A Comparative Study and Analysis of Quantization Table Modification Effect on JPEG Based Image Steganography
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Information Technology | Sri Lanka | Volume 2 Issue 7, July 2013

A Comparative Study and Analysis of Quantization Table Modification Effect on JPEG Based Image Steganography

V. Senthooran, L. Ranathunga, KokSheik Wong

Imperceptibility and the embedding capacity are the two most important characteristics to be considered in the image based steganographic research studies. In the frequency domain, however, the secret message is first transformed into frequency domain and then the secret messages are embedded in the DCT transformed quantized coefficients. Many researchers have shown that the optimized modified quantization tables in the embedding process in DCT domain significantly reduce the distortion in the quality of stego-images and increase the embedding capacity of stego-image. This paper intends to review and analysis of the performance and efficiency of using optimized quantization tables instead of default JPEG tables within JPEG based image steganography and suggest optimized modified table for data embedding with comparison of previous methods. Data embedding capacity, Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) have been analyzed by modifying quantization tables entry for standard test images and they show the significance performance based on the quantization table modification. In addition to that, we suggest novel technique for data embedding based on quantization table modification.

Keywords: quantization tables, steganography, JPEG, DCT, stego-image, MSE, PSNR

Edition: Volume 2 Issue 7, July 2013

Pages: 181 - 186

Share this Article

How to Cite this Article?

V. Senthooran, L. Ranathunga, KokSheik Wong, "A Comparative Study and Analysis of Quantization Table Modification Effect on JPEG Based Image Steganography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013126, Volume 2 Issue 7, July 2013, 181 - 186

97 PDF Views | 73 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'steganography'

Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014

Pages: 528 - 535

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J.

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1358 - 1360

A Secure Image Stegnography Process

Sakshi, Jaspreet Kaur

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2750 - 2753

Review on Different Methods of Image Steganography

Priyanka Dongardive, Neelesh Gupta, Meha Khare

Share this Article

Research Paper, Information Technology, Iraq, Volume 4 Issue 6, June 2015

Pages: 627 - 631

Improved Steganographic Method for Hiding Secure Data Based on Efficient Keystream Generator

Dr. Ismail K. Ali, Salah T. Allawi, May M. Abbas

Share this Article

Review Papers, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 461 - 465

Data Hiding Using Steganography: A Review

Nishigandha P. Mangle, Prof. Sanjay S. Dhopte

Share this Article

Similar Articles with Keyword 'JPEG'

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2750 - 2753

Review on Different Methods of Image Steganography

Priyanka Dongardive, Neelesh Gupta, Meha Khare

Share this Article

Research Paper, Information Technology, Iraq, Volume 4 Issue 6, June 2015

Pages: 627 - 631

Improved Steganographic Method for Hiding Secure Data Based on Efficient Keystream Generator

Dr. Ismail K. Ali, Salah T. Allawi, May M. Abbas

Share this Article

Research Paper, Information Technology, Sri Lanka, Volume 2 Issue 7, July 2013

Pages: 181 - 186

A Comparative Study and Analysis of Quantization Table Modification Effect on JPEG Based Image Steganography

V. Senthooran, L. Ranathunga, KokSheik Wong

Share this Article

Similar Articles with Keyword 'DCT'

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1358 - 1360

A Secure Image Stegnography Process

Sakshi, Jaspreet Kaur

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2750 - 2753

Review on Different Methods of Image Steganography

Priyanka Dongardive, Neelesh Gupta, Meha Khare

Share this Article

Research Paper, Information Technology, Sri Lanka, Volume 2 Issue 7, July 2013

Pages: 181 - 186

A Comparative Study and Analysis of Quantization Table Modification Effect on JPEG Based Image Steganography

V. Senthooran, L. Ranathunga, KokSheik Wong

Share this Article

Similar Articles with Keyword 'MSE'

Research Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 1101 - 1105

Infectious Malware-Analysis and Protective Measures

Harjit Singh

Share this Article

Research Paper, Information Technology, Nigeria, Volume 4 Issue 7, July 2015

Pages: 2608 - 2615

The Proposed Roles of VLAN and Inter-VLAN Routing in Effective Distribution of Network Services in Ebonyi State University

Agwu Chukwuemeka Odi, Nweso Emmanuel Nwogbaga, Ojiugwo Chukwuka N.

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1059 - 1072

Globalization and Media

Dr. Manjeet Rathee

Share this Article

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 2556 - 2562

Wireless Sensor Networks: An Overview from an Optimization Perspective

Haroon Shoukat Ali, NoorAzian Mohamad Ali

Share this Article

Survey Paper, Information Technology, Malaysia, Volume 4 Issue 1, January 2015

Pages: 1287 - 1292

Survey on Mobile and Wireless Security Awareness: User Perspectives

Nadhirah binti Nazri, Noor Azian binti Mohamad Ali, Jamaludin Ibrahim

Share this Article

Similar Articles with Keyword 'PSNR'

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2750 - 2753

Review on Different Methods of Image Steganography

Priyanka Dongardive, Neelesh Gupta, Meha Khare

Share this Article

Research Paper, Information Technology, Sri Lanka, Volume 2 Issue 7, July 2013

Pages: 181 - 186

A Comparative Study and Analysis of Quantization Table Modification Effect on JPEG Based Image Steganography

V. Senthooran, L. Ranathunga, KokSheik Wong

Share this Article

Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 328 - 333

An Image Enhancement Framework for Fault Diagnosis and Feature Extraction

Malkit Singh, Gurjinder Singh

Share this Article
Top