Abstract
Modern research in Steganography focuses on increasing the capacity without keeping any perceptible signature into the stego-media. In this work, we present a pixel value difference (PVD) based high capacity methodology. Embedding is not restricted only to high contrast pixel pairs. Low contrast pairs are also considered to enhance the capacity. Embedding process varies depending on the local contrast of the pair. Secret message is encrypted before embedding and pixels pairs are chosen in a non-sequential manner, rendering the methodology more secure. Experiment is performed on more than two hundred images. It is observed that embedding by proposed technique is visually imperceptible and can withstand various types of attacks. The benchmark test like StirMark analysis also indicates the strength of the work. Comparison of performance with a number of other methods shows that proposed methodology maintains high PSNR with enhanced capacity.
Similar content being viewed by others
References
Biswas R, Mukherjee I, Bandyopadhyay SK (2019) Image feature based high capacity steganographic algorithm. Multimed Tools Appl 78(14):20019–20036
Boehmm B (2014) StegExpose a tool for detecting LSB steganography https://github.com/b3dk7/StegExpose
Bozek J, Grgic M, Schnabel JA (2011) Validation of rigid registration of mammographic images. In: Proceedings ELMAR-2011. IEEE, pp 11–16
Chakraborty S, Singh JA, Bhatnagar C (2017) LSB based non blind predictive edge adaptive image steganography. Multimed Tools Appls 76:7973–7987. https://doi.org/10.1007/s11042-016-3449-4. ISSN. 1573-7721
Chowdhuri P, Jana B, Giri D (2018) A novel steganographic scheme using weighted matrix in transform domain. In: International conference on mathematics and computing. Springer, pp 27–35
Couchot JF, Couturier R, Guyeux C (2015) STABYLO: steganography with adaptive, Bbs, and binary embedding at low cost. Annals of Telecommunications-Annales des Telecommunications 70(9):441–449
Dagar S Highly randomized image steganography using secret keys. In: IEEE International conference on recent advances and innovations in engineering (ICRAIE-2014), pp 1–5
Datta B, Roy S, Roy S, Bandyopadhyay SK (2019) Multi-bit robust image steganography based on modular arithmetic. Multimed Tools Appl 78(2):1511–1546
Dumitrescu S, Wu X, Memon N (2002) On steganalysis of random LSB embedding in continuous-tone images. Int Conf IEEE Image Process 3:641–644
Feng B, Lu W, Sun W (2015) Secure binary image steganography based on minimizing the distortion on the texture. IEEE Trans Inf Forens Secur 10(2):243–255
Fouad MM (2017) Enhancing the imperceptibility of image steganography for information hiding. In: Proceedings of the federated conference on computer science and information systems, pp 545–548
Fridrich J, Lisonek P (2007) Grid colorings in steganography. IEEE Trans Inform Theory 53(4):1547–1549
Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color, and gray-scale images. Multimed IEEE 8(4):22–28
Halder P, Mukherjee I A novel double layered image steganography in spatial domain using triangular number system. In: 2015 IEEE International conference on research in computational intelligence and communication networks (ICRCICN), pp 411–416
Hussain S, Wahaba AWA, Anthony TS, de Hoc Javedf N, Jungg K-H (2017) A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. In: Signal processing: image communication. Elsevier, pp 44–57
Imaizumi S, Ozawa K (2013) Multibit embedding algorithm for steganography of palette-based images. Pacific-Rim Symposium on Image and Video Technology, LNCS2015 8333:99–110
Islam S, Modi MR, Gupta P (2014) Edge-based image steganography. In: EURASIP Journal on information security. Springer, pp 1–8
Kawaguchi E, Eason R (1998) Principle and applications of BPCS steganography. Multimed Syst Appl 3528:464–473. SPIE
Kharrazi M, Sencar HT, Memon N (2006) Improving steganalysis by fusion techniques: a case study with image steganography. In: Transactions on data hiding and multimedia security. Springer, pp 123–137
Li S, Zhang X (2019) Toward construction based data hiding: from secrets to fingerprint images. IEEE Trans Image Process 28(3):1482–1497
Liao X, Qin Z, Ding l (2017) Data embedding in digital images using critical functions. In: Signal processing: image communication. Elsevier, pp 146–156
Mukherjee I, Paul G (2013) Efficient multi-bit image steganography in spatial domain. In: International conference on information systems security (ICISS), LNCS, vol 8303. Springer, pp 270–284
Mukherjee N, Paul G, Saha SK (2018) An efficient multi-bit steganography algorithm in spatial domain with two-layer security. Multimed Tools Appl Springer 77:18451–18481
Paul G, Davidson I, Mukherjee I, Ravi SS (2012) Keyless steganography in spatial domain using energetic pixels. In: Proceedings of the 8-th international conference on information systems security (ICISS), LNCS, vol 7671. Springer, pp 134–148
Paul G, Davidson I, Mukherjee I, Ravi SS (2016) Keyless dynamic optimal multi-bit image steganography using energetic pixels. In: Multimedia tools and applications, vol 75. Springer, pp 1–27
Petitcolas FAP (2000) Watermarking schemes evaluation. IEEE Signal Process 17(5):58–64
Provos N (2001) Defending against statistical steganalysis. In: Tenth USENIX security symposium, pp 325–335
Rahman MM, Ahammed MS, Ahmed MR, Izhar MR (2017) A semi blind watermarking technique for copyright protection of image based on DCT and SVD domain. In: Global journal of researches in engineering: electrical and electronics en, vol 16
Rai S, Dubey R (2012) A novel keyless algorithm for steganography. In: Engineering and systems (SCES). IEEE, pp 1–4
Singh D, Singh SK (2017) DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimed Tools Appl 76(1):953–977
Smorynski C Logical number theory I. In: Springer-Verlag, Softcover ISBN 978-3-540-52236-2
Song S, Zhangb J, Liaoa X, Dua J, Wena Q (2011) A novel secure communication protocol combining steganography and cryptography. In: Advanced in control engineering and information science. Elsevier, pp 2767–2772
Swain G (2016) Adaptive pixel value differencing steganography using both vertical and horizontal edges. Multimed Tools Appl 75(21):13541–13556
Swain G, Lenka SK (2013) Steganography using two sided, three sided, and four sided side match methods. CSI Trans ICT 1(2):127–133
Tao J, Li S, Zhang X, Wang Z (2019) Towards robust image steganography. IEEE Trans Circ Syst Video Technol 29(2):594–600
Tseng HW, Leng HS (2013) A steganographic method based on pixel-value differencing and the perfect square number. J Appl Math 2013:Article ID 189706
Westfeld A, Pfitzmann A (1999) Attacks on steganographic systems: breaking the steganographic utilities EzStego, Jsteg, Steganos and S-tools-and some lessons learned. In: 3rd international workshop on information hiding. Springer, Berlin
Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. In: Pattern recognition letters archive, vol 24. Elsevier, pp 1613–1626
Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. In: Image and signal processing, IEE proceedings, vol 152, pp 611–615
Yang CY, Wang WF (2015) Block-based colour image steganography using smart pixel-adjustment. In: Genetic and evolutionary computing. Springer International Publishing, pp 145–154
Zhang HL, Geng GZ, Xiong CQ (2009) Image steganography using pixel-value differencing. In: Second international conference on electronic commerce and security, pp 109–112
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
(Ganguly), N.M., Paul, G., Saha, S.K. et al. A PVD based high capacity steganography algorithm with embedding in non-sequential position. Multimed Tools Appl 79, 13449–13479 (2020). https://doi.org/10.1007/s11042-019-08178-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08178-9