Difference Expansion-Based Data Hiding Method by Changing Expansion Media

  • Tohari Ahmad
  • Diksy M. Firmansyah
  • Dwi S. Angreni
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 549)


In this era, protecting secret data has played an important role since such data may be transmitted over public networks or stored in public storages. One possible method to protect the data is by implementing steganography/data hiding algorithms, such as Difference Expansion (DE). It works by embedding a secret message on the difference value of two pixels, in the case the cover is an image. Because the data changes directly, Difference Expansion has a problem on the limit values which are called overflow and underflow. This affects the amount of the secret message and quality of the resulted stego data. In this paper, we propose to change the embedding method on a matrix which is generated from an LSB image. Therefore, there is no restriction on media value where the data is embedded. The experimental result shows that this proposed method is able to improve the performance of stego data.


Data hiding Difference Expansion Expansion media Data security 


  1. 1.
    Cheddad, A., Condell, J., Curran, K., McKevitt, P.: Digital image steganography: survey and analysis of current metods. Sig. Process. 90(3), 727–752 (2010)CrossRefzbMATHGoogle Scholar
  2. 2.
    Johnson, N.F., Jajodia, S.: Steganalysis of images created using current steganography software. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 273–289. Springer, Heidelberg (1998). doi: 10.1007/3-540-49380-8_19 CrossRefGoogle Scholar
  3. 3.
    Chandramouli, R., Kharrazi, M., Memon, N.: Image steganography and steganalysis: concepts and practice. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 35–49. Springer, Heidelberg (2004). doi: 10.1007/978-3-540-24624-4_3 CrossRefGoogle Scholar
  4. 4.
    Ahmad, T., Hu, J., Han, S.: An efficient mobile voting system security scheme based on elliptic curve cryptography. In: 3rd International Conference on Network and System Security, pp. 474–479 (2009)Google Scholar
  5. 5.
    Subhedar, M.S., Mankar, V.H.: Current status and key issues in image steganography: a survey. Comput. Sci. Rev. 13, 95–113 (2014)CrossRefzbMATHGoogle Scholar
  6. 6.
    Sarkar, T., Sanyal, S.: Reversible and irreversible data hiding technique (2014).
  7. 7.
    Sarkar, T., Sanyal, S.: Steganalysis: detecting LSB steganographic techniques (2014).
  8. 8.
    Battisti, F., Carli, M., Neri, A., Egiaziarian, K.: A generalized fibonacci LSB data hiding technique. In: IEEE 3rd International Conference on Computers and Devices for Communication (CODEC-2006) TEA, pp. 18–20 (2006)Google Scholar
  9. 9.
    Dey, S., Abraham, A., Sanyal, S.: An LSB data hiding technique using natural numbers. In: 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, vol. 2, pp. 473–476 (2007)Google Scholar
  10. 10.
    Dey, S., Abraham, A., Sanyal, S.: An LSB data hiding technique using prime numbers. In: 3rd International Symposium on Information Assurance and Security, pp. 101–108 (2007)Google Scholar
  11. 11.
    Nosrati, M., Karimi, R., Nosrati, H., Nosrati, A.: Embedding stego-text in cover images using linked list concepts and LSB technique. J. Am. Sci. 7, 97–100 (2011)Google Scholar
  12. 12.
    Dey, S., Abraham, A., Bandyopadhyay, B., Sanyal, S.: Data hiding techniques using prime and natural numbers. J. Digit. Inf. Manag. 6, 463–485 (2008)Google Scholar
  13. 13.
    Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circ. Syst. Video Technol. 16(3), 354–362 (2006)CrossRefGoogle Scholar
  14. 14.
    Kuo, W.C., Jiang, D.J., Huang, Y.C.: A reversible data hiding scheme based on block division. In: Congress on Image and Signal Processing, vol. 1, pp. 365–369 (2008)Google Scholar
  15. 15.
    Holil, M., Ahmad, T.: Secret data hiding by optimizing general smoothness difference expansion based method. J. Theoret. Appl. Inf. Technol. 72, 155–163 (2015)Google Scholar
  16. 16.
    Ahmad, T., Holil, M., Wibisono, W., Ijtihadie, R.M.: An improved quad and RDE-based medical data hiding method. In: IEEE International Conference on Computational Intelligence and Cybernetics, pp. 141–145 (2013)Google Scholar
  17. 17.
    Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circ. Syst. Video Technol. 13(8), 890–896 (2003)CrossRefGoogle Scholar
  18. 18.
    Partners Infectious Disease Images - eMicrobes Digital Library (2002).
  19. 19.
    Lorem Ipsum - All the facts - Lipsum generator.

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Department of InformaticsInstitut Teknologi Sepuluh Nopember (ITS)SurabayaIndonesia

Personalised recommendations