Skip to main content

Analysis of Spatial Domain Image Steganography Based on Pixel-Value Differencing Method

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1057))

Abstract

Image steganography is a technique of embedding secret information inside a cover image and transmits through a public channel without revealing the presence of a message. So that no one except the intended recipient can recognize secret message within the carrier image. Image steganography based on pixel value differencing (PVD) is one of the most important steganographic methods in spatial domain. To embed secret information, PVD method utilizes the difference value of each pixel pair on cover image. In this paper, we study the basic concepts of image steganography based on PVD method and latest research developments in image steganography using PVD. We also presented a detailed analysis of these techniques on the basis of some performance parameters such as payload capacity, imperceptibility, and robustness.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Doshi, Ronak, Jain, Pratik, Gupta, Lalit: Steganography and its applications in security. Int. J. Mod. Eng. Res. (IJMER) 2(6), 4634–4638 (2012)

    Google Scholar 

  2. Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE Trans. Comput. 2, 26–34 (1998) (IEEE)

    Article  Google Scholar 

  3. Siper, A., Farley, R., Lombardo, C.: The rise of steganography. In: Proceedings of Student/Faculty Research Day, CSIS, Pace University (2005)

    Google Scholar 

  4. Yunus, Y.A., Ab Rahman, S., Ibrahim, J.: Steganography: a review of information security research and development in muslim world. Am. J. Eng. Res. (AJER), 2(11), 122–128 (2013)

    Google Scholar 

  5. Simmons, G.J., The prisoners’ problem and the subliminal channel. In: Advances in Cryptology, Proceedings of CRYPTO ’83, in: Lecture Notes in Computer Science, Plenum, New York, pp. 51–67 (1983)

    Chapter  Google Scholar 

  6. Sumathi1, C.P.., Santanam, T., Umamaheswari, G.: A study of various steganographic techniques used for information hiding. Int. J. Comput. Sci. Eng. Surv. (IJCSES) 4(6), 9–25 (2013)

    Article  Google Scholar 

  7. Shih, F.Y.: Digital Watermarking and Steganography: Fundamentals and Techniques, p. 137. CRC Press, Taylor & Francis Group, HRD (2007)

    Google Scholar 

  8. Shelke, S.G.., Jagtap, S.K.: Analysis of spatial domain image steganography techniques. In: International Conference on Computing Communication Control and Automation, pp. 665–667. IEEE Computer Society (2015). https://doi.org/10.1109/iccubea.2015.136

  9. Muhammad, K., Ahmad, J., Rehman, N.U., Jan, Z., Sajjad, M.: CISSKA-LSB: color image steganography using stegokey-directed adaptive LSB substitution method. Multimedia Tools Appl. . (2016). https://doi.org/10.1007/s11042-016-3383-5 (Springer)

    Article  Google Scholar 

  10. Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004) (Elsevier)

    Article  Google Scholar 

  11. Mielikainen, J.: LSB matching revisited. Sig. Process. Lett. 13(5), 285–287 (2006) (IEEE)

    Article  Google Scholar 

  12. Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forens. Secur. 5(2), 201–214 (2010) (IEEE)

    Google Scholar 

  13. Wu, D.-C., Tsai, W.-H.: A steganographic method for images by pixel value differencing. Pattern Recogn. Lett. 24, 1613–1626 (2003) (Elsevier)

    Article  Google Scholar 

  14. Yang, C.H., Weng, C.Y., A steganographic method for digital images by multipixel Differencing. In: Proceedings of International Computer Symposium, Taipei, Taiwan, ROC, pp. 831–836 (2006)

    Google Scholar 

  15. Luo, W., Huang, F., Huang, J.: A more secure steganography based on adaptive pixel-value differencing scheme. Multimedia Tools Appl. 407–430 (2010). https://doi.org/10.1007/s11042-009-0440-3

    Article  Google Scholar 

  16. Zhang, X., Wang, S.: Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recogn. Lett. 25, 331–339 (2004)

    Article  Google Scholar 

  17. Chang, K.-C., Chang, C.-P., Huangb, P.S., Tua, T.-M.: A novel image steganographic method using tri-way pixel-value differencing. J. Multimedia 3(2) (2008) (Elsevier)

    Google Scholar 

  18. Joo, J.C., Lee, H.Y., Lee, H.K.: Improved steganographic method preserving pixel-value differencing histogram with modulus function. EURASIP J. Adv. Signal Process. 1–13 (2010). https://doi.org/10.1155/2010/249826

  19. Pan, F., Li, J., Yang, X.: Image steganography method based on PVD and modulus function. In: International Conference on Electronics, Communications and Control (ICECC), pp. 282–284 (2011). https://doi.org/10.1109/icecc.2011.6067590

  20. Luo, W., Huang, F., Huang, J.: A more secure steganography based on adaptive pixel-value differencing scheme. Multimedia Tools Appl. 52, 407–430 (2011) https://doi.org/10.1007/s11042-009-0440-3

    Article  Google Scholar 

  21. Mandal, J.K., Das, D.: Color image steganography based on pixel value differencing in spatial domain. Int. J. Inf. Sci. Tech. 2(4), 83–93 (2012)

    Google Scholar 

  22. Nagaraj, V., Vijayalakshmi, V., Zayaraz, G.: Color image steganography based on pixel value modification method using modulus function. In: International Conference on Electronic Engineering and Computer Science, pp. 17–24 (2013)

    Article  Google Scholar 

  23. Tseng, H.-W., Leng, H.-S.: A steganographic method based on pixel-value differencing and the perfect square number. J. Appl. Math. Res. Article ID 189706 1–8 (2013). http://dx.doi.org/10.1155/2013/189706 (Hindawi Publishing Corporation)

    Article  MathSciNet  Google Scholar 

  24. Swain, G.: Adaptive pixel value differencing steganography using both vertical and horizontal edges. Multimedia Tools Appl. 75, 13541–13556 (2015). https://doi.org/10.1007/s11042-015-2937-2 (Springer)

    Article  Google Scholar 

  25. Hameed, M.A., Aly, S., Hassaballah, M.: An efficient data hiding method based on adaptive directional pixel value differencing (ADPVD). Multimedia Tools Appl. (2017). https://doi.org/10.1007/s11042-017-5056-4 (Springer)

    Article  Google Scholar 

  26. Prasad, S., Pal, A.K., An RGB color image steganography scheme using overlapping block-based pixel-value differencing. Dryad Digital Repository (2017). http://dx.doi.org/10.5061/dryad.21tm5)

  27. Swain, G.: Adaptive and non-adaptive PVD steganography using overlapped pixel blocks. Arab. J. Sci. Eng. (2018). https://doi.org/10.1007/s13369-018-3163-9

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. D. Nisha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nisha, C.D., Monoth, T. (2020). Analysis of Spatial Domain Image Steganography Based on Pixel-Value Differencing Method. In: Das, K., Bansal, J., Deep, K., Nagar, A., Pathipooranam, P., Naidu, R. (eds) Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 1057. Springer, Singapore. https://doi.org/10.1007/978-981-15-0184-5_34

Download citation

Publish with us

Policies and ethics