Previous Article in Journal
A Quantum Approach for Exploring the Numerical Results of the Heat Equation
Previous Article in Special Issue
Insights into Image Understanding: Segmentation Methods for Object Recognition and Scene Classification
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

High-Fidelity Steganography: A Covert Parity Bit Model-Based Approach

1
College of Computing & Informatics, University of Sharjah, Sharjah P.O. Box 27272, United Arab Emirates
2
Research Institute of Sciences & Engineering (RISE), University of Sharjah, Sharjah P.O. Box 27272, United Arab Emirates
*
Author to whom correspondence should be addressed.
Algorithms 2024, 17(8), 328; https://doi.org/10.3390/a17080328 (registering DOI)
Submission received: 14 June 2024 / Revised: 17 July 2024 / Accepted: 22 July 2024 / Published: 27 July 2024

Abstract

The Discrete Cosine Transform (DCT) is fundamental to high-capacity data hiding schemes due to its ability to condense signals into a few significant coefficients while leaving many high-frequency coefficients relatively insignificant. These high-frequency coefficients are often replaced with secret data, allowing for the embedding of many secret bits while maintaining acceptable stego signal quality. However, because high-frequency components still affect the stego signal’s quality, preserving their structure is beneficial. This work introduces a method that maintains the structure of high-frequency DCT components during embedding through polynomial modeling. A scaled-down version of the secret signal is added to or subtracted from the polynomial-generated signal to minimize the error between the cover signal and the polynomial-generated signal. As a result, the stego image retains a structure similar to the original cover image. Experimental results demonstrate that this scheme improves the quality and security of the stego image compared to current methods. Notably, the technique’s robustness is confirmed by its resistance to detection by deep learning methods, as a Convolutional Neural Network (CNN) could not distinguish between the cover and stego images.
Keywords: deep learning; steganography; hiding; DCT; model; capacity; imperceptibility; trade-off; polynomial regression deep learning; steganography; hiding; DCT; model; capacity; imperceptibility; trade-off; polynomial regression

Share and Cite

MDPI and ACS Style

Rabie, T.; Baziyad, M.; Kamel, I. High-Fidelity Steganography: A Covert Parity Bit Model-Based Approach. Algorithms 2024, 17, 328. https://doi.org/10.3390/a17080328

AMA Style

Rabie T, Baziyad M, Kamel I. High-Fidelity Steganography: A Covert Parity Bit Model-Based Approach. Algorithms. 2024; 17(8):328. https://doi.org/10.3390/a17080328

Chicago/Turabian Style

Rabie, Tamer, Mohammed Baziyad, and Ibrahim Kamel. 2024. "High-Fidelity Steganography: A Covert Parity Bit Model-Based Approach" Algorithms 17, no. 8: 328. https://doi.org/10.3390/a17080328

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop