Secret communication via image hiding in image by pixel value differencing

Steganographic method for embedding secret messages into a gray-valued cover image is proposed. Cover image is partitioned into non-overlapping blocks of two consecutive pixels. Difference between the two consecutive pixel values is calculated and classified into number of ranges. Range intervals are selected according to the characteristics of human vision's sensitivity to gray value variations from smoothness to contrast. The pixels in edged areas can tolerate larger changes of pixel values than those in the smooth areas. So, in the proposed method we can embed more data in edged areas than in the smooth areas. The difference value then is replaced by a new value to embed the value of a sub-stream of the secret message. The number of bits which can be embedded in a pixel pair is decided by the width of the range that the difference value belongs to.

[1]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[2]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[3]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[4]  Jonathan Watkins Steganography - Messages Hidden in Bits , 2001 .

[5]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[6]  Gary C. Kessler,et al.  An Overview of Steganography for the Computer Forensics Examiner , 2004 .

[7]  Merrill Warkentin,et al.  Steganography and Steganalysis , 2006 .

[8]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[9]  Edward J. Delp,et al.  A Review of Data Hiding in Digital Images , 1999, PICS.

[10]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[11]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .

[12]  Ingemar J. Cox,et al.  Watermarking applications and their properties , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[13]  Kevin Curran,et al.  An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.

[14]  W. Tsai,et al.  Spatial-domain image hiding using image differencing , 2000 .