Skip to main content
Top

2018 | OriginalPaper | Chapter

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing

Authors : Chi-Yao Weng, Yen-Chia Huang, Chin-Feng Lee, Dong-Peng Lin

Published in: Genetic and Evolutionary Computing

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The pixel value differencing (PVD) scheme provided high embedding payload with imperceptibility in the stego images. In their approach, they used two pixels differencing to represent the complexity of pixels, and applied it to estimate how many bit will be hidden into. As the difference with small value, it means that two pixels can not tolerated with larger change, therefore, few secret bit should be embedded into these pixels. PVD scheme did not completely take pixel tolerance into consideration because of only applying one criterion, pixel differencing. In this paper, a new data hiding scheme using PVD operation and incorporating with pixel tolerance into a cover image is proposed. The pixel tolerance indicates that a greater pixel-value is more change of gray-value could be tolerated. Following up this idea, our proposed scheme applies a threshold (TH) and two quantization tables to hide secret data into a block with two pixels using modified k-bits LSB. The number of k-bits is adaptive and depends on the quantization tables setting. The adjustment strategy is to maintain the differencing value in the same range. The experimental results show that our scheme is superior to those in the previous literature.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Chu, Y.H., Chang, S.: Dunamical cryptography based on synchronized chaotic system. Inst. Elect. Eng. Electron. Lett. 35, 974–975 (1999) Chu, Y.H., Chang, S.: Dunamical cryptography based on synchronized chaotic system. Inst. Elect. Eng. Electron. Lett. 35, 974–975 (1999)
2.
go back to reference Kuo, W.C., Lai, P.Y., Wang, C.C., Wuu, L.C.: A formula diamond encoding data hiding scheme. J. Inform. Hind. Multi. Signal Process. 6, 1167–1176 (2015) Kuo, W.C., Lai, P.Y., Wang, C.C., Wuu, L.C.: A formula diamond encoding data hiding scheme. J. Inform. Hind. Multi. Signal Process. 6, 1167–1176 (2015)
3.
go back to reference Anderson, R.R., Peticolas, F.A.P.: On the limits of steganography. IEEE J. Sel. Areas Commun. 16, 474–481 (1998)CrossRef Anderson, R.R., Peticolas, F.A.P.: On the limits of steganography. IEEE J. Sel. Areas Commun. 16, 474–481 (1998)CrossRef
4.
go back to reference Chen, C.K., Chen, L.M.: Hiding data in images by simple LSB substitution. Pattern Recog. 37, 469–474 (2004)CrossRef Chen, C.K., Chen, L.M.: Hiding data in images by simple LSB substitution. Pattern Recog. 37, 469–474 (2004)CrossRef
5.
go back to reference Yang, C.H.: Inverted pattern appraoch to improve image quality of the information hiding by LSB substitution. Pattern Recognit. 41, 2674–2683 (2008)CrossRefMATH Yang, C.H.: Inverted pattern appraoch to improve image quality of the information hiding by LSB substitution. Pattern Recognit. 41, 2674–2683 (2008)CrossRefMATH
6.
go back to reference Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recognit. Lett. 24, 1613–1626 (2003)CrossRefMATH Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recognit. Lett. 24, 1613–1626 (2003)CrossRefMATH
7.
go back to reference Ynag, C.H., Weng, C.Y.: A steganographic method for digital images by multi-pixel differencing. In: Internatioanl Computer Symposium, Taiwan, pp. 831–836 (2006) Ynag, C.H., Weng, C.Y.: A steganographic method for digital images by multi-pixel differencing. In: Internatioanl Computer Symposium, Taiwan, pp. 831–836 (2006)
8.
go back to reference Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S.: Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proceed. Vis. Images Signal Process. 152, 611–615 (2005)CrossRef Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S.: Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proceed. Vis. Images Signal Process. 152, 611–615 (2005)CrossRef
9.
go back to reference Wang, C.M., Wu, N.I., Tsai, C.S., Hwang, M.S.: A high quality steganography method with pixel-value differencing and modulus function. J. Syst. Softw. 81, 150–158 (2008)CrossRef Wang, C.M., Wu, N.I., Tsai, C.S., Hwang, M.S.: A high quality steganography method with pixel-value differencing and modulus function. J. Syst. Softw. 81, 150–158 (2008)CrossRef
10.
go back to reference Yang, C.H., Weng, C.Y., Tso, H.K., Wang, S.J.: A data hiding scheme using the varieties of pixel-value differencing in multimedia images. J. Syst. Softw. 84, 669–678 (2011)CrossRef Yang, C.H., Weng, C.Y., Tso, H.K., Wang, S.J.: A data hiding scheme using the varieties of pixel-value differencing in multimedia images. J. Syst. Softw. 84, 669–678 (2011)CrossRef
11.
go back to reference Yang, C.H., Weng, C.Y., Wang, S.J., Sun, H.M.: Varied PVD+LSB evading detection program to spatial domain in data embedding system. J. Syst. Softw. 83, 1635–1643 (2010)CrossRef Yang, C.H., Weng, C.Y., Wang, S.J., Sun, H.M.: Varied PVD+LSB evading detection program to spatial domain in data embedding system. J. Syst. Softw. 83, 1635–1643 (2010)CrossRef
12.
go back to reference Yang, C.H., Weng, C.Y., Wang, S.J., Sun, H.M.: Adaptive data hiding in edge area of images with spatial LSB domain system. IEEE Tran. Inform. Fore. Secu. 3, 488–497 (2008)CrossRef Yang, C.H., Weng, C.Y., Wang, S.J., Sun, H.M.: Adaptive data hiding in edge area of images with spatial LSB domain system. IEEE Tran. Inform. Fore. Secu. 3, 488–497 (2008)CrossRef
13.
go back to reference Wang, S.J.: Steganography of capacity required using modulo operator for embedding secret image. Appl. Math. Compu. 164, 99–116 (2005)MATHMathSciNet Wang, S.J.: Steganography of capacity required using modulo operator for embedding secret image. Appl. Math. Compu. 164, 99–116 (2005)MATHMathSciNet
14.
go back to reference Hong, W., Chen, T.S., Luo, C.W.: Data embedding using pixel value differencing and diamond encoding with multiple-base notational system. J. Syst. Softw. 85, 1166–1175 (2012)CrossRef Hong, W., Chen, T.S., Luo, C.W.: Data embedding using pixel value differencing and diamond encoding with multiple-base notational system. J. Syst. Softw. 85, 1166–1175 (2012)CrossRef
15.
go back to reference Mandal, J.K., Das, D.: Steganography using adaptive pixel value differencing of gray images through exclusion of overflow/underflow. In: International Conference on Computer Science, Engineering and Application, India, pp. 93–102 (2012) Mandal, J.K., Das, D.: Steganography using adaptive pixel value differencing of gray images through exclusion of overflow/underflow. In: International Conference on Computer Science, Engineering and Application, India, pp. 93–102 (2012)
16.
go back to reference Chen, J.: A PVD-based data hiding method with histogram preserving using pixel pair matching. J. Image Commun. 29, 375–384 (2014) Chen, J.: A PVD-based data hiding method with histogram preserving using pixel pair matching. J. Image Commun. 29, 375–384 (2014)
17.
go back to reference Swain, G.: Adpative pixel value differencing steganography using both vertical and horizontal edges. Multimedia Tools Appl. 75, 13541–13556 (2016)CrossRef Swain, G.: Adpative pixel value differencing steganography using both vertical and horizontal edges. Multimedia Tools Appl. 75, 13541–13556 (2016)CrossRef
18.
go back to reference Hosam, O., Halima, N.B.: Adaptive block-based pixel value differencing steganography. Sec. Commun. Netw. 9, 5036–5050 (2016)CrossRef Hosam, O., Halima, N.B.: Adaptive block-based pixel value differencing steganography. Sec. Commun. Netw. 9, 5036–5050 (2016)CrossRef
Metadata
Title
Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing
Authors
Chi-Yao Weng
Yen-Chia Huang
Chin-Feng Lee
Dong-Peng Lin
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-6487-6_14

Premium Partner