5 research outputs found

    Adaptive PVD Steganography Using Horizontal, Vertical, and Diagonal Edges in Six-Pixel Blocks

    Get PDF
    The traditional pixel value differencing (PVD) steganographical schemes are easily detected by pixel difference histogram (PDH) analysis. This problem could be addressed by adding two tricks: (i) utilizing horizontal, vertical, and diagonal edges and (ii) using adaptive quantization ranges. This paper presents an adaptive PVD technique using 6-pixel blocks. There are two variants. The proposed adaptive PVD for 2Γ—3-pixel blocks is known as variant 1, and the proposed adaptive PVD for 3Γ—2-pixel blocks is known as variant 2. For every block in variant 1, the four corner pixels are used to hide data bits using the middle column pixels for detecting the horizontal and diagonal edges. Similarly, for every block in variant 2, the four corner pixels are used to hide data bits using the middle row pixels for detecting the vertical and diagonal edges. The quantization ranges are adaptive and are calculated using the correlation of the two middle column/row pixels with the four corner pixels. The technique performs better as compared to the existing adaptive PVD techniques by possessing higher hiding capacity and lesser distortion. Furthermore, it has been proven that the PDH steganalysis and RS steganalysis cannot detect this proposed technique

    Capacity Optimization On RGB Overlapping Block-Based Pixel Value Differencing Image Steganography With Adaptive Threshold

    Get PDF
    Pixel value differencing steganography is an image steganography that utilizes the difference of the image pixel value to embed the secret message bits. RGB overlapped block-based PVD was introduced by Prasad and Pal which uses the difference value in the pair of RGB color components of a pixel compared to using the difference value of two consecutive pixels. This approach has good performance at increasing capacity especially in images with low pixel variance values. The RGB overlapped block-based PVD algorithm uses a threshold that limits the amount of difference in the color component pairs that are allowed to embed the secret message bits. The use of a global threshold will reduce the potential for optimal capacity utilization of the container image. This study implements an adaptive threshold that uses two different types of thresholds that use the embedding bit limit and the RMSE difference of the pixels before and after the embedding process to the next pixel. This optimization is able to provide a better capacity increase with PSNR degradation from the previous algorithm which is quite low

    Multi-Stage Protection Using Pixel Selection Technique for Enhancing Steganography

    Get PDF
    Steganography and data security are extremely important for all organizations. This research introduces a novel stenographic method called multi-stage protection using the pixel selection technique (MPPST). MPPST is developed based on the features of the pixel and analysis technique to extract the pixel's characteristics and distribution of cover-image. A pixel selection technique is proposed for hiding secret messages using the feature selection method. The secret file is distributed and embedded randomly into the stego-image to make the process of the steganalysis complicated.Β  The attackers not only need to deter which pixel values have been selected to carry the secret file, they also must rearrange the correct sequence of pixels. MPPST generates a complex key that indicates where the encrypted elements of the binary sequence of a secret file are. The analysis stage undergoes four stages, which are the calculation of the peak signal-to-noise ratio, mean squared error, histogram analysis, and relative entropy. These four stages are used to demonstrate the characteristics of the cover image. To evaluate the proposed method, MPPST is compared to the standard technique of Least Significant Bit (LSB) and other algorithms from the literature. The experimental results show that MPPST outperforms other algorithms for all instances and achieves a significant security enhancement

    Using Quaternion Fourier Transform in Steganography Systems

    Get PDF
    steganography is the discipline of exchanging information messages in such way that no one, other than the intended recipient, suspects the existence of the message.Β  The transmitted message can be in textual or multimedia form (audio, image or video) and can be hidden within cover media. Moreover, the hidden message can be in either plain or cipher form. Β In steganography, the majority of hiding techniques are implemented either in spatial domain or in frequency domain of the cover media. Β Β The current contribution introduces a new a steganography technique for hiding a textual message within a cover image.Β  Β Both the message and the cover image is converted to quaternion form and then only the quaternion message is converted to the frequency domain using Quaternion Fast Fourier Discrete Transform (QFFDT) technique.Β  Simple quaternion mathematics are used to combine the message (in quaternion frequency domain) within the cover image (in quaternion form).Β  Conversely, the hidden message can be revealed at the receiver using simple quaternion mathematics in presence of the original cover image.Β  The proposed method allows hiding a huge amount of data and it is much complicated against steganalysis compared to the traditional methods. The method is assessed using the known performance metrics and the obtained results show that it is robust and more secure against steganalysis attacks without affecting the consumed bandwidth of the communication channel

    An adaptive image steganography algorithm based on the use of non-cryptographic hash functions for data extraction

    Get PDF
    РассматриваСтся Π°Π΄Π°ΠΏΡ‚ΠΈΠ²Π½Ρ‹ΠΉ Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌ стСганографичСского скрытия ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ, основанный Π½Π° ΠΈΡ‚Π΅Ρ€Π°Ρ‚ΠΈΠ²Π½ΠΎΠΌ внСсСнии ΠΌΠ°Π»ΠΎΠ·Π½Π°Ρ‡ΠΈΡ‚Π΅Π»ΡŒΠ½Ρ‹Ρ… искаТСний Π² Π±Π»ΠΎΠΊΠΈ ΠΏΠΎΠ»Π½ΠΎΡ†Π²Π΅Ρ‚Π½Ρ‹Ρ… ΠΈΠ·ΠΎΠ±Ρ€Π°ΠΆΠ΅Π½ΠΈΠΉ-ΠΊΠΎΠ½Ρ‚Π΅ΠΉΠ½Π΅Ρ€ΠΎΠ² ΠΈ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΡŽΡ‰ΠΈΠΉ Π±Ρ‹ΡΡ‚Ρ€ΠΎΠ΄Π΅ΠΉΡΡ‚Π²ΡƒΡŽΡ‰ΠΈΠ΅ нСкриптографичСскиС Ρ…Π΅Ρˆ-Ρ„ΡƒΠ½ΠΊΡ†ΠΈΠΈ для ΠΏΠΎΡΠ»Π΅Π΄ΡƒΡŽΡ‰Π΅Π³ΠΎ извлСчСния скрытых Π΄Π°Π½Π½Ρ‹Ρ…. ΠžΡΠΎΠ±Π΅Π½Π½ΠΎΡΡ‚ΡŒΡŽ Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΠ° являСтся модификация минимального числа элСмСнтов ΠΊΠΎΠ½Ρ‚Π΅ΠΉΠ½Π΅Ρ€Π° ΠΏΠΎ ΡΡ€Π°Π²Π½Π΅Π½ΠΈΡŽ с Π΄Π»ΠΈΠ½ΠΎΠΉ скрываСмых Π² Π½Π΅Π³ΠΎ Ρ„Ρ€Π°Π³ΠΌΠ΅Π½Ρ‚ΠΎΠ² сообщСний, Ρ‡Ρ‚ΠΎ позволяСт ΡƒΠ²Π΅Π»ΠΈΡ‡ΠΈΡ‚ΡŒ ΠΏΠΎΠΊΠ°Π·Π°Ρ‚Π΅Π»ΠΈ скрытой пропускной способности ΠΈ ΡΠ½ΠΈΠ·ΠΈΡ‚ΡŒ Π²ΠΈΠ·ΡƒΠ°Π»ΡŒΠ½ΡƒΡŽ ΠΈ ΡΡ‚Π°Ρ‚ΠΈΡΡ‚ΠΈΡ‡Π΅ΡΠΊΡƒΡŽ Π·Π°ΠΌΠ΅Ρ‚Π½ΠΎΡΡ‚ΡŒ скрытых Π΄Π°Π½Π½Ρ‹Ρ…. ΠŸΡ€ΠΎΠ²ΠΎΠ΄ΠΈΡ‚ΡΡ сравнСниС Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΠ° с соврСмСнными Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΠ°ΠΌΠΈ Π°Π΄Π°ΠΏΡ‚ΠΈΠ²Π½ΠΎΠ³ΠΎ пространствСнного стСгоскрытия Π² части ΠΎΡ†Π΅Π½ΠΊΠΈ уровня ΠΈΡΠΊΠ°ΠΆΠ°ΡŽΡ‰ΠΈΡ… ΠΈΠ·ΠΌΠ΅Π½Π΅Π½ΠΈΠΉ ΠΊΠΎΠ½Ρ‚Π΅ΠΉΠ½Π΅Ρ€ΠΎΠ². РассматриваСтся Π²Π°Ρ€ΠΈΠ°Π½Ρ‚ ΠΏΠΎΠ²Ρ‹ΡˆΠ΅Π½ΠΈΡ пропускной способности Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΠ° Π·Π° счёт ΠΌΡƒΠ»ΡŒΡ‚ΠΈΠΏΠ»Π΅ΠΊΡΠΈΡ€ΠΎΠ²Π°Π½ΠΈΡ скрытых ΠΊΠ°Π½Π°Π»ΠΎΠ², ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΡŽΡ‰ΠΈΡ… ΠΎΠ±Ρ‰Π΅Π΅ подмноТСство элСмСнтов ΠΊΠΎΠ½Ρ‚Π΅ΠΉΠ½Π΅Ρ€Π° ΠΏΡ€ΠΈ встраивании Π² Π½ΠΈΡ… Ρ€Π°Π·Π»ΠΈΡ‡Π½Ρ‹Ρ… сообщСний
    corecore