International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 126 | Views: 254

Research Paper | Information Technology | Sri Lanka | Volume 2 Issue 7, July 2013 | Popularity: 6.9 / 10


     

A Comparative Study and Analysis of Quantization Table Modification Effect on JPEG Based Image Steganography

V. Senthooran, L. Ranathunga, KokSheik Wong


Abstract: Imperceptibility and the embedding capacity are the two most important characteristics to be considered in the image based steganographic research studies. In the frequency domain, however, the secret message is first transformed into frequency domain and then the secret messages are embedded in the DCT transformed quantized coefficients. Many researchers have shown that the optimized modified quantization tables in the embedding process in DCT domain significantly reduce the distortion in the quality of stego-images and increase the embedding capacity of stego-image. This paper intends to review and analysis of the performance and efficiency of using optimized quantization tables instead of default JPEG tables within JPEG based image steganography and suggest optimized modified table for data embedding with comparison of previous methods. Data embedding capacity, Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) have been analyzed by modifying quantization tables entry for standard test images and they show the significance performance based on the quantization table modification. In addition to that, we suggest novel technique for data embedding based on quantization table modification.


Keywords: quantization tables, steganography, JPEG, DCT, stego-image, MSE, PSNR


Edition: Volume 2 Issue 7, July 2013


Pages: 181 - 186



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
V. Senthooran, L. Ranathunga, KokSheik Wong, "A Comparative Study and Analysis of Quantization Table Modification Effect on JPEG Based Image Steganography", International Journal of Science and Research (IJSR), Volume 2 Issue 7, July 2013, pp. 181-186, URL: https://www.ijsr.net/getabstract.php?paperid=02013126, DOI: https://www.doi.org/10.21275/02013126



Downloads: 357 | Views: 1003

Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir


Downloads: 301 | Views: 562

Information Technology, India, Volume 8 Issue 1, January 2019

Pages: 456 - 460

Analysis of Blockchain and its Working Principle

S. Banupriya, G. Renuka Devi


Downloads: 266 | Views: 411

Information Technology, China, Volume 9 Issue 1, January 2020

Pages: 107 - 112

Network Optimization using Multi-Agent Genetic Algorithm

Sikandar Hanif


Downloads: 260 | Views: 473

Information Technology, Malaysia, Volume 8 Issue 1, January 2019

Pages: 64 - 70

University of the Future (UotF): Redesign Business Model for Local University in Malaysia through Humanising Education and 4IR

Nor Zaiasron Bin Yahaya, Abdul Rahman Bin Ahmad Dahlan


Downloads: 254 | Views: 422

Information Technology, India, Volume 9 Issue 1, January 2020

Pages: 477 - 479

IoT Based Smart Street Light for Energy Efficiency and Safety

Tanmay Patil, Arjun Ramendra


Top