Secure Image Steganography Algorithm Based on DCT with OTP Encryption

Authors

  • De Rosal Ignatius Moses Setiadi Faculty of Computer Science, Dian Nuswantoro University, Semarang
  • Eko Hari Rachmawanto Faculty of Computer Science, Dian Nuswantoro University, Semarang
  • Christy Atika Sari Faculty of Computer Science, Dian Nuswantoro University, Semarang

DOI:

https://doi.org/10.33633/jais.v2i1.1330

Abstract

Rapid development of Internet makes transactions message even easier and faster. The main problem in the transactions message is security, especially if the message is private and secret. To secure these messages is usually done with steganography or cryptography. Steganography is a way to hide messages into other digital content such as images, video or audio so it does not seem nondescript from the outside. While cryptography is a technique to encrypt messages so that messages can not be read directly. In this paper have proposed combination of steganography using discrete cosine transform (DCT) and cryptography using the one-time pad or vernam cipher implemented on a digital image. The measurement method used to determine the quality of stego image is the peak signal to noise ratio (PSNR) and ormalize cross Correlation (NCC) to measure the quality of the extraction of the decrypted message. Of steganography and encryption methods proposed obtained satisfactory results with PSNR and NCC high and resistant to JPEG compression and median filter. Keywords—Image Steganography, Discrete Cosine Transform (DCT), One Time Pad, Vernam, Chiper, Image Cryptography

Author Biography

De Rosal Ignatius Moses Setiadi, Faculty of Computer Science, Dian Nuswantoro University, Semarang

Informatics Engineering, Faculty of Computer Science

References

O. Cetin dan A. T. Ozcerit, “A new steganography algorithm based on color histograms for data embedding into raw video streams,†Computers & Security, vol. XXVIII, no. 7, p. 670–682, 2009.

T.-H. Lan dan A. H. Tewfik, “A Novel High-Capacity Data-Embedding System,†IEEE Transactions on Image Processing, vol. XV, no. 8, pp. 2431-2440, 2006.

P. Patel dan Y. Patel, “Secure and authentic DCT image steganography through DWT –SVD based Digital watermarking with RSA encryption,†dalam Fifth International Conference on Communication Systems and Network Technologies, Gwalior, 2015.

B. G. Banik dan S. K. Bandyopadhyay, “Implementation of Image Steganography Algorithm using Scrambled Image and Quantization Coefficient Modification in DCT,†dalam International Conference on Research in Cumputational Intelligence and Communication Networks., 2015.

M. Gunjal dan J. J. , “Image Steganography Using Discrete Cosine Transform (DCT) and Blowfish Algorithm,†International Journal of Computer Trends and Technology, vol. XI, no. 4, pp. 144-150, 2014.

S. T, “A Secure DCT Image Steganography based on Public-Key Cryptography,†International Journal of Computer Trends and Technology (IJCTT), vol. IV, no. 7, pp. 2039-2043, 2013.

O. Tornea, M. E. Borda, V. Pileczki dan R. Malutan, “DNA Vernam Cipher,†dalam International Conference on E-Health and Bioengineering, Iaşi, 2011.

B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons Inc, 1996.

A. Bovik, The Essential Guide to Image Processing, Texas: Elsevier Inc., 2009.

J. Huang, Y. Q. Shi dan Y. Shi, “Embedding Image Watermarks in DC Components,†IEEE Transactions on Circuits and Systems for Video Technology, vol. 10, no. 6, pp. 974 - 979, September 2000.

R. Shukla, H. O. Prakash, R. Bhushan, S. Venkataraman dan G. Varadan, “Sampurna Suraksha: Unconditionally Secure And Authenticated One Time Pad Cryptosystem,†dalam International Conference on Machine Intelligence Research and Advancement, Katra, 2013.

E. Lehmann dan G. Casella, Theory of Point Estimation, 2nd penyunt., G. Casella, S. Fienberg dan I. Olkin, Penyunt., New York: Springerr Verlac, 1998.

A. Al-Haj, “Combined DWT-DCT Digital Image Watermarking,†Journal of Computer Science, vol. 3, pp. 740-746, September 2007.

P. Singh, S. Shivani dan S. Agarwal, “A Chaotic Map Based DCT-SVD Watermarking Scheme For Rightful Ownership Verification,†dalam Students Conference on Engineering and Systems (SCES), Allahabad, 2014.

G. K. Wallace, “The JPEG still picture compression standard,†IEEE Consumer Electronics Society, vol. 38, no. 1, pp. 18-34, February 1992.

Downloads

Published

2017-04-21

Issue

Section

Articles