Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

A steganographic method for digital images with four-pixel differencing and modified LSB substitution

Published: 01 January 2011 Publication History

Abstract

To improve the embedding capacity and provide an imperceptible visual quality, a novel steganographic method based on four-pixel differencing and modified least significant bit (LSB) substitution is presented. The average difference value of a four-pixel block is exploited to classify the block as a smooth area or an edge area. Secret data are hidden into each pixel by the k-bit modified LSB substitution method, where k is decided by the level which the average difference value falls into. Readjustment will be executed to guarantee the same level that the average difference value belongs to before and after embedding, and to minimize the perceptual distortion. By proving that the readjusting procedure works, a theoretical proof is given to justify our method succeeded in embedding and extracting. Our experimental results have shown that the proposed method not only has an acceptable image quality but also provides a large embedding capacity.

References

[1]
Highland, H.J., Data encryption: a non-mathematical approach. Comput. Secur. v16. 369-386.
[2]
Anderson, R.J. and Petitcolas, F.A.P., On the limits of steganography. IEEE J. Sel. Areas Commun. v16. 474-481.
[3]
Petitcolas, F.A.P., Anderson, R.J. and Kuhn, M.G., Information hidinga survey. Proc. IEEE Spec. Issue Prot. Multimedia Content. v87 i7. 1062-1078.
[4]
Wang, H. and Wang, S., Cyber warfare: steganography vs. steganalysis. Commun. ACM. v47 i10. 76-82.
[5]
Bender, D.W., Gruhl, N.M. and Lu, A., Techniques for data hiding. IBM Syst. J. v35. 313-316.
[6]
Wang, R.Z., Lin, C.F. and Lin, J.C., Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognit. v34 i3. 671-683.
[7]
Chan, C.K. and Chen, L.M., Hiding data in images by simple LSB substitution. Pattern Recognit. v37 i3. 469-474.
[8]
Lin, I.C., Lin, Y.B. and Wang, C.M., Hiding data in spatial domain images with distortion tolerance. Comput. Stand. Inter. v31 i2. 458-464.
[9]
Wu, D.C. and Tsai, W.H., A steganographic method for images by pixel-value differencing. Pattern Recognit. Lett. v24 i9-10. 1613-1626.
[10]
Chang, C.C. and Tseng, H.W., A steganographic method for digital images using side match. Pattern Recognit. Lett. v25 i12. 1431-1437.
[11]
Wu, H.C., Wu, N.I., Tsai, C.S. and Hwang, M.S., Image steganographic scheme based on pixel-value differencing and LSB replacement methods. Proc. Inst. Elect. Eng., Vis. Images Signal Process. v152 i5. 611-615.
[12]
Park, Y.R., Kang, H.H., Shin, S.U. and Kwon, K.R., . 2005. A Steganographic Scheme in Digital Images Using Information of Neighboring Pixels, 2005.Springer-Verlag, Berlin, Germany.
[13]
C.H. Yang, C.Y. Weng, A steganographic method for digital images by multi-pixel differencing, in: Proceedings of International Computer Symposium, Taipei, Taiwan, R.O.C., 2006, pp. 831-836.
[14]
K.H. Jung, K.J. Ha, K.Y. Yoo, Image data hiding method based on multi-pixel differencing and LSB substitution methods, in: International Conference on Convergence and Hybrid Information Technology, 2008, pp. 355-358.
[15]
Wang, C.M., Wu, N.I., Tsai, C.S. and Hwang, M.S., A high quality steganography method with pixel-value differencing and modulus function. J. Syst. Softw. v81. 150-158.
[16]
Yang, C.H., Weng, C.Y., Wang, S.J. and Sun, H.M., Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. Inf. Forensics Secur. v3 i3. 488-497.
[17]
Lee, Y.K. and Chen, L.H., High capacity image steganography model. Proc. Inst. Elect. Eng. Vis. Image, Signal Processing. v147 i3. 288-294.
[18]
Wang, S.J., Steganography of capacity required using modulo operator for embedding secret images. Appl. Math. Comput. v164. 99-116.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Journal of Visual Communication and Image Representation
Journal of Visual Communication and Image Representation  Volume 22, Issue 1
January, 2011
106 pages

Publisher

Academic Press, Inc.

United States

Publication History

Published: 01 January 2011

Author Tags

  1. Data hiding
  2. Embedding capacity
  3. Error block
  4. Four-pixel differencing
  5. Imperceptible
  6. Modified LSB substitution
  7. Pixel-value differencing
  8. Steganography

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)A Hybrid Secured Approach Combining LSB Steganography and AES Using Mosaic Images for Ensuring Data SecuritySN Computer Science10.1007/s42979-022-01046-83:2Online publication date: 3-Feb-2022
  • (2022)Image Steganography Using Remainder Replacement, Adaptive QVD and QVCWireless Personal Communications: An International Journal10.1007/s11277-021-09131-6123:1(273-293)Online publication date: 1-Mar-2022
  • (2022)A novel data hiding scheme based on improved diamond encoding in IWT domainMultimedia Tools and Applications10.1007/s11042-022-14235-782:12(18727-18745)Online publication date: 25-Nov-2022
  • (2022)Adaptive PVD-MPK encoding method in transform domain with a modified side match method against dynamic and constant attacksMultimedia Tools and Applications10.1007/s11042-022-11995-081:16(23493-23532)Online publication date: 18-Mar-2022
  • (2021)Enhanced adaptive data hiding method using LSB and pixel value differencingMultimedia Tools and Applications10.1007/s11042-021-10652-280:13(20381-20401)Online publication date: 1-May-2021
  • (2021)Implementation of image copyright protection tool using hardware-software co-simulationMultimedia Tools and Applications10.1007/s11042-020-09944-w80:3(4263-4277)Online publication date: 1-Jan-2021
  • (2021)A novel data hiding by image interpolation using edge quad-tree block complexityThe Visual Computer: International Journal of Computer Graphics10.1007/s00371-021-02312-139:1(59-72)Online publication date: 9-Oct-2021
  • (2020)BitLightProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/34322284:4(1-23)Online publication date: 18-Dec-2020
  • (2020)A novel color image LSB steganography using improved 1D chaotic mapMultimedia Tools and Applications10.1007/s11042-019-08103-079:1-2(1409-1425)Online publication date: 1-Jan-2020
  • (2019)A Novel n-Rightmost Bit Replacement Image Steganography Technique3D Research10.1007/s13319-018-0211-x10:1(1-18)Online publication date: 1-Mar-2019
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media