inis 20(24): e2

Research Article

An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images

Download972 downloads
  • @ARTICLE{10.4108/eai.28-9-2020.166365,
        author={Franklin Tchakount\^{e} and Priva Chassem Kamdem and Jean Claude Kamgang and Hortense Boudjou Tchapgnouo and Marcellin Atemkeng},
        title={An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images},
        journal={EAI Endorsed Transactions on Industrial Networks and Intelligent Systems},
        volume={7},
        number={24},
        publisher={EAI},
        journal_a={INIS},
        year={2020},
        month={9},
        keywords={Image steganography, JPEG, Discrete Cosine Transform, Insertion, Singular Value Decomposition, Quantization, Attacks, Social media},
        doi={10.4108/eai.28-9-2020.166365}
    }
    
  • Franklin Tchakounté
    Priva Chassem Kamdem
    Jean Claude Kamgang
    Hortense Boudjou Tchapgnouo
    Marcellin Atemkeng
    Year: 2020
    An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images
    INIS
    EAI
    DOI: 10.4108/eai.28-9-2020.166365
Franklin Tchakounté1,*, Priva Chassem Kamdem1, Jean Claude Kamgang2, Hortense Boudjou Tchapgnouo3, Marcellin Atemkeng4
  • 1: Mathematics and Computer Science, Faculty of Science, University of Ngaoundéré, Cameroon
  • 2: Department of Mathematics and Computer Science , National School of Agro-Industrial Science, University of Ngaoundéré, Cameroon
  • 3: Department of Computer Science and Telecommunications, National School of Polytechnic of Maraoua, University of Maroua, Cameroon
  • 4: Department of Mathematics, Rhodes University, 6140 Grahamstown, South Africa
*Contact email: tchafros@gmail.com

Abstract

To prove the origin of images in social media, this work proposes an efficient JPEG image steganography approach. After structuring the cover image into blocks of 8*8 pixels, Discrete Cosine Transform is applied to each block of pixels. The latter are quantified using a quantization table and a matrix of DC coefficients from quantized blocks of pixels, is obtained. Singular Value Decomposition is applied to the previous matrix and the secret message is inserted within singular vectors. For extraction purposes, previous transformations are followed reversely. An experimentation is made on seven images and results show that the proposed system outperforms similar studies in three aspects (i) it preserves stego image quality with PSNR of stego images varying between 38 and 54 (ii) it is able to insert a secret message of 257600 bits with the capacity of 4 bits per pixel (iii) it is robust and resistant to attacks such as histogram analysis and chi-square test.