Abstract
A hybrid image steganographic approach has been proposed in this paper to enlarge the data hiding capability of cover image as well as to improve the quality of stego image. This research is a hybrid combination of cryptography, steganography and data compression. The basic building block of this approach is Wu and Tsai’s method (PVD), LZW compression scheme, Vernam cipher and gray code. In this approach, chunks of the secret data are embedded by altering the pixel values of the consecutive pixels in the cover image according to their hiding capacity. The hiding capacity of the two consecutive pixels depends on their difference value, which is calculated by pixel-value differencing technique (PVD). Two layer data hiding is the key feature of this approach that’s why it is called a Bi-Directional approach. Two layer data hiding approach improves the data hiding capacity and quality of stego image as well. In second layer data hiding we consider left pixel of the pixel pair as the right pixel and vive-versa. It improves the quality of stego image. In this technique stego image is totally indistinguishable from the original image by the human eye. It is also secure against the RS detection attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Feng, J.B., Lin, I.C., Tsai, C.S., Chu, Y.P.: Reversible watermarking: current status and key issues. Int. J. of Network Secur. 2, 161–170 (2006)
Salomon, D.: Data Compression: The Complete Reference, 4th edn. Springer, London (2007)
Liao, Z., Huang, Y., Li, C.: Research on data hiding capacity. Int. J. Network Secur. 5, 140–144 (2007)
Harmsen, J., Pearlman, W.: Steganalysis of additivenoise modelable information hiding. In: Proceedings of SPIE Security Watermarking Multimedia Contents, vol. 5020, pp. 131–142, (2003)
Sharp, T.: An implementation of key-based digital signal steganography. In: Proceedings of Information Hiding Workshop, vol. 2137, pp. 13–26. Springer LNCS (2001)
Ahirwal, R.R., Ahirwal, D., Jain, Y. K.: A high capacitive and confidentiality based image steganography using private stego-key. In: Proceedings of the International Conference on Information Science and Applications, Chennai (2010)
Hivrale, S.P., Sawarkar, S.D., Bhosale, V., Koregaonkar, S.: Statistical Method for Hiding Detection in LSB of Digital Images: An Overview. In: Proceedings of World Academy of Science, Engineering and Technology, vol. 32, pp. 2070–3740. August 2008
Zhang, H., Geng, G., Xiong, C.: Image steganography using pixel-value differencing. Second International Symposium on Electronic Commerce and Security, 2009
Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recogn. Lett. 24, 1613–1626 (2003)
Wang, C.-M., Wu, N.-I., Tsai, C.-S., Hwang, M.-S.: A high quality steganographic method with pixel-value differencing and modulus function. J. Syst. Softw. 81(1), 150–158. ELSEVIER. January (2008)
Sherly, A.P., Amritha, P.P.: A compressed video steganography using TPVD. Int. J. Database Manage. Syst. (IJDMS) 2(3), 67–80 (2010)
Zaker, N., Hamzeh, A., Katebi, S.D., Samavi, S.: Improving security of pixel value differencing steganographic method. In: IEEE 978-1-4244-6273-5/09/$26.00 ©2009 (2009)
Lempel–Ziv–Markov chain algorithm “wikipedia.org”. http://en.wikipedia.org/wiki/Lempel-Ziv-Markov_chain_algorithm
Lempel Ziv Markov algorithm and 7-Zip, “blogs.oracle.com”. https://blogs.oracle.com/clayb/entry/lempel_ziv_markov_algorithm_and
The vernam cipher, “cryptomuseum.com”. http://www.cryptomuseum.com/crypto/vernam.htm
Das, D., Nath, J., Mukherjee, M., Chaudhury, N., Nath, A.: An integrated symmetric key cryptography algorithm using generalized vernam cipher method and DJSA method: DJMNA symmetric key algorithm. In: Proceedings of IEEE International conference: World Congress WICT-2011 held at Mumbai University, 2011
Doran, R.W.: The gray code1. J. Univers. Comput. Sci. 13(11), 1573–1597 (2007)
Miroslav G, Jessica J. F., Rui D.: Distortion-free data embedding for images.In: Proceedings of 4th International Workshop, 27–41, (2001) Print ISBN 978-3-540-42733-9
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Himakshi, Verma, H.K., Singh, R.K., Singh, C.K. (2014). Bi-directional Pixel-Value Differencing Approach for Steganography. In: Pant, M., Deep, K., Nagar, A., Bansal, J. (eds) Proceedings of the Third International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 258. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1771-8_10
Download citation
DOI: https://doi.org/10.1007/978-81-322-1771-8_10
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1770-1
Online ISBN: 978-81-322-1771-8
eBook Packages: EngineeringEngineering (R0)