iraqi Journal for Electrical and Electronic Engineering

Original Article

An Adaptive Steganography Insertion Technique Based

                       on Cosine Transform

                                                               Taif Alobaidi*1, Wasfy Mikhael2
 1Department of Mobile Communications and Computing Engineering, College of Engineering, University of Information Technology

                                                             and Communications (UOITC), Baghdad, Iraq
                        2Department of Electrical and Computer Engineering, University of Central Florida, Orlando, USA

Correspondence
*Taif Alobaidi
Department of Mobile Communications and Computing Engineering, College of Engineering,
University of Information Technology and Communications (UOITC), Baghdad, Iraq
Email: taif.alobaidi@uoitc.edu.iq

  Abstract
  In the last couple decades, several successful steganography approaches have been proposed. Least Significant Bit (LSB)
  Insertion technique has been deployed due to its simplicity in implementation and reasonable payload capacity. The most
  important design parameter in LSB techniques is the embedding location selection criterion. In this work, LSB insertion
  technique is proposed which is based on selecting the embedding locations depending on the weights of coefficients in
  Cosine domain (2D DCT). The cover image is transformed to the Cosine domain (by 2D DCT) and predefined number
  of coefficients are selected to embed the secret message (which is in the binary form). Those weights are the outputs
  of an adaptive algorithm that analyses the cover image in two domains (Haar and Cosine). Coefficients, in the Cosine
  transform domain, with small weights are selected. The proposed approach is tested with samples from the BOSSbase,
  and a custom-built databases. Two metrics are utilized to show the effectiveness of the technique, namely, Root Mean
  Squared Error (RMSE), and Peak Signal-to-Noise Ratio (PSNR). In addition, human visual inspection of the result
  image is also considered. As shown in the results, the proposed approach performs better, in terms of (RMSE, and PSNR)
  than commonly employed truncation and energy based methods.

  Keywords
  Steganography, Digital Signal Processing, Cosine Transform, DWT

                  I. INTRODUCTION                                files, or text, without arousing suspicion. It has been used
                                                                 throughout history as a means to covertly transmit sensitive
Steganography finds its etymological roots in the Greek lan-     information or maintain clandestine communication channels.
guage. It is derived from the combination of two Greek           Steganography’s roots can be traced back to ancient times
words: ”steganos,” which signifies ”covered” or ”protected,”     when secret messages were concealed within wax tablets,
and ”graphia,” which means ”writing” or ”drawing.” These         tattooed on messengers’ shaved heads, or written using invis-
two terms come together to form ”steganographia,” a term         ible ink. However, one of the earliest recorded instances of
that can be interpreted as ”covered writing” or ”hidden writ-    steganography dates back to Herodotus, the Greek historian,
ing.” As time progressed, the term underwent a transforma-       who described a method where messages were written on a
tion, eventually becoming ”steganography” as we now un-          slave’s shaved head, allowing the hair to regrow before the
derstand it. Today, steganography refers to the technique of     messenger reached the intended recipient.
hiding information within different forms of media or carriers.  Digital Steganography techniques include Image [1], Au-
Steganography is the art and science of hiding information       dio [2], Text [3], and video [4]. In image steganography,
within seemingly innocuous carriers, such as images, audio       involves embedding information within the pixels of digi-

This is an open-access article under the terms of the Creative Commons Attribution License,
which permits use, distribution, and reproduction in any medium, provided the original work is properly cited.
©2024 The Authors.
Published by Iraqi Journal for Electrical and Electronic Engineering | College of Engineering, University of Basrah.

https://doi.org/10.37917/ijeee.20.2.4                                         |https://www.ijeee.edu.iq 45
   44   45   46   47   48   49   50   51   52   53   54