
@Article{cmes.2018.04141,
AUTHOR = {Sahib Khan, Arslan Arif, Syed Tahir Hussain Rizvi, Nasir Ahmad},
TITLE = {Increasing Distance Increasing Bits Substitution (IDIBS) Algorithm for Implementation of VTVB Steganography},
JOURNAL = {Computer Modeling in Engineering \& Sciences},
VOLUME = {117},
YEAR = {2018},
NUMBER = {1},
PAGES = {1--16},
URL = {http://www.techscience.com/CMES/v117n1/38163},
ISSN = {1526-1506},
ABSTRACT = {Cryptography and steganography are two important and related fields of infor-  mation security.  But, steganography is slightly different in the sense that it hides the ex-  istence  of  secret  information  from  unauthorized  users.  It  is  one  of  the  most  appealing   research domains, have applications like copyright protection, data integrity protection and   manipulation detection. Several steganography techniques have been proposed in literature.   But, in this work a new information hiding algorithm is presented. The proposed technique   de-correlates  frequency  components  of  cover  image  using  discrete  cosine  transform  and   uses the least significant bits of frequency components for hiding secret information.  The   tech-nique  hides  variable  number  of  bits  of  secret  message  in  different  frequency   components. Therefore, it hides different amount of secret information in different regions   of cover im-age and results in enhancement of security.  The algorithm has the flexibility   to  change  the  hiding  capacity  and  quality  of  final  stego  image.  It  has  been  observed   from  experimental  results  that  a  hiding  a  capacity  from  3%  to  43%  can  be  achieved   with  significantly  good quality  of  41  dB  to  37  dB  in  term  of  peak  signal  to  noise  ratio.   The successful recovery of  the  hidden  information  need  the  pattern,  called  stego  key,  in   which  is  used  in  hiding  process.  The  algorithm  provides  twofold  security;  hiding   keeps  the  existence  of  hidden information secret and the large key size makes the retrieval   of hidden information difficult for intruders.},
DOI = {10.31614/cmes.2018.04141}
}



