In the last couple decades, several successful steganography approaches have been proposed. Least Significant Bit (LSB) Insertion technique has been deployed due to its simplicity in implementation and reasonable payload capacity. The most important design parameter in LSB techniques is the embedding location selection criterion. In this work, LSB insertion technique is proposed which is based on selecting the embedding locations depending on the weights of coefficients in Cosine domain (2D DCT). The cover image is transformed to the Cosine domain (by 2D DCT) and predefined number of coefficients are selected to embed the secret message (which is in the binary form). Those weights are the outputs of an adaptive algorithm that analyses the cover image in two domains (Haar and Cosine). Coefficients, in the Cosine transform domain, with small weights are selected. The proposed approach is tested with samples from the BOSSbase, and a custom-built databases. Two metrics are utilized to show the effectiveness of the technique, namely, Root Mean Squared Error (RMSE), and Peak Signal-to-Noise Ratio (PSNR). In addition, human visual inspection of the result image is also considered. As shown in the results, the proposed approach performs better, in terms of (RMSE, and PSNR) than commonly employed truncation and energy based methods.
Technology and digital communications have advanced so that digital photos, videos, or text may be easily manipulated by those not authorized to do so. In addition, the availability of specialized picture editing programs like Photoshop has simplified the process of altering photographs. At first glance, there may seem to be no problem, especially when an image editing method is necessary to delete or add a certain scene that increases the picture's beauty. But what about personal images or images with copyright? Attempts are constantly made to spoof these images using different approaches. Therefore, measures to reduce the likelihood of counterfeiting in digital and printed forms of media are required. The proposed approach aims to detect a counterfeit in images using a unique generator that conceals the data represented by the embedded watermark utilizing modern visual cryptography and hash algorithms. Image extractions may easily be analyzed for signs of forgery. As a result, our approach will detect and validate phony documents and images.
In this work a new hiding system is proposed. It is based on Least Significant Bits (LSB) embedding of secrete image into another cover image. The proposed hiding algorithm embeds the secrete image bits in the least significant bits of the cover image pixels such that the number of secrete image bits that are embedded in least significant bits of cover image pixel is variable and determined randomly. Such cover image pixel may contain no secrete information bit, one bit, two bits , or three bits according to the pseudo random number generator that generates integer numbers randomly between 0 and 3. The resulting image (the cover image within which the secret image is hidden) is called stego_image. Stego_image is closely related to the cover image and does not show any details of the secret information. It ensures that the eavedroppers will not have any suspicion that message bits are hidden in the image. The proposed system achieves perfect reconstruction of the secret message.