Page 59 - 2024-Vol20-Issue2
P. 59
55 | Alobaidi & Mikhael
(a)
(b) (c) (d) Fig. 9. Histogram of images. (a) Cover image histogram
(image 1/custom-built database), (b) DCT blocks insertion
stegoimage histogram, (c) Proposed technique stegoimage
histogram.
TABLE VIII.
RMSES FOR SPATIAL/ DCT BLOCKS/PROPOSED
TECHNIQUES FOR BOSSBASE DATABASE( PROPOSED
BLOCKS SIZE IS 8 × 8)
(e) (f) (g) Image Index Spatial DCT Blocks Proposed
1 0.022450 1.778500 0.019925
Fig. 8. Samples from BOSSBase database/proposed LSB 2 0.020298 1.781846 0.021749
technique. (a) Original cover image, (b) Stegoimage with 3 0.020298 1.781899 0.019925
block size of 4, (c) Stegoimage with block size of 8, (d) 4 0.023770 1.780727 0.022091
Stegoimage with block size of 16, (e) Stegoimage with block 5 0.023770 1.786850 0.022091
6 0.023770 1.792158 0.019925
size of 32, (f) Stegoimage with block size of 64, (g) 7 0.022450 1.794135 0.022450
Stegoimage block size of 128. 8 0.021048 1.780192 0.022782
9 0.019519 1.772875 0.021401
10 0.023770 1.781059 0.021401
cal Methods in Pattern and Image Analysis, vol. 5916, [13] N. Subramanian, O. Elharrouss, S. Al-Maadeed, and
pp. 138–147, SPIE, 2005. A. Bouridane, “Image steganography: A review of the
recent advances,” IEEE access, vol. 9, pp. 23409–23423,
[10] A. Dehdar, A. Keshavarz, and N. Parhizgar, “Image 2021.
steganalysis using modified graph clustering based ant
colony optimization and random forest,” Multimedia [14] O. Elharrouss, N. Almaadeed, and S. Al-Maadeed, “An
Tools and Applications, vol. 82, no. 5, pp. 7401–7418, image steganography approach based on k-least signif-
2023. icant bits (k-lsb),” in 2020 IEEE International Confer-
ence on Informatics, IoT, and Enabling Technologies
[11] A. K. Sahu and M. Sahu, “Digital image steganography (ICIoT), pp. 131–135, IEEE, 2020.
and steganalysis: A journey of the past three decades,”
Open Computer Science, vol. 10, no. 1, pp. 296–342, [15] R. J. Mstafa, K. M. Elleithy, and E. Abdelfattah, “A
2020. robust and secure video steganography method in dwt-
dct domains based on multiple object tracking and ecc,”
[12] S. Rahman, J. Uddin, H. U. Khan, H. Hussain, A. A. IEEE access, vol. 5, pp. 5354–5365, 2017.
Khan, and M. Zakarya, “A novel steganography tech-
nique for digital images using the least significant bit [16] R. Das and T. Tuithung, “A novel steganography method
substitution method,” IEEE Access, vol. 10, pp. 124053– for image based on huffman encoding,” in 2012 3rd Na-
124075, 2022. tional Conference on Emerging Trends and Applications
in Computer Science, pp. 14–18, IEEE, 2012.