OOPAP and OPVD: Two Innovative Improvements for Hiding Secret Data Into Images

  • Ebrahim AnsariEmail author
  • Morteza Keshtkaran
  • Richard Wallace
  • S. M. H. Mirsadeghi
  • Fateme Ansari
Research Paper


Information hiding methods are currently deployed by many security developers for various applications, hence the remarkable value of proposing an efficient and feasible information hiding method is essential. In this paper, two new implementations and algorithms are presented and compared with classic and related ones. First, a new implementation for the optimal pixel adjustment process (OPAP) algorithm has been developed entitled optimal OPAP (OOPAP). This new implementation improves upon the OPAP algorithm by using optimal least significant bit (LSB) substitution. Results of the new implementation demonstrate the efficiency of the new algorithm compared to previously implemented algorithms. Second, the optimal least significant bit LSB method is used to improve the pixel-value differencing (PVD) algorithm, called optimal PVD. Results show the efficiency of the new algorithm in comparison with classic PVD.


Steganography Least significant bit Pixel-value differencing Optimal LSB substitution OPAP 


  1. Akhtar N et al (2013) Enhancing the security and quality of LSB based image steganography. In: 5th international conference on computational intelligence and communication networks (CICN), 2013. IEEEGoogle Scholar
  2. Bandyopadhyay D et al (2014) A novel secure image steganography method based on Chaos theory in spatial domain. Int J Secur Priv Trust Manag (IJSPTM) 3(1):11–22Google Scholar
  3. Bender W et al (1996) Techniques for data hiding. IBM Syst J 35(3.4):313–336Google Scholar
  4. Chan C-S, Chang C-C (2005) An image hiding scheme based on multi-bit-reference substitution table using dynamic programming strategy. Fundam Inform 65(4):291–305MathSciNetzbMATHGoogle Scholar
  5. Chan C-K, Cheng L (2001) Improved hiding data in images by optimal moderately-significant-bit replacement. Electron Lett 37(16):1017–1018Google Scholar
  6. Chan C-K, Cheng L-M (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474zbMATHGoogle Scholar
  7. Chang C-C, Tseng H-W (2004) A steganographic method for digital images using side match. Pattern Recogn Lett 25(12):1431–1437Google Scholar
  8. Chang C-C et al (2003) Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recogn 36(7):1583–1595Google Scholar
  9. Chang C-C et al (2006) New image steganographic methods using run-length approach. Inf Sci 176(22):3393–3408MathSciNetGoogle Scholar
  10. Imaizumi S, Ozawa K (2015) Palette-based image steganography for high-capacity embedding. Bull Soc Photogr Imag Jpn 25(1):7–11Google Scholar
  11. Lee Y-K, Chen L-H (2000) High capacity image steganographic model. IEE Proc Vis Image Signal Process 147(3):288–294Google Scholar
  12. Li S-L et al (2006) Data hiding in images by adaptive LSB substitution based on the pixel-value differencing. In: First international conference on innovative computing, information and control, 2006. ICICIC’06. IEEEGoogle Scholar
  13. Liao X (2006) A steganographic method for digital images by multi-pixel differencing. In: Internal computer symposiumGoogle Scholar
  14. Mishra M et al (2014) High security image steganography with modified Arnold cat map. arXiv preprint arXiv:1408.3838
  15. Parah SA et al (2015) On the realization of robust watermarking system for medical images. In: Annual IEEE India conference (INDICON), 2015. IEEEGoogle Scholar
  16. Parah SA et al (2017) Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J Biomed Inform 66:214–230Google Scholar
  17. Petitcolas FA et al (1999) Information hiding—a survey. Proc IEEE 87(7):1062–1078Google Scholar
  18. Ramana DV, Rao PN (2016) Steganography algorithms for image security using LSB substitution method. Int J Mod Embed Syst 4(1):21–24Google Scholar
  19. Rhee MY (1993) Cryptography and secure communications. McGraw-Hill Inc, New York CityzbMATHGoogle Scholar
  20. Shrivastava A, Singh L (2016) A new hybrid encryption and steganography technique: a survey. Int J Adv Technol Eng Explor 3(14):9Google Scholar
  21. Suri S et al (2014) Comparative analysis of steganography for coloured images. Int J Comput Sci Eng Res Pap 2(4):1–5MathSciNetGoogle Scholar
  22. Wang Y, Yang Y (2009) Particle swarm optimization with preference order ranking for multi-objective optimization. Inf Sci 179(12):1944–1959MathSciNetGoogle Scholar
  23. Wang R-Z et al (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn 34(3):671–683zbMATHGoogle Scholar
  24. Wang C-M et al (2008) A high quality steganographic method with pixel-value differencing and modulus function. J Syst Softw 81(1):150–158Google Scholar
  25. Wang Z-H et al (2012) Optimizing least-significant-bit substitution using cat swarm optimization strategy. Inf Sci 192:98–108Google Scholar
  26. Wu D-C, Tsai W-H (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9):1613–1626zbMATHGoogle Scholar
  27. Wu N-I, Hwang M-S (2007) Data hiding: current status and key issues. Int J Netw Secur 4(1):1–9Google Scholar
  28. Wu H-C et al (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proc Vis Image Signal Process 152(5):611–615Google Scholar
  29. Yang C-H, Wang S-J (2006) Weighted bipartite graph for locating optimal LSB substitution for secret embedding. J Discrete Math Sci Cryptogr 9(1):153–164MathSciNetzbMATHGoogle Scholar

Copyright information

© Shiraz University 2018

Authors and Affiliations

  1. 1.Department of Computer Science and Information TechnologyInstitute for Advanced Studies in Basic Sciences (IASBS)ZanjanIran
  2. 2.Research Center for Basic Sciences and Modern Technologies (RBST)Institute for Advanced Studies in Basic Sciences (IASBS)ZanjanIran
  3. 3.Department of Computer Science and EngineeringShiraz UniversityShirazIran
  4. 4.Distributed Systems Architecture Research GroupComplutense UniversityMadridSpain

Personalised recommendations