Image Steganography Based on Entropy Thresholding Scheme
B.S.Patil1, A.H.Karode2, S.R.Suralkar3
1Mr.B.S.Patil, Student, M.E. IInd Year, S.S.B.T‟S COET Bambhori, Jalgaon, India.
2Mr.A.H.Karode, Assistant Professor, E&TC, S.S.B.T‟S COET Bambhori, Jalgaon, India.
3Mr.S.R.Suralkar, Associate Professor, E&TC, S.S.B.T‟S COET Bambhori, Jalgaon, India.
Manuscript received on September 22, 2013. | Revised Manuscript received on October 15, 2013. | Manuscript published on October 30, 2013. | PP: 358-361 | Volume-3, Issue-1, October 2013. | Retrieval Number:  A2287103113/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In this paper, we present image steganography based on entropy thresholding scheme via digital images that contains redundant information can be used as covers or carrier to hide secrete message. After embedding a secrete message into the cover image so called stego image is obtained. We introduce a new forensic tool that can reliably detect distortion due to steganography and watermarking and modify those images that were originally stored in the JPEG format. Due to JPEG compression we get unique fingerprints and used as a “fragile watermark” enabling us to detect changes as small as modifying the LSB of one randomly chosen pixel. The detection of changes is based on investigating the compatibility of 8 8 blocks of pixels with JPEG compression with a given quantization matrix. The use of local criteria to choose where to hide data can potentially cause de-synchronization of the encoder and decoder. This synchronization problem is solved by the use of powerful, but simple-to-implement, erasures and errors correcting codes, which also provide robustness against a variety of attacks. The proposed system is used to hides large volume of data in an image as well as it will limit the perceivable distortion that might occur in an image while processing it. This project has an advantage over other information security software because the hidden text is in the form of images, which are not obvious text information carriers. The main advantage of this project is a simple, powerful and user-friendly GUI that plays a very large role in the success of the application.
Keywords: Steganography, Data hiding, Jpeg, DCT.