Page 59 - 2024-Vol20-Issue2
P. 59

55 |                                                                                   Alobaidi & Mikhael

               (a)

      (b) (c) (d)                                                Fig. 9. Histogram of images. (a) Cover image histogram
                                                                (image 1/custom-built database), (b) DCT blocks insertion
                                                                stegoimage histogram, (c) Proposed technique stegoimage

                                                                                             histogram.

                                                                                          TABLE VIII.
                                                                   RMSES FOR SPATIAL/ DCT BLOCKS/PROPOSED
                                                                TECHNIQUES FOR BOSSBASE DATABASE( PROPOSED

                                                                                    BLOCKS SIZE IS 8 × 8)

      (e) (f)       (g)                                         Image Index   Spatial  DCT Blocks  Proposed
                                                                      1      0.022450  1.778500    0.019925
  Fig. 8. Samples from BOSSBase database/proposed LSB                 2      0.020298  1.781846    0.021749
 technique. (a) Original cover image, (b) Stegoimage with             3      0.020298  1.781899    0.019925
   block size of 4, (c) Stegoimage with block size of 8, (d)          4      0.023770  1.780727    0.022091
Stegoimage with block size of 16, (e) Stegoimage with block           5      0.023770  1.786850    0.022091
                                                                      6      0.023770  1.792158    0.019925
     size of 32, (f) Stegoimage with block size of 64, (g)            7      0.022450  1.794135    0.022450
                  Stegoimage block size of 128.                       8      0.021048  1.780192    0.022782
                                                                      9      0.019519  1.772875    0.021401
                                                                      10     0.023770  1.781059    0.021401

      cal Methods in Pattern and Image Analysis, vol. 5916,     [13] N. Subramanian, O. Elharrouss, S. Al-Maadeed, and
      pp. 138–147, SPIE, 2005.                                        A. Bouridane, “Image steganography: A review of the
                                                                      recent advances,” IEEE access, vol. 9, pp. 23409–23423,
[10] A. Dehdar, A. Keshavarz, and N. Parhizgar, “Image                2021.
      steganalysis using modified graph clustering based ant
      colony optimization and random forest,” Multimedia        [14] O. Elharrouss, N. Almaadeed, and S. Al-Maadeed, “An
      Tools and Applications, vol. 82, no. 5, pp. 7401–7418,          image steganography approach based on k-least signif-
      2023.                                                           icant bits (k-lsb),” in 2020 IEEE International Confer-
                                                                      ence on Informatics, IoT, and Enabling Technologies
[11] A. K. Sahu and M. Sahu, “Digital image steganography             (ICIoT), pp. 131–135, IEEE, 2020.
      and steganalysis: A journey of the past three decades,”
      Open Computer Science, vol. 10, no. 1, pp. 296–342,       [15] R. J. Mstafa, K. M. Elleithy, and E. Abdelfattah, “A
      2020.                                                           robust and secure video steganography method in dwt-
                                                                      dct domains based on multiple object tracking and ecc,”
[12] S. Rahman, J. Uddin, H. U. Khan, H. Hussain, A. A.               IEEE access, vol. 5, pp. 5354–5365, 2017.
      Khan, and M. Zakarya, “A novel steganography tech-
      nique for digital images using the least significant bit  [16] R. Das and T. Tuithung, “A novel steganography method
      substitution method,” IEEE Access, vol. 10, pp. 124053–         for image based on huffman encoding,” in 2012 3rd Na-
      124075, 2022.                                                   tional Conference on Emerging Trends and Applications
                                                                      in Computer Science, pp. 14–18, IEEE, 2012.
   54   55   56   57   58   59   60   61   62   63   64