This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Open AccessArticle
High-Fidelity Steganography: A Covert Parity Bit Model-Based Approach
by
Tamer Rabie
Tamer Rabie 1,
Mohammed Baziyad
Mohammed Baziyad 2,* and
Ibrahim Kamel
Ibrahim Kamel 1
1
College of Computing & Informatics, University of Sharjah, Sharjah P.O. Box 27272, United Arab Emirates
2
Research Institute of Sciences & Engineering (RISE), University of Sharjah, Sharjah P.O. Box 27272, United Arab Emirates
*
Author to whom correspondence should be addressed.
Algorithms 2024, 17(8), 328; https://doi.org/10.3390/a17080328 (registering DOI)
Submission received: 14 June 2024
/
Revised: 17 July 2024
/
Accepted: 22 July 2024
/
Published: 27 July 2024
Abstract
The Discrete Cosine Transform (DCT) is fundamental to high-capacity data hiding schemes due to its ability to condense signals into a few significant coefficients while leaving many high-frequency coefficients relatively insignificant. These high-frequency coefficients are often replaced with secret data, allowing for the embedding of many secret bits while maintaining acceptable stego signal quality. However, because high-frequency components still affect the stego signal’s quality, preserving their structure is beneficial. This work introduces a method that maintains the structure of high-frequency DCT components during embedding through polynomial modeling. A scaled-down version of the secret signal is added to or subtracted from the polynomial-generated signal to minimize the error between the cover signal and the polynomial-generated signal. As a result, the stego image retains a structure similar to the original cover image. Experimental results demonstrate that this scheme improves the quality and security of the stego image compared to current methods. Notably, the technique’s robustness is confirmed by its resistance to detection by deep learning methods, as a Convolutional Neural Network (CNN) could not distinguish between the cover and stego images.
Share and Cite
MDPI and ACS Style
Rabie, T.; Baziyad, M.; Kamel, I.
High-Fidelity Steganography: A Covert Parity Bit Model-Based Approach. Algorithms 2024, 17, 328.
https://doi.org/10.3390/a17080328
AMA Style
Rabie T, Baziyad M, Kamel I.
High-Fidelity Steganography: A Covert Parity Bit Model-Based Approach. Algorithms. 2024; 17(8):328.
https://doi.org/10.3390/a17080328
Chicago/Turabian Style
Rabie, Tamer, Mohammed Baziyad, and Ibrahim Kamel.
2024. "High-Fidelity Steganography: A Covert Parity Bit Model-Based Approach" Algorithms 17, no. 8: 328.
https://doi.org/10.3390/a17080328
Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details
here.
Article Metrics
Article metric data becomes available approximately 24 hours after publication online.