Share / Export Citation / Email / Print / Text size:

International Journal on Smart Sensing and Intelligent Systems

Professor Subhas Chandra Mukhopadhyay

Exeley Inc. (New York)

Subject: Computational Science & Engineering , Engineering, Electrical & Electronic


eISSN: 1178-5608



VOLUME 7 , ISSUE 4 (December 2014) > List of articles


Hamdan L. Jaheel / Zou Beiji

Keywords : Transform domain technique, OutGuess0.1 algorithm, F4 algorithm, peak-signal-to-noise ratio (PSNR).

Citation Information : International Journal on Smart Sensing and Intelligent Systems. Volume 7, Issue 4, Pages 1,962-1,979, DOI:

License : (CC BY-NC-ND 4.0)

Received Date : 06-August-2014 / Accepted: 03-November-2014 / Published Online: 03-December-2014



Steganography is the act of hiding a message inside another message in such a way that can only be detected by its intended recipient. In any communication, security is the most important issue in the world today. It created a lot of data security and steganography algorithms in the past decade, and that worked motivation for our research. In this paper, Security Method for Combination Steganography Algorithms on Transform domain for JPEG images, we have designed a system that will allow the average user to securely transfer secret messages (picture) securely by hiding them in JPEG image file using local characteristics within the image. This paper is a combination of two steganography algorithms, which provide a strong backbone for its security. The proposed system hides the image unrevealed manner through the use of steganography algorithms to protect each other, where was used F4 algorithm as a wall to protect outguess01 algorithm. We combine between steganography algorithms (outguess 0.1 algorithm and F4 algorithm) to make use of it to provide more than level of protection for the secret message (image). When save the secret message (image) within an image by using outguess01 algorithm, Which produces outguess-image, then hide outguess-image within another image by using F4 algorithm, Which produces F4-image(stego image). Adopt the principle of camouflage and deception to hide image gives another level of safety for secret Image. Good selection of size and type images used in the process of concealment that contributed to the success of the process of embedded and retrieval of hidden images. Results proved after calculating the capacity and PSNR for images that a good and acceptable steganography scheme. The model presented here is based on JPEG images.

Content not available PDF Share



[1] M. Ramkumar & A.N. Akansu. “Some Design Issues For Robust Data hiding Systems”, Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers, 1528 – 1532, 1999
[2] N.F. Johnson, S. Jajodia, “Staganalysis: The Investigation of Hiding Information”, IEEE, pp. 113-116, 1998.
[3] R.Popa,”An Analysis of Steganographic System”, The Politehnica University of Timisoara, Faculty of Automatics and Computers, Department of Computer Science and Software Engineering, May 25, 1998.
[4] Kurak, C., and J. McHughes, "A Cautionary Note On Image Downgrading," in IEEEComputer Security Applications Conference 1992, Proceedings, IEEE Press, 1992, pp.153-159.
[5] Johnson, N. F., and S. Jajodia, “Exploring Steganography Seeing the Unseen, IEEE Computer , vol. 31, no. 2, 1998, pp. 26-34.
[6] F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, “Information Hiding—A Survey,” Proc. IEEE, vol. 87, no. 7, 1999, pp. 1062–1078.
[7] Thomas Mittelholzer, An information-theoretic approach to steganography and watermarking,Information Hiding, pp.1-16,2006.
[8] C. Cachin, An Information-Theoretic Model for Steganography, Lecture Notes in Computer Science, vol.1525, pp.306-318, 1998
[9] A.Westfeld and A. Pfitzmann, “Attacks on Steganographic Systems,” Proc. Information Hiding—3rd Int’l Workshop, Springer Verlag, 1999, pp. 61–76.
[10] N. Provos, “Defending Against Statistical Steganalysis,” In Proceedings of USENIX Security Symposium, 2001, pp. 323–335.
[11] Bender, W., D. Gruhl, and N. Morimoto, “Techniques for data hiding”, IBM Systems Journal, vol. 35, no. 34, 1996, pp. 131-336.
[12] M¨oller, S., A. Pitzmann, and I. Stirand, “Computer Based Steganography How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, At Best, in Information Hiding” First international Workshop, Proceedings , Springer, 1996, pp. 7-21.
[13] Cox, I., et al. , "A Secure, Robust Watermark for Multimedia," in Information Hiding: First International Workshop, Proceedings, vol. 1174 of Lecture Notes in Computer Science, Springer, 1996, pp. 185-206.
[14] O. Runaidh, J. J. K., F. M. Boland, and O. Sinnen, "Watermarking Digital Images for Copyright Protection, , Image and Signal Processing, Aug. 1996, vol. 143, pp. 250–256.
[15] J.R. Hernandez, M. Amado, & F. PerezGonzalez, “DCTDomain Watermarking Techniques for Still Images: Detector Performance Analysis and a New Structure”, IEEE Trans. Image Processing, 9, Jan. 2000, 55-68.
[16] Wallace, G. K., The JPEG Still Picture Compression Standard, Communications of the ACM, vol. 34, no. 4, 1991, pp. 30-44.
[17] J.J. Eggers, R. Bauml and B. Girod, “A communications approach to image steganography”, Proceedings of SPIE, vol.4675, pp.26-37, 2002.
[18] Philip Bateman and Dr. Hans “Image Steganography and Steganalysis”, M.S. thesis, Department of Computing Faculty of Engineering and Physical Sciences, University of Surrey Guildford Surrey, United Kingdom,2008.
[19] Fridrich J., Goljan M., and Hogea D., “Attacking the OutGuess”, Proc.ACM Workshop Multimedia and Security, 2002.
[20] A. Westfeld. "F5 - A Steganographic Algorithm: High Capacity Despite Better Steganalysis", Lecture Notes in Computer Science, vol. 2137, pp. 289-302, 2001.
[21] H. G. Schaathun. "CSM25: Secure Information Hiding", Lecture Notes, University of Surrey, UK, 2008.
[22] http;//
[23] Hossein Sheisi, Jafar Mesgarian, and Mostafa Rahmani, “Steganography: Dct Coefficient Replacement Method andCompare With Jsteg Algorithm” International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, August 2012.
[24] Hideki Noda, Michiharu Niimi, and Eiji Kawaguchi, “High performance JPEG steganographyusing quantization index modulation in DCT domain” Pattern Recognition Letters 27, (2006). Issue 5, 455 – 461
[25] Yanmin LUO, Peizhong LIU and Minghong LIAO, An artificial immune network clustering algorithm for mangroves remote sensing, International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO. 1, pp. 116 – 134, 2014.
[26] Daode Zhang et al., Research on chips’ defect extraction based on image-matching, International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO. 1, pp.321 – 336, 2014.