Abstract
Image Steganography is one of the most well-known methods where a top-secret data is embedded into the pixels of an image by altering some of its pixel values. Reversible Image Steganography is used extensively due to its property of reconstructing the original cover image without any loss. Various studies have been conducted to achieve stego image with high Embedding capacity, less time complexity, high imperceptibility, and robustness. Keeping the necessary parameters under consideration, we conducted our study on Reversible Image Steganography to achieve better Peak Signal to Noise Ratio (PSNR) value or high Embedding capacity which helps us in analyzing the quality. We have analyzed PSNR ratio and compared it with the standard tests ensuring the quality of the embedded image. Also, we have provided an overview of numerous Reversible Picture Steganography techniques based on compression, encryption, higher capacity, quality, and performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lee CF, Wang KH, Chang CC, Huang YL (2009) A reversible data hiding scheme based on dual steganographic images. In: Proceedings of the 3rd international conference onubiquitous information management and communication, pp 228–237
Chang CC, Chen TS, Chung LZ (2002) A steganographic method based upon JPEG and quantization table modification. Inf Sci 141(1–2):123–138
Wang Z, Feng G, Shen L, Zhang X (2022) Cover selection for steganography using image similarity. IEEE Trans Dependable Secure Comput
Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12): 1673–1687
Delp E, Mitchell O (1979) Image compression using block truncation coding. IEEE Trans Commun 27(9):1335–1342
Thabit R, Udzir NI, Yasin SM, Asmawi A, Gutub AAA (2022) Color spacing normalization text steganography model to improve capacity and invisibility of hidden data. https://doi.org/10.1109/ACCESS.2022.3182712
Cao Y, Zhou Z, Chakraborty C, Wang M, Wu QMJ, Sun X, Yu K (2022) Generative steganography based on long readable text generation. IEEE Trans Comput Soc Syst
Chang CC (2022) Bayesian neural networks for reversible steganography. https://doi.org/10.1109/ACCESS.2022.3159911
Wang J, Yin X, Chen Y, Huang J, Kang X (2022) An adaptive IPM-based HEVC video steganography via minimizing non-additive distortion
Zheng Z, Hu Y, Bin Y, Xu X, Yang Y, Shen HT (2022) Aware image steganography through adversarial self-generated supervision. IEEE Trans Neural Netw Learn Syst
Chen Y, Wang H, Li W, Luo J (2022) Cost reassignment for improving security of adaptive steganography using an artificial immune system. IEEE Signal Process Lett 29
Zhang YQ, Zhong K, Wang XY (2022) High-capacity image steganography based on discrete Hadamard transform. https://doi.org/10.1109/ACCESS.2022.3181179
Ko HJ, Huang CT, Tseng HW, Wang SJ (2022) Efficient cost-reduced with high-quality image of imperceptible steganography using modulo and magic cube. https://doi.org/10.1109/ACCESS.2022.3185120
Kamil S, Abdullah SNHS, Hasan MK, Bohani FA (2021) Enhanced flipping technique to reduce variability in image steganography. https://doi.org/10.1109/ACCESS.2021.3133672
India emergency medical assistance by ambulance drone using machine learning, Light-weight cryptography and variable image steganography, circuit and system conference 2022 (IEEE VLSI DCS 2022), IEEE ED MSIT SBC, Kolkata, 26–27 Feb 2022
Wang Z, Feng G, Qian Z, Zhang X (2022) JPEG steganography with content similarity evaluation. IEEE Trans Cybern
Image steganography approach based ant colony optimization with triangular chaotic map. In: 2nd International conference on innovative practices in technology and management (ICIPTM), 429p. 978-1-6654-6643-1/22/$31.00 ©2022 IEEE
A brief review on various aspects of steganography followed by cryptographic analysis. In: IEEE 7th international conference for convergence in technology (I2CT) Pune, India, 07–09 Apr 2022
Nashat D, Mamdouh L (2019) An efficient steganographic technique for hiding data. J Egypt Math Soc
Chang CC, Lin CY (2006) Reversible steganography for VQ-compressed images using side matching and relocation. IEEE Trans Inf Forensics Secur 1(4):493–501
Chang CC, Lin CY, Fan YH (2011) Reversible steganography for BTC-compressed images. Fundam Inform 109(2):121–134
Yang CH, Wang WJ, Huang CT, Wang SJ (2011) Reversible steganography based on side match and hit pattern for VQ-compressed images. Inf Sci 181(11):2218–2230
Dharwadkar NV, Amberker BB (2010) An improved reversible steganography scheme based on dual cover images. Int J Multimedia Intell Secur 1(4):336–349
Yin Z, Hong W, Tang J, Luo B (2016) High capacity reversible steganography in encrypted images based on feature mining in plaintext domain. Int J Embedded Syst 8(2–3):249–257
Eskicioglu AM, Fisher PS (1995) Image quality measures and their performance. IEEE Trans Commun 43(12):2959–2965
Yang B, Lu ZM, Sun SH (2005) Reversible watermarking in the VQ-compressed domain. In Proceedings of the fifth IASTED international conference on visualization, imaging, and image processing. Benidorm, Spain, pp 298–303
Mohamed MH, Mohamed LM (2016) High capacity image steganography technique based on LSB substitution method. Appl Math Inf Sci 10(1):259
Chang CC, Chou YC, Kieu TD (2009) Information hiding in dual images with reversibility. In: Proceedings of the third international conference on multimedia and ubiquitous engineering. IEEE, Qingdao, pp 145–152
Kamau GM (2014) An enhanced least significant bit steganographic method for information hiding. PhD thesis
Ye H, Su K, Cheng X, Huang S (2022) Research on reversible image steganography of encrypted image based on image interpolation and difference histogram shift. IET Image Processing
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Nayab, M.G., Singh, A.P., Sharma, R., Raj, G. (2023). Reversible Image Steganography to Achieve Effective PSNR. In: Murthy, B.K., Reddy, B.V.R., Hasteer, N., Van Belle, JP. (eds) Decision Intelligence. InCITe 2023. Lecture Notes in Electrical Engineering, vol 1079. Springer, Singapore. https://doi.org/10.1007/978-981-99-5997-6_13
Download citation
DOI: https://doi.org/10.1007/978-981-99-5997-6_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-5996-9
Online ISBN: 978-981-99-5997-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)