Skip to main content
Top
Published in: Wireless Personal Communications 1/2022

23-09-2021

Image Steganography Using Remainder Replacement, Adaptive QVD and QVC

Authors: Gandharba Swain, Anita Pradhan

Published in: Wireless Personal Communications | Issue 1/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This research article reports a steganography method based on adaptive quotient value differencing (AQVD), quotient value correlation (QVC), and remainder replacement. It possesses two advantages, (i) avoids unused pixel blocks problem, and (ii) performs data integrity verification at the receiver. It accomplishes data camouflaging and retrieval on 3-by-3 disjoint pixel blocks. From a 3-by-3 size pixel block three new blocks are derived, (i) quotient (QT) block, (ii) middle bit (M) block and (iii) remainder (R) block. A quotient of the quotient block is decimal equivalent of six binary bits. AQVD procedure is enforced to hide data in 4 corner quotients of the quotient block. The top-middle and bottom-middle quotients are appraised as reference values for AQVD procedure. In left-middle, center, and right-middle quotients, QVC embedding procedure is plied for data camouflaging by using their respective top and below neighbors as reference values. The 7th bit forms the M block and the 8th bit (least significant bit) forms the R block. Secret bits are camouflaged in M block by bit substitution. The verification bits are computed from QT block and M block. The verification bits are stored at R block, so that at the receiver side the integrity of the pulled-out bits can be checked. The experimental results prove that the recorded HC and PSNR values are improved. Furthermore, regular-singular (RS) and pixel difference histogram (PDH) analyses could not detect this technique.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Cheddad, A., Condell, J., Curran, K., & Kevitt, P. M. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90, 727–752.CrossRef Cheddad, A., Condell, J., Curran, K., & Kevitt, P. M. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90, 727–752.CrossRef
2.
go back to reference Martin, A., Sapiro, G., & Seroussi, G. (2005). Is image steganography Natural? IEEE Transactions on Image Processing., 14(12), 2040–2050.CrossRef Martin, A., Sapiro, G., & Seroussi, G. (2005). Is image steganography Natural? IEEE Transactions on Image Processing., 14(12), 2040–2050.CrossRef
3.
go back to reference Wu, D. C., & Tsai, W. H. (2003). A steganograhic method for images by pixel value differencing. Pattern Recognition Letters, 24(9), 1613–1626.CrossRef Wu, D. C., & Tsai, W. H. (2003). A steganograhic method for images by pixel value differencing. Pattern Recognition Letters, 24(9), 1613–1626.CrossRef
4.
go back to reference Fridrich, J., Goljian, M., & Du, R. (2001). Detecting LSB Steganography in colour and gray-scale images. Magazine of IEEE Multimedia and Security, 8(4), 22–28.CrossRef Fridrich, J., Goljian, M., & Du, R. (2001). Detecting LSB Steganography in colour and gray-scale images. Magazine of IEEE Multimedia and Security, 8(4), 22–28.CrossRef
5.
go back to reference Zhang, X., & Wang, S. (2004). Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recognition Letters, 25, 331–339.CrossRef Zhang, X., & Wang, S. (2004). Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recognition Letters, 25, 331–339.CrossRef
6.
go back to reference Lee, Y. P., Lee, J. C., Chen, W. K., Chang, K. C., Su, I. J., & Chang, C. P. (2012). High-payload image hiding with quality recovery using tri-way pixel-value differencing. Information Sciences, 191, 214–225.CrossRef Lee, Y. P., Lee, J. C., Chen, W. K., Chang, K. C., Su, I. J., & Chang, C. P. (2012). High-payload image hiding with quality recovery using tri-way pixel-value differencing. Information Sciences, 191, 214–225.CrossRef
7.
go back to reference Darabkh, K. A., Al-Dhamari, A. K., & Jafar, I. F. (2017). A new steganographic algorithm based on multi directional PVD and modified LSB. Journal of Information Technology and Control, 46(1), 16–36. Darabkh, K. A., Al-Dhamari, A. K., & Jafar, I. F. (2017). A new steganographic algorithm based on multi directional PVD and modified LSB. Journal of Information Technology and Control, 46(1), 16–36.
8.
go back to reference Pradhan, A., Sekhar, K. R., & Swain, G. (2016). Digital image steganography based on seven way pixel value differencing. Indian Journal of Science and Technology, 9(37), 1–11.CrossRef Pradhan, A., Sekhar, K. R., & Swain, G. (2016). Digital image steganography based on seven way pixel value differencing. Indian Journal of Science and Technology, 9(37), 1–11.CrossRef
9.
go back to reference Luo, W., Huang, F., & Huang, J. (2011). A more secure steganography based on adaptive pixel-value differencing scheme. Multimedia Tools and Applications, 52, 407–430.CrossRef Luo, W., Huang, F., & Huang, J. (2011). A more secure steganography based on adaptive pixel-value differencing scheme. Multimedia Tools and Applications, 52, 407–430.CrossRef
10.
go back to reference Swain, G. (2016). Adaptive pixel value differencing steganography using both vertical and horizontal edges. Multimedia Tools and Applications, 75, 13541–13556.CrossRef Swain, G. (2016). Adaptive pixel value differencing steganography using both vertical and horizontal edges. Multimedia Tools and Applications, 75, 13541–13556.CrossRef
11.
go back to reference Pradhan, A., Sekhar, K. R., & Swain, G. (2017). Adaptive PVD steganography using horizontal, vertical, and diagonal edges in six-pixel blocks. Security and Communication Networks, 2017, 1924618.CrossRef Pradhan, A., Sekhar, K. R., & Swain, G. (2017). Adaptive PVD steganography using horizontal, vertical, and diagonal edges in six-pixel blocks. Security and Communication Networks, 2017, 1924618.CrossRef
12.
go back to reference Liao, X., Wen, Q. Y., & Zhang, J. (2011). A steganographic method for digital images with four-pixel differencing and modified LSB substitution. Journal of Visual Communication and Image Representation, 22(1), 1–8.CrossRef Liao, X., Wen, Q. Y., & Zhang, J. (2011). A steganographic method for digital images with four-pixel differencing and modified LSB substitution. Journal of Visual Communication and Image Representation, 22(1), 1–8.CrossRef
13.
go back to reference Swain, G. (2014). Digital image steganography using nine-pixel differencing and modified LSB substitution. Indian Journal of Science and Technology, 7(9), 1444–1450.CrossRef Swain, G. (2014). Digital image steganography using nine-pixel differencing and modified LSB substitution. Indian Journal of Science and Technology, 7(9), 1444–1450.CrossRef
14.
go back to reference Wu, H. C., Wu, N. I., Tsai, C. S., & Hwang, M. S. (2005). Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEEE Proceedings Vision, Image and Signal Processing, 152(5), 611–615.CrossRef Wu, H. C., Wu, N. I., Tsai, C. S., & Hwang, M. S. (2005). Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEEE Proceedings Vision, Image and Signal Processing, 152(5), 611–615.CrossRef
15.
go back to reference Yang, C. H., Weng, C. Y., Wang, S. J., & Sun, H. M. (2010). Varied PVD+LSB evading programs to spatial domain in data embedding systems. The Journal of Systems and Software, 83(10), 1635–1643.CrossRef Yang, C. H., Weng, C. Y., Wang, S. J., & Sun, H. M. (2010). Varied PVD+LSB evading programs to spatial domain in data embedding systems. The Journal of Systems and Software, 83(10), 1635–1643.CrossRef
16.
go back to reference Khodaei, M., & Faez, K. (2012). New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing. IET Image Processing, 6(6), 677–686.CrossRef Khodaei, M., & Faez, K. (2012). New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing. IET Image Processing, 6(6), 677–686.CrossRef
17.
go back to reference Swain, G. (2016). A steganographic method combining LSB substitution and PVD in a block. Procedia Computer Science, 85, 39–44.CrossRef Swain, G. (2016). A steganographic method combining LSB substitution and PVD in a block. Procedia Computer Science, 85, 39–44.CrossRef
18.
go back to reference Swain, G. (2018). Digital image steganography using eight-directional PVD against RS analysis and PDH analysis. Advances in Multimedia, 2018, 4847098.CrossRef Swain, G. (2018). Digital image steganography using eight-directional PVD against RS analysis and PDH analysis. Advances in Multimedia, 2018, 4847098.CrossRef
19.
go back to reference Wang, C. M., Wu, N. I., Tsai, C. S., & Hwang, M. S. (2008). A high quality steganographic method with pixel-value differencing and modulus function. The Journal of Systems and Software, 81, 150–158.CrossRef Wang, C. M., Wu, N. I., Tsai, C. S., & Hwang, M. S. (2008). A high quality steganographic method with pixel-value differencing and modulus function. The Journal of Systems and Software, 81, 150–158.CrossRef
20.
go back to reference Zhao, W., Jie, Z., Xin, L., & Qiaoyan, W. (2015). Data embedding based on pixel value differencing and modulus function using indeterminate equation. The Journal of China Universities of Posts and Telecommunications, 22(1), 95–100.CrossRef Zhao, W., Jie, Z., Xin, L., & Qiaoyan, W. (2015). Data embedding based on pixel value differencing and modulus function using indeterminate equation. The Journal of China Universities of Posts and Telecommunications, 22(1), 95–100.CrossRef
21.
go back to reference Swain, G. (2019). Two new steganography techniques based on quotient value differencing with addition-subtraction logic and PVD with modulus function. Optik - International Journal for Light and Electron Optics, 180, 807–823.CrossRef Swain, G. (2019). Two new steganography techniques based on quotient value differencing with addition-subtraction logic and PVD with modulus function. Optik - International Journal for Light and Electron Optics, 180, 807–823.CrossRef
22.
go back to reference Yang, C. H., Weng, C. Y., Tso, H. K., & Wang, S. J. (2011). A data hiding scheme using the varieties of pixel-value differencing in multimedia images. The Journal of Systems and Software, 84, 669–678.CrossRef Yang, C. H., Weng, C. Y., Tso, H. K., & Wang, S. J. (2011). A data hiding scheme using the varieties of pixel-value differencing in multimedia images. The Journal of Systems and Software, 84, 669–678.CrossRef
23.
go back to reference Pradhan, A., Sekhar, K. R., & Swain, G. (2018). Digital image steganography using LSB substitution, PVD, and EMD. Mathematical Problems in Engineering, 2018, 1804953.CrossRef Pradhan, A., Sekhar, K. R., & Swain, G. (2018). Digital image steganography using LSB substitution, PVD, and EMD. Mathematical Problems in Engineering, 2018, 1804953.CrossRef
24.
go back to reference Tang, W., Li, B., Luo, W., & Huang, J. (2016). Clustering steganographic modification directions for colour components. IEEE Signal Processing Letters, 23(2), 197–201.CrossRef Tang, W., Li, B., Luo, W., & Huang, J. (2016). Clustering steganographic modification directions for colour components. IEEE Signal Processing Letters, 23(2), 197–201.CrossRef
25.
go back to reference Li, B., Wang, M., Li, X., Tan, S., & Huang, J. (2015). A strategy of clustering modification directions in spatial image steganography. IEEE Transactions on Information Forensics and Security, 10(9), 1905–1917.CrossRef Li, B., Wang, M., Li, X., Tan, S., & Huang, J. (2015). A strategy of clustering modification directions in spatial image steganography. IEEE Transactions on Information Forensics and Security, 10(9), 1905–1917.CrossRef
26.
go back to reference Jung, K. H. (2018). Data hiding scheme improving embedding capacity using mixed PVD and LSB on bit plane. Journal of Real Time Image Processing, 14(1), 127–136.CrossRef Jung, K. H. (2018). Data hiding scheme improving embedding capacity using mixed PVD and LSB on bit plane. Journal of Real Time Image Processing, 14(1), 127–136.CrossRef
27.
go back to reference Swain, G. (2019). Very high capacity image steganography technique using quotient value differencing and LSB substitution. Arabian Journal for Science and Engineering, 44(4), 2995–3004.CrossRef Swain, G. (2019). Very high capacity image steganography technique using quotient value differencing and LSB substitution. Arabian Journal for Science and Engineering, 44(4), 2995–3004.CrossRef
28.
go back to reference Liu, H. H., & Lin, Y. C. (2019). A digital data hiding scheme based on pixel-value differencing and side match method. Multimedia Tools and Applications, 78(9), 12157–12181.CrossRef Liu, H. H., & Lin, Y. C. (2019). A digital data hiding scheme based on pixel-value differencing and side match method. Multimedia Tools and Applications, 78(9), 12157–12181.CrossRef
29.
go back to reference Elhoseny, M., Ramirez-Gonzalez, G., Abu-Elnasr, O. M., Shawkat, S. A., Arunkumar, N., & Farouk, A. (2018). Secure medical data transmission model for IoT-based healthcare systems. IEEE Access, 6, 20596–20608.CrossRef Elhoseny, M., Ramirez-Gonzalez, G., Abu-Elnasr, O. M., Shawkat, S. A., Arunkumar, N., & Farouk, A. (2018). Secure medical data transmission model for IoT-based healthcare systems. IEEE Access, 6, 20596–20608.CrossRef
30.
go back to reference Li, F., Wu, K., Zhang, X., Yu, J., Lei, J., & Wen, M. (2018). Robust batch steganography in social networks with non-uniform payload and data decomposition. IEEE Access, 6, 29912–29914.CrossRef Li, F., Wu, K., Zhang, X., Yu, J., Lei, J., & Wen, M. (2018). Robust batch steganography in social networks with non-uniform payload and data decomposition. IEEE Access, 6, 29912–29914.CrossRef
32.
go back to reference Pradhan, A., Sahu, A. K., Sekhar, K. R., & Swain, G. (2016). Performance evaluation parameters of image steganography techniques. In: 2016 International Conference on Research Advances in Integrated Navigation Systems, Bangalore, India, December 2016 (pp. 1–8). https://doi.org/10.1109/RAINS.2016.7764399. Pradhan, A., Sahu, A. K., Sekhar, K. R., & Swain, G. (2016). Performance evaluation parameters of image steganography techniques. In: 2016 International Conference on Research Advances in Integrated Navigation Systems, Bangalore, India, December 2016 (pp. 1–8). https://​doi.​org/​10.​1109/​RAINS.​2016.​7764399.
33.
go back to reference Swain, G. (2019). Advanced digital image steganography using LSB, PVD, and EMD: Emerging research and opportunities. IGI Global, First Edition, 2019. Swain, G. (2019). Advanced digital image steganography using LSB, PVD, and EMD: Emerging research and opportunities. IGI Global, First Edition, 2019.
Metadata
Title
Image Steganography Using Remainder Replacement, Adaptive QVD and QVC
Authors
Gandharba Swain
Anita Pradhan
Publication date
23-09-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2022
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-09131-6

Other articles of this Issue 1/2022

Wireless Personal Communications 1/2022 Go to the issue