Skip to main content

Reversible Image Steganography to Achieve Effective PSNR

  • Conference paper
  • First Online:
Decision Intelligence (InCITe 2023)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 1079))

Included in the following conference series:

  • 121 Accesses

Abstract

Image Steganography is one of the most well-known methods where a top-secret data is embedded into the pixels of an image by altering some of its pixel values. Reversible Image Steganography is used extensively due to its property of reconstructing the original cover image without any loss. Various studies have been conducted to achieve stego image with high Embedding capacity, less time complexity, high imperceptibility, and robustness. Keeping the necessary parameters under consideration, we conducted our study on Reversible Image Steganography to achieve better Peak Signal to Noise Ratio (PSNR) value or high Embedding capacity which helps us in analyzing the quality. We have analyzed PSNR ratio and compared it with the standard tests ensuring the quality of the embedded image. Also, we have provided an overview of numerous Reversible Picture Steganography techniques based on compression, encryption, higher capacity, quality, and performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lee CF, Wang KH, Chang CC, Huang YL (2009) A reversible data hiding scheme based on dual steganographic images. In: Proceedings of the 3rd international conference onubiquitous information management and communication, pp 228–237

    Google Scholar 

  2. Chang CC, Chen TS, Chung LZ (2002) A steganographic method based upon JPEG and quantization table modification. Inf Sci 141(1–2):123–138

    Article  MATH  Google Scholar 

  3. Wang Z, Feng G, Shen L, Zhang X (2022) Cover selection for steganography using image similarity. IEEE Trans Dependable Secure Comput

    Google Scholar 

  4. Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12): 1673–1687

    Google Scholar 

  5. Delp E, Mitchell O (1979) Image compression using block truncation coding. IEEE Trans Commun 27(9):1335–1342

    Google Scholar 

  6. Thabit R, Udzir NI, Yasin SM, Asmawi A, Gutub AAA (2022) Color spacing normalization text steganography model to improve capacity and invisibility of hidden data. https://doi.org/10.1109/ACCESS.2022.3182712

  7. Cao Y, Zhou Z, Chakraborty C, Wang M, Wu QMJ, Sun X, Yu K (2022) Generative steganography based on long readable text generation. IEEE Trans Comput Soc Syst

    Google Scholar 

  8. Chang CC (2022) Bayesian neural networks for reversible steganography. https://doi.org/10.1109/ACCESS.2022.3159911

  9. Wang J, Yin X, Chen Y, Huang J, Kang X (2022) An adaptive IPM-based HEVC video steganography via minimizing non-additive distortion

    Google Scholar 

  10. Zheng Z, Hu Y, Bin Y, Xu X, Yang Y, Shen HT (2022) Aware image steganography through adversarial self-generated supervision. IEEE Trans Neural Netw Learn Syst

    Google Scholar 

  11. Chen Y, Wang H, Li W, Luo J (2022) Cost reassignment for improving security of adaptive steganography using an artificial immune system. IEEE Signal Process Lett 29

    Google Scholar 

  12. Zhang YQ, Zhong K, Wang XY (2022) High-capacity image steganography based on discrete Hadamard transform. https://doi.org/10.1109/ACCESS.2022.3181179

  13. Ko HJ, Huang CT, Tseng HW, Wang SJ (2022) Efficient cost-reduced with high-quality image of imperceptible steganography using modulo and magic cube. https://doi.org/10.1109/ACCESS.2022.3185120

  14. Kamil S, Abdullah SNHS, Hasan MK, Bohani FA (2021) Enhanced flipping technique to reduce variability in image steganography. https://doi.org/10.1109/ACCESS.2021.3133672

  15. India emergency medical assistance by ambulance drone using machine learning, Light-weight cryptography and variable image steganography, circuit and system conference 2022 (IEEE VLSI DCS 2022), IEEE ED MSIT SBC, Kolkata, 26–27 Feb 2022

    Google Scholar 

  16. Wang Z, Feng G, Qian Z, Zhang X (2022) JPEG steganography with content similarity evaluation. IEEE Trans Cybern

    Google Scholar 

  17. Image steganography approach based ant colony optimization with triangular chaotic map. In: 2nd International conference on innovative practices in technology and management (ICIPTM), 429p. 978-1-6654-6643-1/22/$31.00 ©2022 IEEE

    Google Scholar 

  18. A brief review on various aspects of steganography followed by cryptographic analysis. In: IEEE 7th international conference for convergence in technology (I2CT) Pune, India, 07–09 Apr 2022

    Google Scholar 

  19. Nashat D, Mamdouh L (2019) An efficient steganographic technique for hiding data. J Egypt Math Soc

    Google Scholar 

  20. Chang CC, Lin CY (2006) Reversible steganography for VQ-compressed images using side matching and relocation. IEEE Trans Inf Forensics Secur 1(4):493–501

    Google Scholar 

  21. Chang CC, Lin CY, Fan YH (2011) Reversible steganography for BTC-compressed images. Fundam Inform 109(2):121–134

    Article  MathSciNet  Google Scholar 

  22. Yang CH, Wang WJ, Huang CT, Wang SJ (2011) Reversible steganography based on side match and hit pattern for VQ-compressed images. Inf Sci 181(11):2218–2230

    Article  Google Scholar 

  23. Dharwadkar NV, Amberker BB (2010) An improved reversible steganography scheme based on dual cover images. Int J Multimedia Intell Secur 1(4):336–349

    Google Scholar 

  24. Yin Z, Hong W, Tang J, Luo B (2016) High capacity reversible steganography in encrypted images based on feature mining in plaintext domain. Int J Embedded Syst 8(2–3):249–257

    Article  Google Scholar 

  25. Eskicioglu AM, Fisher PS (1995) Image quality measures and their performance. IEEE Trans Commun 43(12):2959–2965

    Google Scholar 

  26. Yang B, Lu ZM, Sun SH (2005) Reversible watermarking in the VQ-compressed domain. In Proceedings of the fifth IASTED international conference on visualization, imaging, and image processing. Benidorm, Spain, pp 298–303

    Google Scholar 

  27. Mohamed MH, Mohamed LM (2016) High capacity image steganography technique based on LSB substitution method. Appl Math Inf Sci 10(1):259

    Article  Google Scholar 

  28. Chang CC, Chou YC, Kieu TD (2009) Information hiding in dual images with reversibility. In: Proceedings of the third international conference on multimedia and ubiquitous engineering. IEEE, Qingdao, pp 145–152

    Google Scholar 

  29. Kamau GM (2014) An enhanced least significant bit steganographic method for information hiding. PhD thesis

    Google Scholar 

  30. Ye H, Su K, Cheng X, Huang S (2022) Research on reversible image steganography of encrypted image based on image interpolation and difference histogram shift. IET Image Processing

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Gauhar Nayab .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nayab, M.G., Singh, A.P., Sharma, R., Raj, G. (2023). Reversible Image Steganography to Achieve Effective PSNR. In: Murthy, B.K., Reddy, B.V.R., Hasteer, N., Van Belle, JP. (eds) Decision Intelligence. InCITe 2023. Lecture Notes in Electrical Engineering, vol 1079. Springer, Singapore. https://doi.org/10.1007/978-981-99-5997-6_13

Download citation

Publish with us

Policies and ethics