• English
    • العربية
  • العربية
  • Login
  • QU
  • QU Library
  •  Home
  • Communities & Collections
  • Help
    • Item Submission
    • Publisher policies
    • User guides
    • FAQs
  • About QSpace
    • Vision & Mission
View Item 
  •   Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • University Publications
  • QU Forum Proceedings
  • Qatar University Annual Research Forum & Exhibition
  • QUARFE 2021
  • Theme 3: Information and Communication Technologies
  • View Item
  • Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • University Publications
  • QU Forum Proceedings
  • Qatar University Annual Research Forum & Exhibition
  • QUARFE 2021
  • Theme 3: Information and Communication Technologies
  • View Item
  •      
  •  
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Performance Analysis of DCT and DWT Algorithms in Image Steganography

    Thumbnail
    View/Open
    323.pdf (2.213Mb)
    Date
    2021
    Author
    Najeeb, Al Anood
    Maadeed, Somaya Al
    Maadeed, Noor Al
    Metadata
    Show full item record
    Abstract
    Frequency domain techniques such as Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) ensures high accuracy when compared with the spatial domain techniques. Therefore, these image steganographic methods were evaluated using public datasets to compare the performance of DCT and DWT. After performing different tests using the datasets in each of the algorithms, a comparative analysis is made in terms of the Peak Signal-to-Noise Ratio (PSNR) metrics. The results indicate that the stego image generated after embedding the secret acquires high imperceptibility and robustness. The performance of the DWT algorithm is higher as compared to the DCT algorithm and the resultant images produced are very less prone to noise attacks. In DCT and DWT algorithms, the cover image will be split based on 8×8 pixel blocks and 2D DCT is applied on each pixel. The secret will be embedded inside DCT coefficient and inverse 2D DCT is applied to recover the secret. Therefore, these image steganographic techniques can be adopted to transfer the confidential messages in different sectors. In the future, other data hiding methods using deep learning could be implemented to increase the robustness and imperceptibility of covert messages.
    URI
    https://doi.org/10.29117/quarfe.2021.0167
    DOI/handle
    http://hdl.handle.net/10576/24531
    Collections
    • Biomedical Sciences [‎796‎ items ]
    • Theme 3: Information and Communication Technologies [‎16‎ items ]

    entitlement


    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Home

    Submit your QU affiliated work

    Browse

    All of Digital Hub
      Communities & Collections Publication Date Author Title Subject Type Language Publisher
    This Collection
      Publication Date Author Title Subject Type Language Publisher

    My Account

    Login

    Statistics

    View Usage Statistics

    About QSpace

    Vision & Mission

    Help

    Item Submission Publisher policiesUser guides FAQs

    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Video