Analysis of Various Image Steganography Techniques Based Upon PSNR Metric

Every common person uses internet directly or indirectly in some spheres of his life. They mainly use the internet for information sharing. Also, information sharing has the primary importance in the field of Military Services, Medical Services, Mobile Services, and Investigation Agencies etc. The main hurdle in the path of information sharing is the security of information. The information security can be achieved by Cryptography and Steganography. But now days, Steganography is the most burnt area. There are lot of research is going on steganography. In this paper, we analyze various image steganography techniques by using peak signal to noise ratio (PSNR) Metric. After analyzing the techniques, we found that 6th, 7th and 8th Bit Method provides highest PSNR values and LSB Method provides lowest PSNR values. Keywords— Steganography, cryptography, LSB, GLM, parity

[1]  Jan Biemond,et al.  Image and Video Databases: Restoration, Watermarking and Retrieval , 2000 .

[2]  Chin-Chen Chang,et al.  Remarks on fingerprint-based remote user authentication scheme using smart cards , 2004, OPSR.

[3]  Rahul Rishi,et al.  retrieval in case intruder changes the least significant bit of image pixels , 2010 .

[4]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[5]  N. D. Memon,et al.  Steganography capacity: a steganalysis perspective , 2003, IS&T/SPIE Electronic Imaging.

[6]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[7]  Adnan Abdul-Aziz Gutub,et al.  RGB Intensity Based Variable-Bits Image Steganography , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[8]  Jen-Bang Feng,et al.  A new multi-secret images sharing scheme using Largrange's interpolation , 2005, J. Syst. Softw..

[9]  S.K. Pal,et al.  Image steganography for wireless networks using the Hadamard transform , 2004, 2004 International Conference on Signal Processing and Communications, 2004. SPCOM '04..

[10]  Yiwei Wang,et al.  A Watermarking Algorithm for Fingerprinting Intelligence Images , 2001 .

[11]  Rahul Rishi,et al.  A New Steganography Method for Gray Level Images using Parity Checker , 2010 .

[12]  Shelby Pereira,et al.  Secure robust digital image watermark , 1998, Other Conferences.

[13]  E. Chang,et al.  Grey level modification steganography for secret communication , 2004, 2nd IEEE International Conference on Industrial Informatics, 2004. INDIN '04. 2004.

[14]  Stéphane Roche,et al.  A survey of current watermarking techniques , 1999 .

[15]  Ingo Stierand,et al.  Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best , 1996, Information Hiding.

[16]  Edward J. Delp,et al.  A Review of Data Hiding in Digital Images , 1999, PICS.

[17]  John P. Oakley,et al.  Storage and Retrieval for Image and Video Databases , 1993 .