Skip to main content
Erschienen in: 3D Research 3/2018

01.09.2018 | 3DR Express

Pixel Overlapping Image Steganography Using PVD and Modulus Function

verfasst von: Aditya Kumar Sahu, Gandharba Swain

Erschienen in: 3D Research | Ausgabe 3/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper proposes an image steganography technique based on the principle of pixel overlapping to improve the embedding capacity (EC) and peak signal-to-noise ratio (PSNR). The proposed technique has two variants: (1) overlapped pixel value differencing with modulus function (OPVDMF), and (2) overlapped pixel value differencing (OPVD). Both the variants operate on pixel blocks of size 1 × 5. The OPVDMF uses the difference between the first four pixels with the 5th pixel for data embedding. Again the pixel adjustment is done to minimize the distortion. The OPVD method divides the block into four sub-blocks with 1st and 5th, 5th and 2nd, 3rd and 5th, 5th and 4th pixels. The proposed technique has been compared with the existing techniques in terms of PSNR, EC, bits per pixel, and execution time. Further, the security of the proposed technique has been verified using RS analysis.

Graphical Abstract

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Subhedar, M. S., & Mankar, V. H. (2014). Current status and key issues in image steganography: A survey. Computer Science Review, 13, 95–113.CrossRef Subhedar, M. S., & Mankar, V. H. (2014). Current status and key issues in image steganography: A survey. Computer Science Review, 13, 95–113.CrossRef
2.
Zurück zum Zitat Pradhan, A., Sahu, A. K., Swain, G., & Sekhar, K. R. (2016). Performance evaluation parameters of image steganography techniques. In IEEE international conference on research advances in integrated navigation systems (pp. 1–8). Pradhan, A., Sahu, A. K., Swain, G., & Sekhar, K. R. (2016). Performance evaluation parameters of image steganography techniques. In IEEE international conference on research advances in integrated navigation systems (pp. 1–8).
3.
Zurück zum Zitat Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90(3), 727–752.CrossRef Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90(3), 727–752.CrossRef
5.
Zurück zum Zitat Chan, C. K., & Cheng, L. M. (2004). Hiding data in images by simple LSB substitution. Pattern Recognition, 37(3), 469–474.CrossRef Chan, C. K., & Cheng, L. M. (2004). Hiding data in images by simple LSB substitution. Pattern Recognition, 37(3), 469–474.CrossRef
6.
Zurück zum Zitat Wu, N. I., & Hwang, M. S. (2017). A novel LSB data hiding scheme with the lowest distortion. The Imaging Science Journal, 65(6), 371–378.CrossRef Wu, N. I., & Hwang, M. S. (2017). A novel LSB data hiding scheme with the lowest distortion. The Imaging Science Journal, 65(6), 371–378.CrossRef
7.
Zurück zum Zitat Yang, H., Sun, X., & Sun, G. (2009). A high-capacity image data hiding scheme using adaptive LSB substitution. Radioengineering, 18(4), 509–516. Yang, H., Sun, X., & Sun, G. (2009). A high-capacity image data hiding scheme using adaptive LSB substitution. Radioengineering, 18(4), 509–516.
8.
Zurück zum Zitat Wang, R. Z., Lin, C. F., & Lin, J. C. (2001). Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition, 34(3), 671–683.CrossRef Wang, R. Z., Lin, C. F., & Lin, J. C. (2001). Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition, 34(3), 671–683.CrossRef
9.
Zurück zum Zitat Wu, D. C., & Tsai, W. H. (2003). A steganographic method for images by pixel-value differencing. Pattern Recognition Letters, 24(9–10), 1613–1626.CrossRef Wu, D. C., & Tsai, W. H. (2003). A steganographic method for images by pixel-value differencing. Pattern Recognition Letters, 24(9–10), 1613–1626.CrossRef
10.
Zurück zum Zitat Swain, G. (2016). Adaptive pixel value differencing steganography using both vertical and horizontal edges. Multimedia Tools and Applications, 75(21), 13541–13556.CrossRef Swain, G. (2016). Adaptive pixel value differencing steganography using both vertical and horizontal edges. Multimedia Tools and Applications, 75(21), 13541–13556.CrossRef
11.
Zurück zum Zitat Hameed, M. A., Aly, S., & Hassaballah, M. (2017). An efficient data hiding method based on adaptive directional pixel value differencing (ADPVD). Multimedia Tools and Applications, 77(12), 14705–14723.CrossRef Hameed, M. A., Aly, S., & Hassaballah, M. (2017). An efficient data hiding method based on adaptive directional pixel value differencing (ADPVD). Multimedia Tools and Applications, 77(12), 14705–14723.CrossRef
12.
Zurück zum Zitat Lee, Y. P., Lee, J. C., Chen, W. K., Chang, K. C., Su, J., & Chang, C. P. (2012). High-payload image hiding with quality recovery using tri-way pixel-value differencing. Information Sciences, 191, 214–225.CrossRef Lee, Y. P., Lee, J. C., Chen, W. K., Chang, K. C., Su, J., & Chang, C. P. (2012). High-payload image hiding with quality recovery using tri-way pixel-value differencing. Information Sciences, 191, 214–225.CrossRef
13.
Zurück zum Zitat Jung, K. H. (2018). Data hiding scheme improving embedding capacity using mixed PVD and LSB on bit plane. Journal of Real-Time Image Processing, 14(1), 127–136.CrossRef Jung, K. H. (2018). Data hiding scheme improving embedding capacity using mixed PVD and LSB on bit plane. Journal of Real-Time Image Processing, 14(1), 127–136.CrossRef
14.
Zurück zum Zitat Khodaei, M., & Faez, K. (2012). New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing. IET Image Processing, 6(6), 677–686.CrossRef Khodaei, M., & Faez, K. (2012). New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing. IET Image Processing, 6(6), 677–686.CrossRef
15.
Zurück zum Zitat Khodaei, M., Sadeghi Bigham, B., & Faez, K. (2016). Adaptive data hiding, using pixel-value-differencing and LSB substitution. Cybernetics and Systems, 47(8), 617–628.CrossRef Khodaei, M., Sadeghi Bigham, B., & Faez, K. (2016). Adaptive data hiding, using pixel-value-differencing and LSB substitution. Cybernetics and Systems, 47(8), 617–628.CrossRef
16.
Zurück zum Zitat Darabkh, K. A., Al-Dhamari, A. K., & Jafar, I. F. (2017). A new steganographic algorithm based on multi directional PVD and modified LSB. Information Technology and Control, 46(1), 16–36.CrossRef Darabkh, K. A., Al-Dhamari, A. K., & Jafar, I. F. (2017). A new steganographic algorithm based on multi directional PVD and modified LSB. Information Technology and Control, 46(1), 16–36.CrossRef
18.
Zurück zum Zitat Wu, H. C., Wu, N. I., Tsai, C. S., & Hwang, M. S. (2005). Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proceedings-Vision, Image and Signal Processing, 152(5), 611–615.CrossRef Wu, H. C., Wu, N. I., Tsai, C. S., & Hwang, M. S. (2005). Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proceedings-Vision, Image and Signal Processing, 152(5), 611–615.CrossRef
19.
Zurück zum Zitat Hussain, M., Wahab, A. W. A., Ho, A. T., Javed, N., & Jung, K. H. (2017). A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Processing: Image Communication, 50, 44–57. Hussain, M., Wahab, A. W. A., Ho, A. T., Javed, N., & Jung, K. H. (2017). A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Processing: Image Communication, 50, 44–57.
20.
Zurück zum Zitat Jung, K. H. (2016). High-capacity data hiding scheme based on exploiting modification direction and modulo operation. Advanced Science Letters, 22(9), 2471–2474.CrossRef Jung, K. H. (2016). High-capacity data hiding scheme based on exploiting modification direction and modulo operation. Advanced Science Letters, 22(9), 2471–2474.CrossRef
21.
Zurück zum Zitat Shen, S., Huang, L., & Tian, Q. (2015). A novel data hiding for color images based on pixel value difference and modulus function. Multimedia Tools and Applications, 74(3), 707–728.CrossRef Shen, S., Huang, L., & Tian, Q. (2015). A novel data hiding for color images based on pixel value difference and modulus function. Multimedia Tools and Applications, 74(3), 707–728.CrossRef
22.
Zurück zum Zitat Sahu, A. K., & Swain, G. (2017). Information hiding using group of bits substitution. International Journal on Communications Antenna and Propagation, 7(2), 162–167.CrossRef Sahu, A. K., & Swain, G. (2017). Information hiding using group of bits substitution. International Journal on Communications Antenna and Propagation, 7(2), 162–167.CrossRef
23.
Zurück zum Zitat Sahu, A. K., Swain, G., & Babu, E. S. (2018). Digital image steganography using bit flipping. Cybernetics and Information Technologies, 18(1), 69–80.MathSciNetCrossRef Sahu, A. K., Swain, G., & Babu, E. S. (2018). Digital image steganography using bit flipping. Cybernetics and Information Technologies, 18(1), 69–80.MathSciNetCrossRef
24.
Zurück zum Zitat Shen, S. Y., & Huang, L. H. (2015). A data hiding scheme using pixel value differencing and improving exploiting modification directions. Computers & Security, 48, 131–141.CrossRef Shen, S. Y., & Huang, L. H. (2015). A data hiding scheme using pixel value differencing and improving exploiting modification directions. Computers & Security, 48, 131–141.CrossRef
25.
Zurück zum Zitat Wibisurya, A. (2017). Distributed steganography using five pixel pair differencing and modulus function. Procedia Computer Science, 116, 334–341.CrossRef Wibisurya, A. (2017). Distributed steganography using five pixel pair differencing and modulus function. Procedia Computer Science, 116, 334–341.CrossRef
27.
Zurück zum Zitat Luo, W., Huang, F., & Huang, J. (2010). A more secure steganography based on adaptive pixel-value differencing scheme. Multimedia Tools and Applications, 52, 407–430.CrossRef Luo, W., Huang, F., & Huang, J. (2010). A more secure steganography based on adaptive pixel-value differencing scheme. Multimedia Tools and Applications, 52, 407–430.CrossRef
28.
Zurück zum Zitat Sahu, A. K., & Swain, G. (2018). an improved data hiding technique using bit differencing and LSB matching. Internetworking Indonesia Journal, 10(1), 17–21. Sahu, A. K., & Swain, G. (2018). an improved data hiding technique using bit differencing and LSB matching. Internetworking Indonesia Journal, 10(1), 17–21.
29.
Zurück zum Zitat Zhao, W., Jie, Z., Xin, L., & Qiaoyan, W. (2015). Data embedding based on pixel value differencing and modulus function using indeterminate equation. The Journal of China Universities of Posts and Telecommunications, 22(1), 95–100.CrossRef Zhao, W., Jie, Z., Xin, L., & Qiaoyan, W. (2015). Data embedding based on pixel value differencing and modulus function using indeterminate equation. The Journal of China Universities of Posts and Telecommunications, 22(1), 95–100.CrossRef
31.
Zurück zum Zitat Liao, X., Wen, Q., & Zhang, J. (2013). Improving the adaptive steganographic methods based on modulus function. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 96(12), 2731–2734.CrossRef Liao, X., Wen, Q., & Zhang, J. (2013). Improving the adaptive steganographic methods based on modulus function. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 96(12), 2731–2734.CrossRef
32.
Zurück zum Zitat Liao, X., Wen, Q. Y., Zhao, Z. L., & Zhang, J. (2012). A novel steganographic method with four-pixel differencing and modulus function. Fundamenta Informaticae, 118(3), 281–289.MathSciNet Liao, X., Wen, Q. Y., Zhao, Z. L., & Zhang, J. (2012). A novel steganographic method with four-pixel differencing and modulus function. Fundamenta Informaticae, 118(3), 281–289.MathSciNet
33.
Zurück zum Zitat Liao, X., Wen, Q., & Zhang, J. (2012). A novel steganographic method with four-pixel differencing and exploiting modification direction. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 95(7), 1189–1192.CrossRef Liao, X., Wen, Q., & Zhang, J. (2012). A novel steganographic method with four-pixel differencing and exploiting modification direction. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 95(7), 1189–1192.CrossRef
Metadaten
Titel
Pixel Overlapping Image Steganography Using PVD and Modulus Function
verfasst von
Aditya Kumar Sahu
Gandharba Swain
Publikationsdatum
01.09.2018
Verlag
3D Display Research Center
Erschienen in
3D Research / Ausgabe 3/2018
Elektronische ISSN: 2092-6731
DOI
https://doi.org/10.1007/s13319-018-0188-5

Weitere Artikel der Ausgabe 3/2018

3D Research 3/2018 Zur Ausgabe

Premium Partner