Share / Export Citation / Email / Print / Text size:

International Journal on Smart Sensing and Intelligent Systems

Professor Subhas Chandra Mukhopadhyay

Exeley Inc. (New York)

Subject: Computational Science & Engineering, Engineering, Electrical & Electronic


eISSN: 1178-5608



VOLUME 8 , ISSUE 1 (March 2015) > List of articles


Hamdan Lateef Jaheel / Zou Beiji

Keywords : Transform Domain Technique, Jsteg, OutGuess0.1, MSE, peak-signal-to-noise ratio (PSNR).

Citation Information : International Journal on Smart Sensing and Intelligent Systems. Volume 8, Issue 1, Pages 90-106, DOI: https://doi.org/10.21307/ijssis-2017-750

License : (CC BY-NC-ND 4.0)

Received Date : 03-November-2014 / Accepted: 05-January-2015 / Published Online: 01-March-2015



Steganography is the act of hiding a message inside another message in such a way that the hidden message can only be detected by its intended recipient. In this paper, we combined two steganography algorithms namely JSteg and OutGuess algorithms, in order to exploit the beneficial characteristics and features of both algorithms to enhance the protection level for secret images. In our proposed approach, the secret message (image) is first concealed inside another image using JSteg algorithm and the resultant stego-image is further hidden inside a final image using OutGuess 0.1 algorithm. In this combine approach, the tricky nature of hiding an already hidden message is using two different algorithms increases the level of difficulty for a third party to suspect the existence of a secret image in the first place or even successful decode the it. Besides that, the priority given to the choice of a good image size and type in this approach further disguises the secret image and increases the chances that the image could go unnoticed. Results after calculating the capacity and PSNR for images proved that our approach is a good and acceptable steganography system. The model presented here is based on JPEG images.

Content not available PDF Share



[1] Niels Provos and Peter Honeyman “Hide and Seek: An Introduction to Steganography” ,
IEEE Computer Society ,Vol.1,No.3, 2003,pp.32-44.
[2] Philip Bateman and Dr. Hans “Image Steganography and Steganalysis”, M.S., Department of
Computing Faculty of Engineering and Physical Sciences, University of Surrey Guildford Surrey,
United Kingdom, 2008.
[3] Hossein Sheisi, Jafar Mesgarian, and Mostafa Rahmani “Steganography: Dct Coefficient
Replacement Method and Compare With JSteg Algorithm “,International Journal of Computer
and Electrical Engineering, Vol. 4, No. 4, August 2012
[4] Vijay and Vishal” A Steganography Algorithm for Hiding Image in Image by Improved LSB
Substitution by Minimize Detection”, Theoretical and Applied Information Technology, Vol. 36,
[5] Mohamed Amin, Hatem M. Abdullkader, Hani M. Ibrahem, and Ahmed S. Sakr1”A
Steganographic Method Based on DCT and New Quantization Technique”, International
Journal of Network Security, Vol.16, No.3, PP.214-219, May 2014
[6] Ramandeep Kaur Toor and Ramanjot Kaur”A Steganographic Method Based Upon JPEG
and Quantization Table Modification”, International Journal of Information Technology and Knowledge Management ,NO.1,Vol.6, pp. 19-21, 2012
[7] Mohit Kumar Goel & Neelu Jain “ A Novel Steganographic Technique Based on LSB-DCT
Approach” , in National Conference on Emerging Trends in Information and Computing
Technologies NCETICT, 2012.
[8] Chan, C.K. and Cheng. L.M. “Hiding Data in Image by Simple LSB Substitution”, Pattern
Recognition, No.3, Vol.37, pp. 469 – 474, 2004.
[9] Chang,C.C and Tseng, H.W. “A Steganographic Method for Digital Images Using Side
Match”, Pattern Recognition Letters,No.12, Vol.25, pp. 1431 – 1437, 2004.
[10] Sayuthi Jaafar, Azizah A Manaf, Akram M Zeki, “Steganography Technique Using Modulus
Arithmetic”, in 9th International Symposium on Signal Processing and Its Applications, pp. 1 – 4,
[11] W. Bender, D. Gruhl, N. Morimoto, and A. Lu,” Techniques for Data Hiding”, I.B.M.
Systems Journal, No.3.4,Vol.35, pp. 313-336, 1996.
[12] N. Nikolaidis, and I. Pitas, “Robust Image Watermarking in the Spatial Domain”, Signal
Processing, No.3,Vol.66, pp. 385-403, 1998
[13] T. Morkel, J. Eloff, and M. Olivier,”An Overview of Image Steganography”, In Proceedings
of the Fifth Annual Information Security South Africa Conference ISSA, 2005.
[14] Currie, D.L. & Irvine, C.E., “Surmounting the Effects of Lossy Compression on
Steganography”, in19th National Information Systems Security Conference, 1996
[15] D. Fu, Y. Shi, D. Zou, and G. Xuan. "JPEG Steganalysis Using Empirical Transition Matrix
in Block DCT Domain", IEEE: 8th Workshop on Multimedia Signal Processing 2006, pp. 310-
313, 2006.
[16] Tao Zhang & Xijian Ping “A Fast and Effective Steganalytic Technique against JSteg-like
Algorithms” SAC 2003.
[17] N. Provos. "Defending Against Statistical Steganalysis", 10th USENIX Security Symposium,
vol. 10, pp. 323-335, 2001
[18] Fridrich J., Goljan M., and Hogea D., “Attacking the OutGuess,” ,Proc.ACM Workshop
Multimedia and Security, 2002.
[19] Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt ”Digital image steganography:
Survey and analysis of current methods” , Signal Processing, No.3,Vol.90, pp 727–752,2010.
[20] X. Li, J. Wang, “A Steganographic Method Based Upon JPEG and Particle Swarm Optimization Algorithm”, Information Sciences, No.15,Vol.177, pp. 3099–31091, 2007.
[21] S.C.Mukhopadhyay, F.P.Dawson, M.Iwahara and S.Yamada, “A Novel Compact Magnetic
Current Limiter for Three Phase Applications”, IEEE Transactions on Magnetics, Vol. 36, No. 5,
pp. 3568-3570, September 2000.
[22] Y.H. Yu, C.C. Chang, I.C. Lin,” A New Steganographic Method for Color and Grayscale
Image Hiding”, Computer Vision and Image Under- standing, No.3,Vol.107, pp.183–194,2007.
[23] S.C.Mukhopadhyay, S. Deb Choudhury, T. Allsop, V. Kasturi and G. E. Norris,
“Assessment of pelt quality in leather making using a novel non-invasive sensing approach”,
Journal of Biochemical and Biophysical methods, Elsevier, JBBM Vol. 70, pp. 809-815, 2008.
[24] A.I. Hashad, A.S. Madani, A.E.M.A.” Wahdan, A Robust Steganography Technique Using
Discrete Cosine Transform Insertion”, in IEEE/ITI Third International Conference on
Information and Communications Technology, 2005, pp. 255–264.
[25] http;//www.cs.washington.eduresearchimagedatabasegroundtruth_tars.for.download
[26] http://vision.okstate.eduloc=csiq
[27] N.K. Suryadevara, S.C. Mukhopadhyay, R. Wang, R.K. Rayudu, Forecasting the behavior of
an elderly using wireless sensors data in a smart home, Engineering Applications of Artificial
Intelligence, Volume 26, Issue 10, November 2013, Pages 2641-2652, ISSN 0952-1976,
[28] V.Nagaraj, Dr. V. Vijayalakshmi and Dr. G. Zayaraz” Color Image Steganography based on
Pixel Value Modification Method Using Modulus Function” International Conference on
Electronic Engineering and Computer Science, IERI Procedia 4, 2013, pp. 17 – 24.
[29] Yanmin LUO, Peizhong LIU and Minghong LIAO, An artificial immune network clustering
algorithm for mangroves remote sensing, International Journal on Smart Sensing and Intelligent
Systems, VOL. 7, NO. 1, pp. 116 – 134, 2014.
[30] Daode Zhang et al., Research on chips’ defect extraction based on image-matching,
International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO. 1, pp. 321 – 336,