<< Chapter < Page Chapter >> Page >

Data hiding methods

Bit-o-steg

Hiding information

As you should recall, our zeros hiding method inserts data into the dropped coefficients of the DCT. Thebit-o-steg algorithm hides data within the coefficients that were not dropped. The critical part of bit-o-steg is the key used toencrypt the data. This user defined key selects which nonzero coefficients to change and which bits to change within eachcoefficient. The simplest key would be a key of [1]. This wouldchange each coefficient sequentially and change the last bit in the coefficient.

The key is what makes bit-o-steg unique from other algorithms. Here a key of [1 2] is applied to hide the data.

As you can see in figure 1, we chose a key of [1 2]. The key will select the first coefficient and its least significant bit and input the first bit of the hidden data intothat coefficient bit. Then the key will count two coefficients and take the second least significant bit and repeat the hidingprocess. Since this is the end of the key, it repeats, selecting the next coefficient. The length of this key has no real bound, butit must ensure that all data is hidden before reaching the last DCT coefficient in the image. There is, however, a range of values thatmust be selected for the key to work. Since the key alters bits, values between one and eight must be used. However, if largervalues are used, it will alter the image greatly since it changes more and more significant bits.

Minimal changes have been made to the picture matrix after the application of the bit-o-steg algorithm

Retrieving the data

Retrieving the data is impossible unless you have the special key used to hide the data. Once you get the keyyou simply reverse apply the key, extracting rather than inputting the bits and reconstruct your hidden data stream from thosebits.

Get Jobilize Job Search Mobile App in your pocket Now!

Get it on Google Play Download on the App Store Now




Source:  OpenStax, Elec 301 - steganography - what's in your picture?. OpenStax CNX. Dec 14, 2005 Download for free at http://cnx.org/content/col10316/1.2
Google Play and the Google Play logo are trademarks of Google Inc.

Notification Switch

Would you like to follow the 'Elec 301 - steganography - what's in your picture?' conversation and receive update notifications?

Ask