1. bookVolumen 22 (2022): Edición 2 (June 2022)
Detalles de la revista
License
Formato
Revista
eISSN
1314-4081
Primera edición
13 Mar 2012
Calendario de la edición
4 veces al año
Idiomas
Inglés
access type Acceso abierto

Optimization of Cross Diagonal Pixel Value Differencing and Modulus Function Steganography Using Edge Area Block Patterns

Publicado en línea: 23 Jun 2022
Volumen & Edición: Volumen 22 (2022) - Edición 2 (June 2022)
Páginas: 145 - 159
Recibido: 23 Nov 2021
Aceptado: 18 Apr 2022
Detalles de la revista
License
Formato
Revista
eISSN
1314-4081
Primera edición
13 Mar 2012
Calendario de la edición
4 veces al año
Idiomas
Inglés
Abstract

The existence of a trade-off between embedding capacity and imperceptibility is a challenge to improve the quality of steganographic images. This research proposes to cross diagonal embedding Pixel Value Differencing (PVD) and Modulus Function (MF) techniques using edge area patterns to improve embedding capacity and imperceptibility simultaneously. At the same time still, maintain a good quality of security. By implementing them into 14 public datasets, the proposed techniques are proven to increase both capacity and imperceptibility. The cross diagonal embedding PVD is responsible for increasing the embedding capacity reaching an average value of 3.18 bits per pixel (bpp), and at the same time, the implementation of edge area block patterns-based embedding is a solution of improving imperceptibility toward an average value of PSNR above 40 dB and that of SSIM above 0.98. Aside from its success in increasing the embedding capacity and the imperceptibility, the proposed techniques remain resistant to RS attacks.

Keywords

1. Darwis, D., A. Junaidi, D. A. Shofiana. Wamiliana: A New Digital Image Steganography Based on Center Embedded Pixel Positioning. – Cybernetics and Information Technologies, Vol. 21, 2021, No 2, pp. 89-104.10.2478/cait-2021-0021 Search in Google Scholar

2. Cheddad, A., J. Condell, K. Curran, P. Mc Kevitt. Digital Image Steganography: Survey and Analysis of Current Methods. – Signal Processing, Elsevier, 2010.10.1016/j.sigpro.2009.08.010 Search in Google Scholar

3. Hussain, M., A. W. A. Wahab, Y. I. B. Idris, A. T. S. Ho, K.-H. Jung. Image Steganography in Spatial Domain: A Survey. – Signal Process. Image Commun., Vol. 65, 2018, pp. 46-66. https://doi.org/10.1016/j.image.2018.03.01210.1016/j.image.2018.03.012 Search in Google Scholar

4. Kadhim, I. J., P. Premaratne, P. J. Vial, B. Halloran. Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research. – Neurocomputing, Vol. 335, 2019, pp. 299-326. https://doi.org/10.1016/j.neucom.2018.06.07510.1016/j.neucom.2018.06.075 Search in Google Scholar

5. Rustad, S., D. R. I. M. Setiadi, A. Syukur, P. N. Andono. Inverted LSB Image Steganography Using Adaptive Pattern to Improve Imperceptibility. – J. King Saud Univ., Comput. Inf. Sci., 2021. https://doi.org/10.1016/j.jksuci.2020.12.01710.1016/j.jksuci.2020.12.017 Search in Google Scholar

6. Setiadi, D. R. I. M. Improved Payload Capacity in LSB Image Steganography Uses Dilated Hybrid Edge Detection. – J. King Saud Univ., Comput. Inf. Sci., 2019. https://doi.org/10.1016/j.jksuci.2019.12.00710.1016/j.jksuci.2019.12.007 Search in Google Scholar

7. Wang, Y., M. Tang, Z. Wang. High-Capacity Adaptive Steganography Based on LSB and Hamming Code. – Optik (Stuttg), Vol. 213, 2020, 164685. https://doi.org/10.1016/j.ijleo.2020.16468510.1016/j.ijleo.2020.164685 Search in Google Scholar

8. Pradhan, A., K. R. Sekhar, G. Swain. Adaptive PVD Steganography Using Horizontal, Vertical, and Diagonal Edges in Six-Pixel Blocks. – Secur. Commun. Networks., Vol. 2017, 2017. https://doi.org/10.1155/2017/192461810.1155/2017/1924618 Search in Google Scholar

9. Setiadi, D. R. I. M., J. Jumanto. An Enhanced LSB-Image Steganography Using the Hybrid Canny-Sobel Edge Detection. – Cybernetics and Information Technologies, Vol. 18, 2018, No 2, pp. 74-88.10.2478/cait-2018-0029 Search in Google Scholar

10. Bai, J., C.-C. Chang, T.-S. Nguyen, C. Zhu, Y. Liu. A High Payload Steganographic Algorithm Based on Edge Detection. – Displays, Vol. 46, 2017, pp. 42-51.10.1016/j.displa.2016.12.004 Search in Google Scholar

11. Mukherjee, S., G. Sanyal. Edge Based Image Steganography with Variable Threshold. – Multimed. Tools Appl., Vol. 78, 2019, pp. 16363-16388.10.1007/s11042-018-6975-4 Search in Google Scholar

12. Nashat, D., L. Mamdouh. An Efficient Steganographic Technique for Hiding Data. – J. Egypt. Math. Soc., Vol. 27, 2019, 57.10.1186/s42787-019-0061-6 Search in Google Scholar

13. Sahu, A. K., G. Swain, E. S. Babu. Digital Image Steganography Using Bit Flipping. – Cybernetics and Information Technologies, Vol. 18, 2018, No 1, pp. 69-80.10.2478/cait-2018-0006 Search in Google Scholar

14. Muhammad, K., J. Ahmad, N. U. Rehman, Z. Jan, M. Sajjad. CISSKA-LSB: Color Image Steganography Using Stego Key-Directed Adaptive LSB Substitution Method. – Multimed. Tools Appl., Vol. 76, 2017, pp. 8597-8626.10.1007/s11042-016-3383-5 Search in Google Scholar

15. Hameed, M. A., M. Hassaballah, S. Aly, A. I. Awad. An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and PVD-LSB Techniques. – IEEE Access., Vol. 7, 2019, pp. 185189-185204.10.1109/ACCESS.2019.2960254 Search in Google Scholar

16. Pak, C., J. Kim, K. An, C. Kim, K. Kim, C. Pak. A Novel Color Image LSB Steganography Using Improved 1D Chaotic Map. Multimed. – Tools Appl., Vol. 79, 2020, pp. 1409-1425.10.1007/s11042-019-08103-0 Search in Google Scholar

17. Sharafi, J., Y. Khedmati, M. M. Shabani. Image Steganography Based on a New Hybrid Chaos Map and Discrete Transforms. – Optik, Vol. 226, 2021, 165492. https://doi.org/10.1016/j.ijleo.2020.16549210.1016/j.ijleo.2020.165492 Search in Google Scholar

18. Sari, C. A., G. Ardiansyah, D. R. I. M. Setiadi, E. H. Rachmawanto. An Improved Security and Message Capacity Using AES and Huffman Coding on Image Steganography. – TELKOMNIKA (Telecommunication Comput. Electron. Control), Vol. 17, 2018, pp. 2400-240910.12928/telkomnika.v17i5.9570 Search in Google Scholar

19. Astuti, Y. P., D. R. I. M. Setiadi, E. H. Rachmawanto, C. A. Sari. Simple and Secure Image Steganography Using LSB and Triple XOR Operation on MSB. – In: Proc. of International Conference on Information and Communications Technology, ICOIACT’18, Yogyakarta, 2018.10.1109/ICOIACT.2018.8350661 Search in Google Scholar

20. Setiadi, D. R. I. M. PSNR vs. SSIM: Imperceptibility Quality Assessment for Image Steganography. Multimed. – Tools Appl., Vol. 80, 2021, pp. 8423-8444.10.1007/s11042-020-10035-z Search in Google Scholar

21. Swain, G. Digital Image Steganography Using Eight-Directional PVD against RS Analysis and PDH Analysis. – Adv. Multimed., Vol. 2018, 2018.10.1155/2018/4847098 Search in Google Scholar

22. Swain, G. Adaptive Pixel Value Differencing Steganography Using Both Vertical and Horizontal Edges. – Multimed. Tools Appl., Vol. 75, 2016, pp. 13541-13556. https://doi.org/10.1007/s11042-015-2937-210.1007/s11042-015-2937-2 Search in Google Scholar

23. Abdel Hameed, M., S. Aly, M. Hassaballah. An Efficient Data Hiding Method Based on Adaptive Directional Pixel Value Differencing (ADPVD). – Multimed. Tools Appl., Vol. 77, 2018, pp. 14705-14723. https://doi.org/10.1007/s11042-017-5056-410.1007/s11042-017-5056-4 Search in Google Scholar

24. Sahu, A. K., G. Swain. An Optimal Information Hiding Approach Based on Pixel Value Differencing and Modulus Function. – Wirel. Pers. Commun., Vol. 108, 2019, pp. 159-174. https://doi.org/10.1007/s11277-019-06393-z10.1007/s11277-019-06393-z Search in Google Scholar

25. Wu, D.-C., W.-H. Tsai. A Steganographic Method for Images by Pixel-Value Differencing. – Pattern Recognit. Lett., Vol. 24, 2003, pp. 1613-1626. https://doi.org/10.1016/S0167-8655(02)00402-610.1016/S0167-8655(02)00402-6 Search in Google Scholar

26. Swain, G. Two New Steganography Techniques Based on Quotient Value Differencing with Addition-Subtraction Logic and PVD with Modulus Function. – Optik (Stuttg)., Vol. 180, 2019, pp. 807-823. https://doi.org/10.1016/j.ijleo.2018.11.01510.1016/j.ijleo.2018.11.015 Search in Google Scholar

27. Lin, W. B., T. H. Lai, C. L. Chou. Chi-Square-Based Steganalysis Method against Modified Pixel-Value Differencing Steganography. – Arab. J. Sci. Eng., Vol. 469. 2021, No 46, pp. 8525-8533. https://doi.org/10.1007/S13369-021-05554-210.1007/s13369-021-05554-2 Search in Google Scholar

28. Shen, S., L. Huang, Q. Tian. A Novel Data Hiding for Color Images Based on Pixel Value Difference and Modulus Function. – Multimed. Tools Appl., Vol. 74, 2015, pp. 707-728. https://doi.org/10.1007/s11042-014-2016-010.1007/s11042-014-2016-0 Search in Google Scholar

29. Li, Z., Y. He. Steganography with Pixel-Value Differencing and Modulus Function Based on PSO. – J. Inf. Secur. Appl., Vol. 43, 2018, pp. 47-52. https://doi.org/10.1016/j.jisa.2018.10.00610.1016/j.jisa.2018.10.006 Search in Google Scholar

30. Wang, Z., J. Zhang, X. Liao, Q. Wen. Data Embedding Based on Pixel Value Differencing and Modulus Function Using Indeterminate Equation. – J. China Univ. Posts Telecommun., Vol. 22, 2015, pp. 95-100. https://doi.org/10.1016/S1005-8885(15)60631-810.1016/S1005-8885(15)60631-8 Search in Google Scholar

31. Jung, K. H. High-Capacity Data Hiding Scheme Based on Exploiting Modification Direction and Modulo Operation. – Adv. Sci. Lett., Vol. 22, 2016, pp. 2471-2474. https://doi.org/10.1166/asl.2016.780510.1166/asl.2016.7805 Search in Google Scholar

32. Gaurav, K., U. Ghanekar. Image Steganography Based on Canny Edge Detection, Dilation Operator and Hybrid Coding. – J. Inf. Secur. Appl., Vol. 41, 2018, pp. 41-51. https://doi.org/10.1016/j.jisa.2018.05.00110.1016/j.jisa.2018.05.001 Search in Google Scholar

33. Chen, W.-J., C.-C. Chang, T. H. N. Le. High Payload Steganography Mechanism Using Hybrid Edge Detector. – Expert Syst. Appl., Vol. 37, 2010, pp. 3292-3301. https://doi.org/10.1016/j.eswa.2009.09.05010.1016/j.eswa.2009.09.050 Search in Google Scholar

34. Al-Dmour, H., A. Al-Ani. A Steganography Embedding Method Based on Edge Identification and XOR Coding. – Expert Syst. Appl., Vol. 46, 2016, pp. 293-306. https://doi.org/10.1016/j.eswa.2015.10.02410.1016/j.eswa.2015.10.024 Search in Google Scholar

35. Ioannidou, A., S. T. Halkidis, G. Stephanides. A Novel Technique for Image Steganography Based on a High Payload Method and Edge Detection. – Expert Syst. Appl., Vol. 39, 2012, pp. 11517-11524. https://doi.org/10.1016/j.eswa.2012.02.10610.1016/j.eswa.2012.02.106 Search in Google Scholar

36. Kumar, R., D. S. Kim, K. H. Jung. Enhanced AMBTC Based Data Hiding Method Using Hamming Distance and Pixel Value Differencing. – J. Inf. Secur. Appl., Vol. 47, 2019, pp. 94-103. https://doi.org/10.1016/j.jisa.2019.04.00710.1016/j.jisa.2019.04.007 Search in Google Scholar

37. Fridrich, J., M. Goljan, R. Du. Detecting LSB Steganography in Color and Gray-Scale Images. – IEEE Multimed., Vol. 8, 2001, pp. 22-28. https://doi.org/10.1109/93.95909710.1109/93.959097 Search in Google Scholar

Artículos recomendados de Trend MD

Planifique su conferencia remota con Sciendo