Abstract
In this era, protecting secret data has played an important role since such data may be transmitted over public networks or stored in public storages. One possible method to protect the data is by implementing steganography/data hiding algorithms, such as Difference Expansion (DE). It works by embedding a secret message on the difference value of two pixels, in the case the cover is an image. Because the data changes directly, Difference Expansion has a problem on the limit values which are called overflow and underflow. This affects the amount of the secret message and quality of the resulted stego data. In this paper, we propose to change the embedding method on a matrix which is generated from an LSB image. Therefore, there is no restriction on media value where the data is embedded. The experimental result shows that this proposed method is able to improve the performance of stego data.
Similar content being viewed by others
References
Cheddad, A., Condell, J., Curran, K., McKevitt, P.: Digital image steganography: survey and analysis of current metods. Sig. Process. 90(3), 727–752 (2010)
Johnson, N.F., Jajodia, S.: Steganalysis of images created using current steganography software. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 273–289. Springer, Heidelberg (1998). doi:10.1007/3-540-49380-8_19
Chandramouli, R., Kharrazi, M., Memon, N.: Image steganography and steganalysis: concepts and practice. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 35–49. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24624-4_3
Ahmad, T., Hu, J., Han, S.: An efficient mobile voting system security scheme based on elliptic curve cryptography. In: 3rd International Conference on Network and System Security, pp. 474–479 (2009)
Subhedar, M.S., Mankar, V.H.: Current status and key issues in image steganography: a survey. Comput. Sci. Rev. 13, 95–113 (2014)
Sarkar, T., Sanyal, S.: Reversible and irreversible data hiding technique (2014). https://arxiv.org/abs/1405.2684v2
Sarkar, T., Sanyal, S.: Steganalysis: detecting LSB steganographic techniques (2014). https://arxiv.org/abs/1405.5119v1
Battisti, F., Carli, M., Neri, A., Egiaziarian, K.: A generalized fibonacci LSB data hiding technique. In: IEEE 3rd International Conference on Computers and Devices for Communication (CODEC-2006) TEA, pp. 18–20 (2006)
Dey, S., Abraham, A., Sanyal, S.: An LSB data hiding technique using natural numbers. In: 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, vol. 2, pp. 473–476 (2007)
Dey, S., Abraham, A., Sanyal, S.: An LSB data hiding technique using prime numbers. In: 3rd International Symposium on Information Assurance and Security, pp. 101–108 (2007)
Nosrati, M., Karimi, R., Nosrati, H., Nosrati, A.: Embedding stego-text in cover images using linked list concepts and LSB technique. J. Am. Sci. 7, 97–100 (2011)
Dey, S., Abraham, A., Bandyopadhyay, B., Sanyal, S.: Data hiding techniques using prime and natural numbers. J. Digit. Inf. Manag. 6, 463–485 (2008)
Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circ. Syst. Video Technol. 16(3), 354–362 (2006)
Kuo, W.C., Jiang, D.J., Huang, Y.C.: A reversible data hiding scheme based on block division. In: Congress on Image and Signal Processing, vol. 1, pp. 365–369 (2008)
Holil, M., Ahmad, T.: Secret data hiding by optimizing general smoothness difference expansion based method. J. Theoret. Appl. Inf. Technol. 72, 155–163 (2015)
Ahmad, T., Holil, M., Wibisono, W., Ijtihadie, R.M.: An improved quad and RDE-based medical data hiding method. In: IEEE International Conference on Computational Intelligence and Cybernetics, pp. 141–145 (2013)
Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circ. Syst. Video Technol. 13(8), 890–896 (2003)
Partners Infectious Disease Images - eMicrobes Digital Library (2002). http://www.idimages.org/images/
Lorem Ipsum - All the facts - Lipsum generator. http://www.lipsum.com/
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Ahmad, T., Firmansyah, D.M., Angreni, D.S. (2017). Difference Expansion-Based Data Hiding Method by Changing Expansion Media. In: Herawan, T., Ghazali, R., Nawi, N.M., Deris, M.M. (eds) Recent Advances on Soft Computing and Data Mining. SCDM 2016. Advances in Intelligent Systems and Computing, vol 549. Springer, Cham. https://doi.org/10.1007/978-3-319-51281-5_42
Download citation
DOI: https://doi.org/10.1007/978-3-319-51281-5_42
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-51279-2
Online ISBN: 978-3-319-51281-5
eBook Packages: EngineeringEngineering (R0)