<< Chapter < Page Chapter >> Page >
This is an overview of our steganographic technique, zeros hiding.

Data hiding methods

Zero hiding

Hiding information

We arrived at our first data hiding method, which we called“zero hiding,”quite intuitively. If you recall, our compression algorithm removed the least important DCTcoefficients. It follows, then, that we could put the bit stream we wish to hide back into these dropped coefficients without changingthe image drastically. To do this though, there must be a way to distinguish a zero which resulted from a dropped coefficient and acoefficient that is zero. To do this, we ran the image through a modified compressor that, instead of dropping coefficients belowthe specified threshold, replaced them with either a plus or minus one, depending on the sign of the coefficient.

The DCT is taken and then each coefficient under the specified threshold (10) will be dropped. These are coefficients are shown in blue in the picture on the right.

Next the hiding algorithm is given a binary data stream and the threshold value. The data stream is thendivided up into words. However, the maximum decimal value of the word must be less than the threshold, since values over thethreshold signify an important coefficient in the picture. We then increment each word’s decimal value by one to avoid putting in zero valued coefficients, which would otherwise be indistinguishablefrom zero valued coefficients in the original image. We then go back to the original coefficients matrix and replace the ones withthe new value of the data word, maintaining the sign throughout.

The dropped coefficients are replaced with words created from the data stream. The IDCT is then taken, transforming the coefficient matrix back to a picture matrix.

Data retrieval

To recover the hidden data the recovery script is given the threshold, and subtracts one from all DCTcoefficients blow that threshold and tacks their binary values together, forming the original binary data.

Get Jobilize Job Search Mobile App in your pocket Now!

Get it on Google Play Download on the App Store Now




Source:  OpenStax, Elec 301 - steganography - what's in your picture?. OpenStax CNX. Dec 14, 2005 Download for free at http://cnx.org/content/col10316/1.2
Google Play and the Google Play logo are trademarks of Google Inc.

Notification Switch

Would you like to follow the 'Elec 301 - steganography - what's in your picture?' conversation and receive update notifications?

Ask