An adaptive color image steganography method using adjacent pixel value differencing and LSB substitution technique

Abstract Steganography is a data-concealing technique that provides a covert communication. This paper proposes a spatial domain color steganography method that uses a neighboring pixel-pair differencing concept to enhance the embedding capacity. The proposed method considers the distortion tolerance capacity of each color plane and the difference value between two neighboring pixels while deciding the number of bits that can be concealed in that pixel-pair. Each plane is divided into some disjoint blocks of size 3 × 3 pixels. The method forms eight pairs of pixels in one block using the eight-neighboring pixel concept, which enables the method to utilize all the edge pixels in all probable directions. It also uses the XOR encoding technique before the embedding process. This step provides an additional layer of security to the secret information. The simulation results show that the proposed method is able to achieve a high embedding capacity with good visual quality as per the calculation of imperceptibility metrics. The robustness of the method is tested by RS steganalysis and pixel difference histogram analysis. Further, a comparison between the proposed method and the existing methods on the basis of embedding capacity and stego image quality is shown.

[1]  Karim Faez,et al.  New adaptive steganographic method using least significant- bit substitution and pixel-value differencing , 2012 .

[2]  Manashee Kalita,et al.  A novel steganographic method using 8-neighboring PVD (8nPVD) and LSB substitution , 2016, 2016 International Conference on Systems, Signals and Image Processing (IWSSIP).

[3]  Gandharba Swain,et al.  Performance evaluation parameters of image steganography techniques , 2016, 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS).

[4]  M. Hwang,et al.  Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .

[5]  Cheng-Hsing Yang,et al.  Inverted pattern approach to improve image quality of information hiding by LSB substitution , 2008, Pattern Recognit..

[6]  Ming Yang,et al.  Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy , 2009, Int. J. Inf. Secur. Priv..

[7]  Shahrokh Ghaemmaghami,et al.  Colour image steganography method based on sparse representation , 2015, IET Image Process..

[8]  Cheng-Hsing Yang,et al.  Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.

[9]  D. M. Hutton,et al.  Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia , 2005 .

[10]  Gandharba Swain,et al.  Digital Image Steganography Using Variable Length Group Of Bits Substitution , 2016 .

[11]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[12]  Gandharba Swain,et al.  A Steganographic Method Combining LSB Substitution and PVD in a Block , 2016 .

[13]  Gerhard F. Strasser Review of Versteckte Botschaften. Die faszinierende Geschichte der Steganografie (Hidden Messages. The Fascinating Story of Steganography) , 2010, Cryptologia.

[14]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[15]  Xinpeng Zhang,et al.  Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security , 2004, Pattern Recognit. Lett..

[16]  Gandharba Swain,et al.  Digital Image Steganography Using Bit Flipping , 2018 .

[17]  Chin-Feng Lee,et al.  A novel data hiding scheme based on modulus function , 2010, J. Syst. Softw..

[18]  Gandharba Swain,et al.  Adaptive pixel value differencing steganography using both vertical and horizontal edges , 2016, Multimedia Tools and Applications.

[19]  Vinay Kumar,et al.  Data Hiding Method Based on Inter-Block Difference in Eight Queens Solutions and LSB Substitution , 2014, Int. J. Inf. Secur. Priv..

[20]  Wei Gong,et al.  An improved method for LSB based color image steganography combined with cryptography , 2016, 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS).

[21]  Fabien A. P. Petitcolas,et al.  Fair benchmark for image watermarking systems , 1999, Electronic Imaging.

[22]  Gandharba Swain,et al.  Adaptive and Non-adaptive PVD Steganography Using Overlapped Pixel Blocks , 2018 .

[23]  J. K. Mandal,et al.  Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain , 2012 .

[24]  Ki-Hyun Jung,et al.  Three-Directional Data Hiding Method for Digital Images , 2014, Cryptologia.

[25]  Claudia Feregrino Uribe,et al.  On the Implementation of a Hardware Architecture for an Audio Data Hiding System , 2011, J. Signal Process. Syst..

[26]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[27]  Jessica J. Fridrich,et al.  Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.

[28]  Mehdi Hussain,et al.  Recursive Information Hiding Scheme Through LSB, PVD Shift, and MPE , 2018 .

[29]  Mauro Barni,et al.  MPSteg-Color: Data Hiding Through Redundant Basis Decomposition , 2009, IEEE Transactions on Information Forensics and Security.

[30]  Gandharba Swain,et al.  Information Hiding Using Group of Bits Substitution , 2017 .

[31]  Gandharba Swain,et al.  Very High Capacity Image Steganography Technique Using Quotient Value Differencing and LSB Substitution , 2018, Arabian Journal for Science and Engineering.

[32]  Sunil R. Hirekhan,et al.  Implementation of colour image steganography using LSB and edge detection technique: A LabVIEW approach , 2016, 2016 International Conference on Communication and Signal Processing (ICCSP).

[33]  M. C. Hanumantharaju,et al.  Design and development of new reconfigurable architectures for LSB/multi-bit image steganography system , 2016, Multimedia Tools and Applications.

[34]  Gandharba Swain,et al.  Digital Image Steganography based on Seven Way Pixel Value Differencing , 2016 .

[35]  R. F. Brown,et al.  PERFORMANCE EVALUATION , 2019, ISO 22301:2019 and business continuity management – Understand how to plan, implement and enhance a business continuity management system (BCMS).

[36]  Gandharba Swain,et al.  An Improved Data Hiding Technique Using Bit Differencing and LSB Matching , 2022 .