Abstract
Steganography can be performed using frequency domain or spatial domain. In spatial domain method, the least significant bits (LSB) is the mostly used method where the least significant bits of the image's pixels binary representation are used to carry the confidential data bits. On the other hand, secret data bits in the frequency domain technique are hidden using coefficients of the image frequency representation such as discrete cosine transform (DCT). Robustness against image attacks or channel's noise is a key requirement in steganography. In this paper, we study the performance of the steganography methods over a channel with Added White Gaussian Noise (AWGN). We use the bit error rate to evaluate the performance of each method over a channel with different noise levels. Simulation results show that the frequency domain technique is more robust and achieves better bit error rate in a noisy channel than the spatial domain method. Moreover, we enhanced the steganography system robustness by using convolution encoder and Viterbi decoder. The effect of the encoder’s parameters, such as rate and constraint length is evaluated.
Highlights
Steganography is the process of concealing critical and important information undetectably in a cover medium such as image, voice and video [1, 2]
The secret message concealed using frequency domain or spatial domain transmitted over the noisy channel
The performance of the steganography technique is measured by computing the bit error rate for each method over a channel with different noise levels
Summary
Steganography is the process of concealing critical and important information undetectably in a cover medium such as image, voice and video [1, 2]. The steganography model is illustrated, where the important message hidden in the cover image using the embedding process. The watermarked image which is the cover image with concealed data is transmitted through a communication channel. The receiver recovers the secret message using the extracting process. The embedding and extracting processes are implemented using spatial domain [3,4,5] or frequency domain techniques [6, 7]
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Computer Science and Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.