Improved pixel hiding method for steganography of gray images within color images

Main Article Content

Diego Renza http://orcid.org/0000-0001-8073-3594
Dora M. Ballesteros L http://orcid.org/0000-0003-3864-818X
Ramiro Rincón http://orcid.org/0000-0001-6781-2749

Keywords

BPHM, QIM, steganography, imperceptibility, quality of the recovered secret image

Abstract

Steganography is the process of data hiding into a host signal with three main characteristics: imperceptibility, payload and quality of the recovered data. For images, one of the pixel modication methods is the BPHM (Block Pixel Hiding Method) which has good imperceptibility and payload, but it does not ensure the good quality of the recovered secret image. In this paper, we propose an improvement of the BPHM with the purpose to obtain similar results to the well-known QIM (Quantization Index Modulation) method. According to the results, the imperceptibility of the stego image and the quality of the recovered secret image were improved, and then, our results are closer to QIM results.

Downloads

Download data is not yet available.
Abstract 1508 | PDF (Español) Downloads 809 HTML (Español) Downloads 284

References

[1] Y. Lin and W. H. Abdulla, Audio Watermark. Springer, 2015. 146

[2] E. Zielinska, W. Mazurczyk, and K. Szczypiorski, “Trends in steganography,”Communications of the ACM, vol. 57, no. 3, pp.86–95, 2014. 146

[3] M. S. Subhedar and V. H. Mankar, “Current status and key issues in image steganography: A survey,” Computer Science Review, vol. 13, pp.95-113,2014. 147

[4] G. Shrivastava, A. Pandey, and K. Sharma, “Steganography and its technique:Technical overview,” in Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing. Springer, 2013,pp. 615–620.147

[5] A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography:Survey and analysis of current methods,” Signal processing, vol. 90,no. 3, pp. 727–752, 2010. 147, 148

[6] N. N. EL-Emam, “Hiding a large amount of data with high security using steganography algorithm,” Journal of Computer Science, vol. 3, no. 4, pp.223–232, 2007. 147

[7] M. Juneja and P. S. Sandhu, “An improved lsb based steganography technique for rgb color images,” International Journal of Computer and Communication Engineering, vol. 2, no. 4, pp. 513–517, 2013. 147, 148

[8] K. Moustafa and W. Badawy, “(color/gray) image in color cover hiding using modification of spatial domain hiding method,” in Future Generation Communication and Networking (FGCN 2007), vol. 1. IEEE, 2007, pp. 56–61.147, 148

[9] G. Ye, “Image scrambling encryption algorithm of pixel bit based on chaos map,” Pattern Recognition Letters, vol. 31, no. 5, pp. 347–354, 2010. 147,154

[10] A. Daneshkhah, H. Aghaeinia, and S. H. Seyedi, “A more secure steganography method in spatial domain,” in Intelligent Systems, Modelling and Simulation (ISMS), 2011 Second International Conference on. IEEE, 2011,pp. 189–194. 147

[11] J. Mandal and D. Das, “Colour image steganography based on pixel value differencing in spatial domain,” International journal of information sciences and techniques, vol. 2, no. 4, 2012. 147

[12] H. Patel and P. Dave, “Steganography technique based on dct coefficients,”International Journal of Engineering Research and Applications, vol. 2, no. 1,pp. 713–717, 2012. 147, 148

[13] A. Abdelwahab, L. Hassaan et al., “A discrete wavelet transform based technique for image data hiding,” in Radio Science Conference, 2008. NRSC 2008. National. IEEE, 2008, pp. 1–9. 147, 148

[14] S. Bhattacharyya, “A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier,” Journal of global research in computer science, vol. 2, no. 4, 2011. 147

[15] P.-Y. Chen, H.-J. Lin et al., “A dwt based approach for image steganography,”International Journal of Applied Science and Engineering, vol. 4, no. 3, pp.275–290, 2006. 149

[16] V. Kumar and D. Kumar, “Performance evaluation of dwt based image steganography,”in Advance Computing Conference (IACC), 2010 IEEE 2nd International. IEEE, 2010, pp. 223–228. 149

[17] M. M. Kiah, B. Zaidan, A. Zaidan, A. M. Ahmed, and S. H. Al-bakri, “Areview of audio based steganography and digital watermarking,” Int. J. Phys. Sci, vol. 6, no. 16, pp. 3837–3850, 2011. 149

[18] N. Hamid, A. Yahya, R. B. Ahmad, and O. M. Al-Qershi, “Image steganography techniques: an overview,” International Journal of Computer Science and Security (IJCSS), vol. 6, no. 3, pp. 168–187, 2012. 149

[19] G. K. Selvi, L. Mariadhasan, and K. Shunmuganathan, “Steganography using edge adaptive image,” in Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on. IEEE, 2012, pp. 1023–1027. 149

[20] C. Rafael Gonzalez and R. Woods, Digital image processing. Prentice Hall,2008. 153