Skip to main content

Bi-directional Pixel-Value Differencing Approach for Steganography

  • Conference paper
  • First Online:
Proceedings of the Third International Conference on Soft Computing for Problem Solving

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 258))

Abstract

A hybrid image steganographic approach has been proposed in this paper to enlarge the data hiding capability of cover image as well as to improve the quality of stego image. This research is a hybrid combination of cryptography, steganography and data compression. The basic building block of this approach is Wu and Tsai’s method (PVD), LZW compression scheme, Vernam cipher and gray code. In this approach, chunks of the secret data are embedded by altering the pixel values of the consecutive pixels in the cover image according to their hiding capacity. The hiding capacity of the two consecutive pixels depends on their difference value, which is calculated by pixel-value differencing technique (PVD). Two layer data hiding is the key feature of this approach that’s why it is called a Bi-Directional approach. Two layer data hiding approach improves the data hiding capacity and quality of stego image as well. In second layer data hiding we consider left pixel of the pixel pair as the right pixel and vive-versa. It improves the quality of stego image. In this technique stego image is totally indistinguishable from the original image by the human eye. It is also secure against the RS detection attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Feng, J.B., Lin, I.C., Tsai, C.S., Chu, Y.P.: Reversible watermarking: current status and key issues. Int. J. of Network Secur. 2, 161–170 (2006)

    Google Scholar 

  2. Salomon, D.: Data Compression: The Complete Reference, 4th edn. Springer, London (2007)

    Google Scholar 

  3. Liao, Z., Huang, Y., Li, C.: Research on data hiding capacity. Int. J. Network Secur. 5, 140–144 (2007)

    Google Scholar 

  4. Harmsen, J., Pearlman, W.: Steganalysis of additivenoise modelable information hiding. In: Proceedings of SPIE Security Watermarking Multimedia Contents, vol. 5020, pp. 131–142, (2003)

    Google Scholar 

  5. Sharp, T.: An implementation of key-based digital signal steganography. In: Proceedings of Information Hiding Workshop, vol. 2137, pp. 13–26. Springer LNCS (2001)

    Google Scholar 

  6. Ahirwal, R.R., Ahirwal, D., Jain, Y. K.: A high capacitive and confidentiality based image steganography using private stego-key. In: Proceedings of the International Conference on Information Science and Applications, Chennai (2010)

    Google Scholar 

  7. Hivrale, S.P., Sawarkar, S.D., Bhosale, V., Koregaonkar, S.: Statistical Method for Hiding Detection in LSB of Digital Images: An Overview. In: Proceedings of World Academy of Science, Engineering and Technology, vol. 32, pp. 2070–3740. August 2008

    Google Scholar 

  8. Zhang, H., Geng, G., Xiong, C.: Image steganography using pixel-value differencing. Second International Symposium on Electronic Commerce and Security, 2009

    Google Scholar 

  9. Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recogn. Lett. 24, 1613–1626 (2003)

    Article  MATH  Google Scholar 

  10. Wang, C.-M., Wu, N.-I., Tsai, C.-S., Hwang, M.-S.: A high quality steganographic method with pixel-value differencing and modulus function. J. Syst. Softw. 81(1), 150–158. ELSEVIER. January (2008)

    Google Scholar 

  11. Sherly, A.P., Amritha, P.P.: A compressed video steganography using TPVD. Int. J. Database Manage. Syst. (IJDMS) 2(3), 67–80 (2010)

    Google Scholar 

  12. Zaker, N., Hamzeh, A., Katebi, S.D., Samavi, S.: Improving security of pixel value differencing steganographic method. In: IEEE 978-1-4244-6273-5/09/$26.00 ©2009 (2009)

    Google Scholar 

  13. Lempel–Ziv–Markov chain algorithm “wikipedia.org”. http://en.wikipedia.org/wiki/Lempel-Ziv-Markov_chain_algorithm

  14. Lempel Ziv Markov algorithm and 7-Zip, “blogs.oracle.com”. https://blogs.oracle.com/clayb/entry/lempel_ziv_markov_algorithm_and

  15. The vernam cipher, “cryptomuseum.com”. http://www.cryptomuseum.com/crypto/vernam.htm

  16. Das, D., Nath, J., Mukherjee, M., Chaudhury, N., Nath, A.: An integrated symmetric key cryptography algorithm using generalized vernam cipher method and DJSA method: DJMNA symmetric key algorithm. In: Proceedings of IEEE International conference: World Congress WICT-2011 held at Mumbai University, 2011

    Google Scholar 

  17. Doran, R.W.: The gray code1. J. Univers. Comput. Sci. 13(11), 1573–1597 (2007)

    Google Scholar 

  18. Miroslav G, Jessica J. F., Rui D.: Distortion-free data embedding for images.In: Proceedings of 4th International Workshop, 27–41, (2001) Print ISBN 978-3-540-42733-9

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Himakshi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Himakshi, Verma, H.K., Singh, R.K., Singh, C.K. (2014). Bi-directional Pixel-Value Differencing Approach for Steganography. In: Pant, M., Deep, K., Nagar, A., Bansal, J. (eds) Proceedings of the Third International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 258. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1771-8_10

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1771-8_10

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1770-1

  • Online ISBN: 978-81-322-1771-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics