Block-Based Steganographic Algorithm Using Modulus Function and Pixel-Value Differencing

The main purpose in developing the steganographic algorithms lies in achieving most of the steganographic objectives which comprise the embedding capacity, imperceptibility, security, robustness and complexity. In this paper, we propose a high quality steganographic algorithm using new block structure which makes a good use of both modulus function and pixel-value differencing, namely, MF-PVD. We have made many experiments with various test images from several galleries, such as USC-SIPI and UWATERLOO-LINK. The performance of our proposed algorithm is verified using three different performance metrics which include peak signal-to-noise ratio (PSNR), structural similarity index measure (SSIM), and embedding capacity (EC). Experimental results and comparisons with six pertinent state-of-art algorithms are given to prove the validation and efficiency of the proposed algorithm.

[1]  Khalid A. Darabkh Queuing Analysis and Simulation of Wireless Access and End Point Systems using Fano Decoding , 2010, J. Commun..

[2]  Khalid A. Darabkh,et al.  A generic buffer occupancy expression for stop-and-wait hybrid automatic repeat request protocol over unstable channels , 2016, Telecommun. Syst..

[3]  Khalid A. Darabkh,et al.  Performance Evaluation of Sequential Decoding System for UDP-Based Systems for Wireless Multimedia Networks , 2006, ICWN.

[4]  Karim Faez,et al.  New adaptive steganographic method using least significant- bit substitution and pixel-value differencing , 2012 .

[5]  Khalid A. Darabkh,et al.  Stationary queue-size distribution for variable complexity sequential decoders with large timeout , 2006, ACM-SE 44.

[6]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .

[7]  Arvind Kumar,et al.  Steganography- A Data Hiding Technique , 2010 .

[8]  Khalid A. Darabkh,et al.  An improved reversible data hiding algorithm based on modification of prediction errors , 2014, Digital Image Processing.

[9]  El-Sayed M. El-Alfy,et al.  High-Capacity Image Steganography Based on Overlapped Pixel Differences and Modulus Function , 2012, NDT.

[10]  Khalid A. Darabkh,et al.  A New Image Steganographic Approach for Secure Communication Based on LSB Replacement Method , 2015, Inf. Technol. Control..

[11]  Edward J. Delp,et al.  A Review of Data Hiding in Digital Images , 1999, PICS.

[12]  Khalid A. Darabkh Fast and upper bounded Fano decoding algorithm: queuing analysis , 2017, Trans. Emerg. Telecommun. Technol..

[13]  Tung-Shou Chen,et al.  A Novel Data Embedding Method Using Adaptive Pixel Pair Matching , 2012, IEEE Transactions on Information Forensics and Security.

[14]  Kamaldeep Joshi,et al.  A Review on Different Image Steganography Techniques , 2016 .

[15]  Abdelrahman Desoky Noiseless Steganography: The Key to Covert Communications , 2012 .

[16]  Khalid A. Darabkh,et al.  Markov-Based Distributed Approach for Mitigating Self-Coexistence Problem in IEEE 802.22 WRANs , 2014, Comput. J..

[17]  Khalid A. Darabkh,et al.  LEACH enhancements for wireless sensor networks based on energy model , 2014, 2014 IEEE 11th International Multi-Conference on Systems, Signals & Devices (SSD14).

[18]  Khalid A. Darabkh,et al.  Efficient Improvements on the BDND Filtering Algorithm for the Removal of High-Density Impulse Noise , 2013, IEEE Transactions on Image Processing.

[19]  Nasir D. Memon,et al.  Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.

[20]  Khalid A. Darabkh,et al.  A Rule-Based Fuzzy Inference System for Adaptive Image Contrast Enhancement , 2012, Comput. J..

[21]  Gheith A. Abandah,et al.  An improved queuing model for packet retransmission policy and variable latency decoders , 2012, IET Commun..

[22]  Jeanne Chen,et al.  A PVD-based data hiding method with histogram preserving using pixel pair matching , 2014, Signal Process. Image Commun..

[23]  Khalid A. Darabkh,et al.  N-BEB: New backoff algorithm for IEEE 802.11 MAC protocol , 2014, 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[24]  Khalid A. Darabkh,et al.  TCP Traffic Control Evaluation and Reduction over Wireless Networks Using Parallel Sequential Decoding Mechanism , 2007, EURASIP J. Wirel. Commun. Netw..

[25]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[26]  Khalid A. Darabkh,et al.  Efficient Reversible Data Hiding Using Multiple Predictors , 2016, Comput. J..

[27]  Khalid A. Darabkh A New Steganographic Algorithm Based on Multi Directional PVD and Modified LSB , 2017, Inf. Technol. Control..

[28]  Guillermo Sapiro,et al.  Is image steganography natural? , 2005, IEEE Transactions on Image Processing.

[29]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[30]  Khalid A. Darabkh,et al.  Efficient DTW-Based Speech Recognition System for Isolated Words of Arabic Language , 2013 .

[31]  Khalid A. Darabkh,et al.  Improved clustering algorithms for target tracking in wireless sensor networks , 2017, The Journal of Supercomputing.

[32]  Khalid A. Darabkh,et al.  New video discarding policies for improving UDP performance over wired/wireless networks , 2015, Int. J. Netw. Manag..

[33]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[34]  Khalid A. Darabkh Imperceptible and Robust DWT-SVD-Based Digital Audio Watermarking Algorithm , 2014 .

[35]  Khalid A. Darabkh Evaluation of channel adaptive access point systemwith Fano decoding , 2011, Int. J. Comput. Math..

[36]  Suvamoy Changder,et al.  A secure image steganography technique with moderately higher significant bit embedding , 2014, 2014 International Conference on Computer Communication and Informatics.

[37]  Khalid A. Darabkh,et al.  SARDH: A novel sharpening-aware reversible data hiding algorithm , 2016, J. Vis. Commun. Image Represent..

[38]  I. Jafar Image Contrast Enhancement Based on Equalization of Edge Histograms , 2022 .

[39]  Khalid A. Darabkh,et al.  An improved image least significant bit replacement method , 2014, 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[40]  Khalid A. Darabkh,et al.  Efficient PFD-Based Networking and Buffering Models for Improving Video Quality over Congested Links , 2014, Wirel. Pers. Commun..

[41]  Kefa Rabah,et al.  Steganography-The Art of Hiding Data , 2004 .

[42]  Chin-Feng Lee,et al.  A novel data hiding scheme based on modulus function , 2010, J. Syst. Softw..

[43]  Khalid A. Darabkh,et al.  Intelligent and Selective Video Frames Discarding Policies for Improving Video Quality over Wired/Wireless Networks , 2013, 2013 IEEE International Symposium on Multimedia.

[44]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[45]  Khalid A. Darabkh,et al.  Dynamic resource allocation using load estimation in distributed cognitive radio systems , 2015 .

[46]  Khalid A. Darabkh,et al.  Improving UDP performance using intermediate QoD-aware hop system for wired/wireless multimedia communication systems , 2011, Int. J. Netw. Manag..

[47]  Min-Shiang Hwang,et al.  A high quality steganographic method with pixel-value differencing and modulus function , 2008, J. Syst. Softw..

[48]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[49]  Khalid A. Darabkh,et al.  An efficient reversible data hiding algorithm using two steganographic images , 2016, Signal Process..

[50]  Khalid A. Darabkh,et al.  Packet Recycling and Delayed ACK for Improving the Performance of TCP over MANETs , 2014, Wirel. Pers. Commun..

[51]  Khalid A. Darabkh,et al.  A modified unsharp-masking technique for image contrast enhancement , 2011, Eighth International Multi-Conference on Systems, Signals & Devices.

[52]  Mehrdad Jalali,et al.  Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function , 2014, Egyptian Informatics Journal.

[53]  Khalid A. Darabkh,et al.  Incorporating automatic repeat request and thresholds with variable complexity decoding algorithms over wireless networks: queuing analysis , 2011, IET Commun..

[54]  Anuja Arora,et al.  Performance evaluation of LSB and LSD in steganography , 2014, 2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence).

[55]  Khalid A. Darabkh,et al.  Performance evaluation of multiuser diversity in multiuser two‐hop cooperative multi‐relay wireless networks using maximal ratio combining over Rayleigh fading channels , 2015, Int. J. Commun. Syst..

[56]  Heung-Kyu Lee,et al.  Improved Steganographic Method Preserving Pixel-Value Differencing Histogram with Modulus Function , 2010, EURASIP J. Adv. Signal Process..

[57]  El-Sayed M. El-Alfy,et al.  A comparative study of PVD-based schemes for data hiding in digital images , 2011, 2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA).

[58]  Chin-Chen Chang,et al.  Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing , 2006, Fundam. Informaticae.

[59]  Khalid A. Darabkh,et al.  Static Clustering for Target Tracking in Wireless Sensor Networks , 2015 .

[60]  Khalid A. Darabkh,et al.  A Yet Efficient Communication System with Hearing-Impaired People Based on Isolated Words of Arabic Language , 2013 .

[61]  Khalid A. Darabkh,et al.  A Self-Learning MAC Protocol for Energy Harvesting and Spectrum Access in Cognitive Radio Sensor Networks , 2016, J. Sensors.

[62]  Khalid A. Darabkh,et al.  Novel Protocols for Improving the Performance of ODMRP and EODMRP over Mobile Ad Hoc Networks , 2015, Int. J. Distributed Sens. Networks.

[63]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[64]  Khalid A. Darabkh,et al.  Hierarchical clustering using genetic algorithm in wireless sensor networks , 2013, 2013 36th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[65]  M. Hwang,et al.  Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .