steganography in images, based on pixel value differencing in 16-pixels blocks
Subject Areas : StatisticsBashir Omrani Harzand 1 , Mohammadreza Motadel 2 , Ali Broumandnia 3
1 - Management Faculty, Islamic Azad University of central Tehran branch, Tehran, Iran
2 - Management Faculty, Islamic Azad university, central Tehran branch, Tehran, Iran
3 - Department of Computer, Engineering, Islamic Azad University, South Tehran Branch, Tehran, Iran
Keywords: جایگزینی در بیتهای کم ارزش, نسبت پیک سیگنال به نویز, نهان نگاری, جاسازی اطلاعات, روش اختلاف مقادیر پیکسلها,
Abstract :
Nowaday, steganography as an art or technique for hiding data in various media, has a wide variety of applications in information management. steganography can be used to convey a confidential message, enhance information security, categorize information, store specific information, and more . Image is one of the most popular media used in data hiding process and there are various methods for hiding information in images, the most common of which is the method of embedding information in low-value bits of the image and for which various algorithms and methods have been developed. One of these methods, which has a mathematical basis, is to use the calculation of the difference between the values of two adjacent pixels in order to identify suitable points for embedding confidential information. In this paper, two new methods for data embedding in images are proposed based on calculating the differences in the values of adjacent pixels in 4*4 blocks and tested on different images using the Mean Squares of Errors, Peek signal-to-noise ratio and structural similarity criterias has been studied and analyzed. Evaluations show that the first proposed method is optimal due to better results.
[1] A. Soria-Lorente, S. Berres, "A Secure Steganographic Algorithm Based on Frequency Domain for the Transmission of Hidden Information," Security and Communication Networks, (2017), p. 1.
[2] Arshiya Sajid Ansari, Mohammad Sajid Mohammadi, Mohammad Tanvir Parvez, "A Comparative Study of Recent Steganography Techniques for Multiple Image Formats," I. J. Computer Network and Information Security, (2019), p. 11.
[3] Madhuri R. Shende, Amit Welekar, "Advanced Steganography for Hiding Data and Image using Audio-Video," International Journal on Recent and Innovation Trends in Computing and Communication, vol. 4, no. 1, (2016), p. 112.
[4] Hayat Al-Dmour , Ahmed Al-Ani, "A Steganography Embedding Method Based on Edge Identification and XOR Coding," Expert Systems with Applications, (2015), p. 3.
[5] Fouroozesh, zohreh. "Image Steganography based on LSB in Spatial Domain," Master Thesis, (2014), p. 9.
[6] Sumeet Kaur , Savina Bansal ,R. K. Bansal, "Steganography and Classification of Image Steganography Techniques," International Conference on Computing for Sustainable Global Development, (2014), p. 871.
[7] Da-Chun Wu , Wen-Hsiang Tsai, "A Steganographic method for images by pixel-value differencing" Pattern Recognition Letters, (2003), pp. 1615-1617.
[8] H.-C. Wu, N.-I. Wu, C.-S. Tsai and M.-S. Hwang, "Image steganographic scheme based on pixel-value differencing and LSB replacement methods," Image Signal Process, vol. 152, no. 5, (2005), pp. 612-613.
[9] Ko-Chin Chang, Chien-Ping Chang, Ping S. Huang, and Te-Ming Tu, "A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing" Journal of Mulyimedia, vol. 3, no. 2, (2008), pp. 39-40.
[10] Xin Liao, Qiao-yan Wen, Jie Zhang, "A steganographic method for digital images with four-pixel differencing and modified LSB substitution," J. Vis. Commun. Image R., (2011), p. 2.
[11] G. Swain, "Digital Image Steganography using Nine-Pixel Differencing and Modified LSB Substitution," Indian Journal of Science and Technology, vol. 7, (2014), p. 1445.
[12] Zhaotong Li, Ying He, "Steganography with pixel-value differencing and modulus function based on PSO," Journal of Information Security and Applications, (2018), pp. 48-49.
[13] Sharif Shah Newaj Bhuiyan, Norun Abdul Malek, Othman Omran Khalifa, "An Improved Image Steganography Algorithm based on PVD," Indonesian Journal of Electrical Engineering and Computer Science, vol. 10, no. 2, (2018), pp. 571-573.