Skip to main content

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 2))

Included in the following conference series:

  • 975 Accesses

Abstract

Image steganography differs from cryptography that directly encrypts the data transmitted, embeds important messages into a digital image that appears usual before transmission to improve the concealment of communication. It proposes a novel and secure steganographic method for embedding secret data into a gray scale image. It first partitions the cover image into blocks of the same size and calculates the mean of all pixels in each blocks. And then embed different amount of data bits into different pixels in a block according to the range of the difference value between each pixels and the block mean. In this way, the proposed method different amount of data into blocks of different degree of smoothness. Experimental results show that the quality of both the extracted important image and the stego-image are acceptable. And have the successful way of embedding secret data into an image without noticeable distortion.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Highland, H.J.: Data Encryption: a Non-mathematical Approach. Computer Security 16(5), 369–386 (1997)

    Article  Google Scholar 

  2. Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S.: Image Steganographic Scheme based on Pixel-value Differencing and LSB Replacement Methods. Image and Signal Processing 152(5), 105–113 (2005)

    Google Scholar 

  3. Wu, D.C., Tsai, W.H.: A Steganographic Method for Images by Pixel-value Differencing. Pattern Recognition Letters 24(9-10), 1613–1626 (2003)

    Article  MATH  Google Scholar 

  4. Wang, R.Z., Lin, C.F., Lin, J.C.: Hiding Data in Images by Optimal Moderately-Significant-bit Replacement. Electron, Lett. 36(25), 2069–2070 (2000)

    Article  Google Scholar 

  5. Chan, C.K., Cheng, L.M.: Improved Hiding Data in Images by Optimal Moderately-Significant-bit Replacement. Electron, Lett. 37(16), 1017–1018 (2001)

    Article  Google Scholar 

  6. Lie, W. N., Chang, L. C.: Data Hiding In Images With Adaptive Numbers of Least Significant Bits Based on The Human Visual System. In: ICIP99, pp. 286–290 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

De-Shuang Huang Laurent Heutte Marco Loog

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, T. (2007). An ImageSteganography Scheme by Gray Scale Grid Analysis. In: Huang, DS., Heutte, L., Loog, M. (eds) Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques. ICIC 2007. Communications in Computer and Information Science, vol 2. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74282-1_94

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74282-1_94

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74281-4

  • Online ISBN: 978-3-540-74282-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics