Implementation of 16 * 16 Quantization Table Steganography on Gray Scale Images
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 7, July 2013

Implementation of 16 * 16 Quantization Table Steganography on Gray Scale Images

Hina Anand, Kapil Narwal, Kartik Mudgal

Steganography is defined as an art of concealed data sharing for communication that prevents the detection of hidden messages. This paper presents a steganographic method based on modification of JPEG quantization table. Modified Discrete Cosine Transform (MDCT) is implemented based on transform domain technique. The proposed work hides the secret message inside an image using Modified Discrete Cosine Transform (MDCT). In this paper, the image is divided into non-overlapping blocks of 16*16 so as to embed secret information. The secret message is hidden inside an image which forms a stego image. The stego image is a combination of secret message and the cover image. Here four grayscale images have been considered and these images have been compared on the basis of three performance parameters such as capacity, PSNR, MSE.

Keywords: Peak Signal to Noise Ratio, Mean Square Error, Discrete Cosine Transform, Steganography

Edition: Volume 2 Issue 7, July 2013

Pages: 70 - 73

Share this Article

How to Cite this Article?

Hina Anand, Kapil Narwal, Kartik Mudgal, "Implementation of 16 * 16 Quantization Table Steganography on Gray Scale Images", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=0201384, Volume 2 Issue 7, July 2013, 70 - 73

78 PDF Views | 71 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Mean Square Error'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2062 - 2066

XOR- Based Secrete Sharing Scheme For Image Database Security: A Review

Bhagyashree A. Dhamande, Rutuja N. Kamble

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 7 Issue 7, July 2018

Pages: 1297 - 1298

Hybrid Approach of KNN and Euclidean Distance to Tackle Sybil Attack in the Network

Yasmeen, Parminder Kaur

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1054 - 1058

Colour Extended Visual Cryptography based on MKGED

T. Anuradha, Dr. K. Usha Rani

Share this Article

Similar Articles with Keyword 'Discrete Cosine Transform'

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 165 - 167

Statistical Analysis of DCT Coefficients for Ascertaining Ear's Biometrics

Nisha, Jatinder Kansal, JPS Raina

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1587 - 1589

A Survey on Comparison between DCT and DWT Techniques of Image Compression

Pooja Rani, Apoorva Arora

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2188 - 2194

Blind Image / Video Quality Assessment Based on DCT-Domain Statistics

Minu Thomas, Saranya Sasidharan, Smitha K S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1158 - 1164

Chinese Sign Language Alpha-Numeric Character Classification using Neural Network

R. B. Mapari, G. U. Kharat

Share this Article

Similar Articles with Keyword 'Steganography'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2541 - 2544

Reversible Data Embedding using F5 Algorithm

Sanjivani Koli, N. B. Pokale

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 1, January 2015

Pages: 1367 - 1372

Comparative Study for Steganography Techniques

Zainalabideen Abdual Samad Rasheed

Share this Article
Top