Page 57 - 2024-Vol20-Issue2
P. 57

53 |                                                            Alobaidi & Mikhael

      (a) (b)                                                   (a) (b)

      (c) (d)                                                   (c) (d)

      (e) (f)                                                   (e) (f)

Fig. 4. Sample 3 image from custom-built database/proposed      Fig. 5. Sample 4 image from custom-built database/proposed
  LSB technique. (a) Original cover image, (b) Stegoimage         LSB technique. (a) Original cover image, (b) Stegoimage

with message size of 6KB, (c) Stegoimage with message size      with message size of 6KB, (c) Stegoimage with message size
   of 8KB, (d) Stegoimage with message size of 10KB, (e)           of 8KB, (d) Stegoimage with message size of 10KB, (e)

Stegoimage with message size of 14KB, (f) Stegoimage with       Stegoimage with message size of 14KB, (f) Stegoimage with
                      message size of 16KB.                                           message size of 16KB.

Nevertheless, the smaller window dimensions acquire more                          VI. CONCLUSIONS
processing resources.
                                                                A technique is proposed for inserting a secret message into an
B. Custom-Built Results                                         image, which is based on the two-dimensional Cosine Trans-
As shown in the presented results, the proposed technique       form (2D DCT). In this method, the image was converted to
performed better than the other technique in [12]. The RMSE     the Cosine domain using 2D DCT, and a predetermined num-
maintained at lower levels while higher PSNRs are achieved.     ber of coefficients are chosen to hide the binary secret message.
The visual human inspection illustrate that the proposed tech-  The selection process involves analyzing the image in two dif-
nique does not alter the visual properties of the cover image.  ferent domains: 2D DCT and 2D Haar Transform. This analy-
In terms of utilized performance metrics, the best block size   sis was performed to minimize any distortions in the original
(window dimensions) is 4 × 4 (16 coefficients). Neverthe-       cover image. The adaptive algorithm yields weights for each
less, the smaller window dimensions acquire more processing     coefficient in its domain, and Cosine coefficients with lower
resources.                                                      weights are selected for embedding the secret message. To
                                                                evaluate the effectiveness of the technique, samples from the
C. Steganalysis Results                                         BOSSbase, and custom-built databases were used, and three
As shown in Fig. 9, the histogram of the proposed technique     metrics were employed: Root Mean Squared Error (RMSE),
has not been altered and thus the proposed technique is im-     Sturcutral Similarity Index (SSIM), and Peak Signal-to-Noise
mune against first order attacks like Chi-Square [25].          Ratio (PSNR). Additionally, a visual inspection of the result-
                                                                ing image is also taken into account. The results demonstrated
                                                                that the proposed technique outperformed commonly used
                                                                truncation, energy-based methods, and most recently reported
   52   53   54   55   56   57   58   59   60   61   62