Implementation of 16 * 16 Quantization Table Steganography on Gray Scale Images
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 7, July 2013

Implementation of 16 * 16 Quantization Table Steganography on Gray Scale Images

Hina Anand, Kapil Narwal, Kartik Mudgal

Steganography is defined as an art of concealed data sharing for communication that prevents the detection of hidden messages. This paper presents a steganographic method based on modification of JPEG quantization table. Modified Discrete Cosine Transform (MDCT) is implemented based on transform domain technique. The proposed work hides the secret message inside an image using Modified Discrete Cosine Transform (MDCT). In this paper, the image is divided into non-overlapping blocks of 16*16 so as to embed secret information. The secret message is hidden inside an image which forms a stego image. The stego image is a combination of secret message and the cover image. Here four grayscale images have been considered and these images have been compared on the basis of three performance parameters such as capacity, PSNR, MSE.

Keywords: Peak Signal to Noise Ratio, Mean Square Error, Discrete Cosine Transform, Steganography

Edition: Volume 2 Issue 7, July 2013

Pages: 70 - 73

Share this Article

How to Cite this Article?

Hina Anand, Kapil Narwal, Kartik Mudgal, "Implementation of 16 * 16 Quantization Table Steganography on Gray Scale Images", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=0201384, Volume 2 Issue 7, July 2013, 70 - 73

135 PDF Views | 117 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Mean Square Error'

| Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1054 - 1058

Colour Extended Visual Cryptography based on MKGED

T. Anuradha, Dr. K. Usha Rani

Share this Article

| Weekly Popularity: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1538 - 1540

Survey on Optimization of Fractal Image Compression

Er. Awdhesh Kumari, Dr. Shaveta Rani, Dr. Paramjeet Singh

Share this Article

| Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

| Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2078 - 2080

Image Enhancement Technique Using Symlet and Daubechies Wavelets

Shivani Jain, Jyoti Rani

Share this Article

| Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1647 - 1651

A New Hybrid Technique for Detection of Liver Cancer on Ultrasound Images

Ramandeep Kaur Bhullar, Navpreet Kaur Walia

Share this Article

Similar Articles with Keyword 'Discrete Cosine Transform'

| Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 165 - 167

Statistical Analysis of DCT Coefficients for Ascertaining Ears Biometrics

Nisha, Jatinder Kansal, JPS Raina

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1984 - 1986

Discrete Cosine Transform based Image Inpainting

Bansi B. Thanki

Share this Article

| Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

| Weekly Popularity: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

| Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1891 - 1895

Image Normalization Robust using Histogram Equalization and Logarithm Transform Frequency DCT Coefficients for Illumination in Facial Images

Dr. V. S. Manjula

Share this Article

Similar Articles with Keyword 'Steganography'

| Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

| Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

| Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1944 - 1949

A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Alok Ranjan, Mansi Bhonsle

Share this Article

| Weekly Popularity: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this Article
Top