An Image Steganography Algorithm Based on Pixel Block Difference and Variable Modulus Function

  • Yu YangEmail author
  • Ru Zhang
  • Jianyi Liu
  • Yuhan Wang
  • Fuhong Huang
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 110)


According to pixels out of bounds and the serious distortion caused by too much pixel value modification in traditional PVD steganography, This paper proposes a steganography algorithm based on pixel block difference and variable modulus function (PVBD). The algorithm uses the modular function of dynamic parameters to optimize the amplitude of the pixel value modification, and at the same time the related parameters of the mode function are dynamically variable, which increases the security of the algorithm on the basis of the diversity of the embedded modes. Experiments show that the algorithm this paper proposed has better performance in the embedded capacity and digital image quality as well as other properties than the existing PVD algorithm.


Information hiding Pixel difference Image steganography 



The National key Research and Development Program of China 2016YFB0800404, the NSF of China (U1636112, U1636212).


  1. 1.
    Gu, Y.X., Guo, J.C., Tian, H.Y., Li, C.Y.: Airspace steganalysis detection feature selection algorithm based on conditional mutual information. J. Tianjin Univ. (2017)Google Scholar
  2. 2.
    Fillatre, L.: Adaptive steganalysis of least significant bit replacement in grayscale natural images. IEEE Trans. Signal Process. 60(2), 556–569 (2012)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Xiong, G., Ping, X.J., Zhang, T., et al.: An approach of detecting least significant bit matching based on image content. J. Electron. Inf. Technol. 34(6), 1380–1387 (2012)CrossRefGoogle Scholar
  4. 4.
    Yu, B.Q., Zhang, H.M.: An improved least significant bits hiding algorithm. J. Optoelectron. Laser 23(12), 2398–2403 (2012)Google Scholar
  5. 5.
    Islam, M.O., Hossain, M.S., Siddique, M.S.H., et al.: Improving the non-filtering steganographic algorithm using LSB verification method. In: International Conference on Electrical Engineering and Information & Communication Technology, pp. 1–6. IEEE (2014)Google Scholar
  6. 6.
    Wu, N.I., Wang, C.M., Tsai, C.S., et al.: A high quality steganographic method with pixel – value differencing and modulus function. J. Syst. Softw. 81(1), 150–158 (2008)CrossRefGoogle Scholar
  7. 7.
    Amirtharajan, R., Akila, R., Deepikachowdavarapu, P.: A comparative analysis of image steganography. Int. J. Comput. Appl. 2(2), 41–47 (2010)Google Scholar
  8. 8.
    Zhu, Z.H., Zhang, t.: A blind detection method for detecting multiple types of adaptive steganography. J. Inf. Eng. Univ. (2013)Google Scholar
  9. 9.
    Wu, H.C., Wu, N.I., Tsai, C.S., et al.: Image steganographic scheme based on pixel-value differencing and LSB replacement methods. Vis., Image and Signal Process. IEE Proc. 152(5), 611–615 (2005)CrossRefGoogle Scholar
  10. 10.
    Yang, C.H., Weng, C.Y., Wang, S.J., et al.: Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. Inf. Forensics Secur. 3(3), 488–497 (2008)CrossRefGoogle Scholar
  11. 11.
    Wang, Z., Zhang, J., Liao, X., et al.: Data embedding based on pixel value differencing and modulus function using indeterminate equation. J. China Univ. Posts Telecommun. 22(1), 95–100 (2015)CrossRefGoogle Scholar
  12. 12.
    Xu, H., Wang, J.J.: Large-capacity information hiding method using block pixel difference and modulus function. Terahertz Inst. Sci. Electron. Inf. 7(3), 218–221 (2009)Google Scholar
  13. 13.
    Yang, C.H., Wang, S.J., Weng, C.Y.: Capacity-raising steganography using multi-pixel differencing and pixel-value shifting operations. Fundam. Inform. 98(2), 321–336 (2010)Google Scholar
  14. 14.
    Liao, X., Wen, Q.Y., Zhao, Z.L., et al.: A novel steganographic method with four-pixel differencing and modulus function. Fundam. Inform. 118(3), 281–289 (2012)MathSciNetGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Yu Yang
    • 1
    • 2
    Email author
  • Ru Zhang
    • 1
  • Jianyi Liu
    • 1
  • Yuhan Wang
    • 1
  • Fuhong Huang
    • 1
  1. 1.Information Security CenterBeijing University of Posts and TelecommunicationsBeijingChina
  2. 2.Pivotal Software, Inc.BeijingChina

Personalised recommendations