Skip to main content
Log in

A PVD based high capacity steganography algorithm with embedding in non-sequential position

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Modern research in Steganography focuses on increasing the capacity without keeping any perceptible signature into the stego-media. In this work, we present a pixel value difference (PVD) based high capacity methodology. Embedding is not restricted only to high contrast pixel pairs. Low contrast pairs are also considered to enhance the capacity. Embedding process varies depending on the local contrast of the pair. Secret message is encrypted before embedding and pixels pairs are chosen in a non-sequential manner, rendering the methodology more secure. Experiment is performed on more than two hundred images. It is observed that embedding by proposed technique is visually imperceptible and can withstand various types of attacks. The benchmark test like StirMark analysis also indicates the strength of the work. Comparison of performance with a number of other methods shows that proposed methodology maintains high PSNR with enhanced capacity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Biswas R, Mukherjee I, Bandyopadhyay SK (2019) Image feature based high capacity steganographic algorithm. Multimed Tools Appl 78(14):20019–20036

    Article  Google Scholar 

  2. Boehmm B (2014) StegExpose a tool for detecting LSB steganography https://github.com/b3dk7/StegExpose

  3. Bozek J, Grgic M, Schnabel JA (2011) Validation of rigid registration of mammographic images. In: Proceedings ELMAR-2011. IEEE, pp 11–16

  4. Chakraborty S, Singh JA, Bhatnagar C (2017) LSB based non blind predictive edge adaptive image steganography. Multimed Tools Appls 76:7973–7987. https://doi.org/10.1007/s11042-016-3449-4. ISSN. 1573-7721

    Article  Google Scholar 

  5. Chowdhuri P, Jana B, Giri D (2018) A novel steganographic scheme using weighted matrix in transform domain. In: International conference on mathematics and computing. Springer, pp 27–35

  6. Couchot JF, Couturier R, Guyeux C (2015) STABYLO: steganography with adaptive, Bbs, and binary embedding at low cost. Annals of Telecommunications-Annales des Telecommunications 70(9):441–449

    Article  Google Scholar 

  7. Dagar S Highly randomized image steganography using secret keys. In: IEEE International conference on recent advances and innovations in engineering (ICRAIE-2014), pp 1–5

  8. Datta B, Roy S, Roy S, Bandyopadhyay SK (2019) Multi-bit robust image steganography based on modular arithmetic. Multimed Tools Appl 78(2):1511–1546

    Article  Google Scholar 

  9. Dumitrescu S, Wu X, Memon N (2002) On steganalysis of random LSB embedding in continuous-tone images. Int Conf IEEE Image Process 3:641–644

    Article  Google Scholar 

  10. Feng B, Lu W, Sun W (2015) Secure binary image steganography based on minimizing the distortion on the texture. IEEE Trans Inf Forens Secur 10(2):243–255

    Article  Google Scholar 

  11. Fouad MM (2017) Enhancing the imperceptibility of image steganography for information hiding. In: Proceedings of the federated conference on computer science and information systems, pp 545–548

  12. Fridrich J, Lisonek P (2007) Grid colorings in steganography. IEEE Trans Inform Theory 53(4):1547–1549

    Article  MathSciNet  Google Scholar 

  13. Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color, and gray-scale images. Multimed IEEE 8(4):22–28

    Article  Google Scholar 

  14. Halder P, Mukherjee I A novel double layered image steganography in spatial domain using triangular number system. In: 2015 IEEE International conference on research in computational intelligence and communication networks (ICRCICN), pp 411–416

  15. Hussain S, Wahaba AWA, Anthony TS, de Hoc Javedf N, Jungg K-H (2017) A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. In: Signal processing: image communication. Elsevier, pp 44–57

  16. Imaizumi S, Ozawa K (2013) Multibit embedding algorithm for steganography of palette-based images. Pacific-Rim Symposium on Image and Video Technology, LNCS2015 8333:99–110

    Google Scholar 

  17. Islam S, Modi MR, Gupta P (2014) Edge-based image steganography. In: EURASIP Journal on information security. Springer, pp 1–8

  18. Kawaguchi E, Eason R (1998) Principle and applications of BPCS steganography. Multimed Syst Appl 3528:464–473. SPIE

    Article  Google Scholar 

  19. Kharrazi M, Sencar HT, Memon N (2006) Improving steganalysis by fusion techniques: a case study with image steganography. In: Transactions on data hiding and multimedia security. Springer, pp 123–137

  20. Li S, Zhang X (2019) Toward construction based data hiding: from secrets to fingerprint images. IEEE Trans Image Process 28(3):1482–1497

    Article  MathSciNet  Google Scholar 

  21. Liao X, Qin Z, Ding l (2017) Data embedding in digital images using critical functions. In: Signal processing: image communication. Elsevier, pp 146–156

  22. Mukherjee I, Paul G (2013) Efficient multi-bit image steganography in spatial domain. In: International conference on information systems security (ICISS), LNCS, vol 8303. Springer, pp 270–284

  23. Mukherjee N, Paul G, Saha SK (2018) An efficient multi-bit steganography algorithm in spatial domain with two-layer security. Multimed Tools Appl Springer 77:18451–18481

    Article  Google Scholar 

  24. Paul G, Davidson I, Mukherjee I, Ravi SS (2012) Keyless steganography in spatial domain using energetic pixels. In: Proceedings of the 8-th international conference on information systems security (ICISS), LNCS, vol 7671. Springer, pp 134–148

  25. Paul G, Davidson I, Mukherjee I, Ravi SS (2016) Keyless dynamic optimal multi-bit image steganography using energetic pixels. In: Multimedia tools and applications, vol 75. Springer, pp 1–27

  26. Petitcolas FAP (2000) Watermarking schemes evaluation. IEEE Signal Process 17(5):58–64

    Article  Google Scholar 

  27. Provos N (2001) Defending against statistical steganalysis. In: Tenth USENIX security symposium, pp 325–335

  28. Rahman MM, Ahammed MS, Ahmed MR, Izhar MR (2017) A semi blind watermarking technique for copyright protection of image based on DCT and SVD domain. In: Global journal of researches in engineering: electrical and electronics en, vol 16

  29. Rai S, Dubey R (2012) A novel keyless algorithm for steganography. In: Engineering and systems (SCES). IEEE, pp 1–4

  30. Singh D, Singh SK (2017) DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimed Tools Appl 76(1):953–977

    Article  Google Scholar 

  31. Smorynski C Logical number theory I. In: Springer-Verlag, Softcover ISBN 978-3-540-52236-2

  32. Song S, Zhangb J, Liaoa X, Dua J, Wena Q (2011) A novel secure communication protocol combining steganography and cryptography. In: Advanced in control engineering and information science. Elsevier, pp 2767–2772

  33. Swain G (2016) Adaptive pixel value differencing steganography using both vertical and horizontal edges. Multimed Tools Appl 75(21):13541–13556

    Article  Google Scholar 

  34. Swain G, Lenka SK (2013) Steganography using two sided, three sided, and four sided side match methods. CSI Trans ICT 1(2):127–133

    Article  Google Scholar 

  35. Tao J, Li S, Zhang X, Wang Z (2019) Towards robust image steganography. IEEE Trans Circ Syst Video Technol 29(2):594–600

    Article  Google Scholar 

  36. Tseng HW, Leng HS (2013) A steganographic method based on pixel-value differencing and the perfect square number. J Appl Math 2013:Article ID 189706

    Article  MathSciNet  Google Scholar 

  37. Westfeld A, Pfitzmann A (1999) Attacks on steganographic systems: breaking the steganographic utilities EzStego, Jsteg, Steganos and S-tools-and some lessons learned. In: 3rd international workshop on information hiding. Springer, Berlin

  38. Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. In: Pattern recognition letters archive, vol 24. Elsevier, pp 1613–1626

  39. Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. In: Image and signal processing, IEE proceedings, vol 152, pp 611–615

    Article  Google Scholar 

  40. Yang CY, Wang WF (2015) Block-based colour image steganography using smart pixel-adjustment. In: Genetic and evolutionary computing. Springer International Publishing, pp 145–154

  41. Zhang HL, Geng GZ, Xiong CQ (2009) Image steganography using pixel-value differencing. In: Second international conference on electronic commerce and security, pp 109–112

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Goutam Paul.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

(Ganguly), N.M., Paul, G., Saha, S.K. et al. A PVD based high capacity steganography algorithm with embedding in non-sequential position. Multimed Tools Appl 79, 13449–13479 (2020). https://doi.org/10.1007/s11042-019-08178-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08178-9

Keywords

Navigation