Skip to main content

Difference Expansion-Based Data Hiding Method by Changing Expansion Media

  • Conference paper
  • First Online:
Recent Advances on Soft Computing and Data Mining (SCDM 2016)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 549))

Included in the following conference series:

  • 1249 Accesses

Abstract

In this era, protecting secret data has played an important role since such data may be transmitted over public networks or stored in public storages. One possible method to protect the data is by implementing steganography/data hiding algorithms, such as Difference Expansion (DE). It works by embedding a secret message on the difference value of two pixels, in the case the cover is an image. Because the data changes directly, Difference Expansion has a problem on the limit values which are called overflow and underflow. This affects the amount of the secret message and quality of the resulted stego data. In this paper, we propose to change the embedding method on a matrix which is generated from an LSB image. Therefore, there is no restriction on media value where the data is embedded. The experimental result shows that this proposed method is able to improve the performance of stego data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

References

  1. Cheddad, A., Condell, J., Curran, K., McKevitt, P.: Digital image steganography: survey and analysis of current metods. Sig. Process. 90(3), 727–752 (2010)

    Article  MATH  Google Scholar 

  2. Johnson, N.F., Jajodia, S.: Steganalysis of images created using current steganography software. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 273–289. Springer, Heidelberg (1998). doi:10.1007/3-540-49380-8_19

    Chapter  Google Scholar 

  3. Chandramouli, R., Kharrazi, M., Memon, N.: Image steganography and steganalysis: concepts and practice. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 35–49. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24624-4_3

    Chapter  Google Scholar 

  4. Ahmad, T., Hu, J., Han, S.: An efficient mobile voting system security scheme based on elliptic curve cryptography. In: 3rd International Conference on Network and System Security, pp. 474–479 (2009)

    Google Scholar 

  5. Subhedar, M.S., Mankar, V.H.: Current status and key issues in image steganography: a survey. Comput. Sci. Rev. 13, 95–113 (2014)

    Article  MATH  Google Scholar 

  6. Sarkar, T., Sanyal, S.: Reversible and irreversible data hiding technique (2014). https://arxiv.org/abs/1405.2684v2

  7. Sarkar, T., Sanyal, S.: Steganalysis: detecting LSB steganographic techniques (2014). https://arxiv.org/abs/1405.5119v1

  8. Battisti, F., Carli, M., Neri, A., Egiaziarian, K.: A generalized fibonacci LSB data hiding technique. In: IEEE 3rd International Conference on Computers and Devices for Communication (CODEC-2006) TEA, pp. 18–20 (2006)

    Google Scholar 

  9. Dey, S., Abraham, A., Sanyal, S.: An LSB data hiding technique using natural numbers. In: 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, vol. 2, pp. 473–476 (2007)

    Google Scholar 

  10. Dey, S., Abraham, A., Sanyal, S.: An LSB data hiding technique using prime numbers. In: 3rd International Symposium on Information Assurance and Security, pp. 101–108 (2007)

    Google Scholar 

  11. Nosrati, M., Karimi, R., Nosrati, H., Nosrati, A.: Embedding stego-text in cover images using linked list concepts and LSB technique. J. Am. Sci. 7, 97–100 (2011)

    Google Scholar 

  12. Dey, S., Abraham, A., Bandyopadhyay, B., Sanyal, S.: Data hiding techniques using prime and natural numbers. J. Digit. Inf. Manag. 6, 463–485 (2008)

    Google Scholar 

  13. Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circ. Syst. Video Technol. 16(3), 354–362 (2006)

    Article  Google Scholar 

  14. Kuo, W.C., Jiang, D.J., Huang, Y.C.: A reversible data hiding scheme based on block division. In: Congress on Image and Signal Processing, vol. 1, pp. 365–369 (2008)

    Google Scholar 

  15. Holil, M., Ahmad, T.: Secret data hiding by optimizing general smoothness difference expansion based method. J. Theoret. Appl. Inf. Technol. 72, 155–163 (2015)

    Google Scholar 

  16. Ahmad, T., Holil, M., Wibisono, W., Ijtihadie, R.M.: An improved quad and RDE-based medical data hiding method. In: IEEE International Conference on Computational Intelligence and Cybernetics, pp. 141–145 (2013)

    Google Scholar 

  17. Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circ. Syst. Video Technol. 13(8), 890–896 (2003)

    Article  Google Scholar 

  18. Partners Infectious Disease Images - eMicrobes Digital Library (2002). http://www.idimages.org/images/

  19. Lorem Ipsum - All the facts - Lipsum generator. http://www.lipsum.com/

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Tohari Ahmad or Diksy M. Firmansyah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Ahmad, T., Firmansyah, D.M., Angreni, D.S. (2017). Difference Expansion-Based Data Hiding Method by Changing Expansion Media. In: Herawan, T., Ghazali, R., Nawi, N.M., Deris, M.M. (eds) Recent Advances on Soft Computing and Data Mining. SCDM 2016. Advances in Intelligent Systems and Computing, vol 549. Springer, Cham. https://doi.org/10.1007/978-3-319-51281-5_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-51281-5_42

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-51279-2

  • Online ISBN: 978-3-319-51281-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics