Analysis of Spatial Domain Image Steganography Based on Pixel-Value Differencing Method

  • C. D. NishaEmail author
  • Thomas Monoth
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1057)


Image steganography is a technique of embedding secret information inside a cover image and transmits through a public channel without revealing the presence of a message. So that no one except the intended recipient can recognize secret message within the carrier image. Image steganography based on pixel value differencing (PVD) is one of the most important steganographic methods in spatial domain. To embed secret information, PVD method utilizes the difference value of each pixel pair on cover image. In this paper, we study the basic concepts of image steganography based on PVD method and latest research developments in image steganography using PVD. We also presented a detailed analysis of these techniques on the basis of some performance parameters such as payload capacity, imperceptibility, and robustness.


Steganography Image steganography Spatial domain image steganography Pixel-value differencing 


  1. 1.
    Doshi, Ronak, Jain, Pratik, Gupta, Lalit: Steganography and its applications in security. Int. J. Mod. Eng. Res. (IJMER) 2(6), 4634–4638 (2012)Google Scholar
  2. 2.
    Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE Trans. Comput. 2, 26–34 (1998) (IEEE)CrossRefGoogle Scholar
  3. 3.
    Siper, A., Farley, R., Lombardo, C.: The rise of steganography. In: Proceedings of Student/Faculty Research Day, CSIS, Pace University (2005)Google Scholar
  4. 4.
    Yunus, Y.A., Ab Rahman, S., Ibrahim, J.: Steganography: a review of information security research and development in muslim world. Am. J. Eng. Res. (AJER), 2(11), 122–128 (2013)Google Scholar
  5. 5.
    Simmons, G.J., The prisoners’ problem and the subliminal channel. In: Advances in Cryptology, Proceedings of CRYPTO ’83, in: Lecture Notes in Computer Science, Plenum, New York, pp. 51–67 (1983)CrossRefGoogle Scholar
  6. 6.
    Sumathi1, C.P.., Santanam, T., Umamaheswari, G.: A study of various steganographic techniques used for information hiding. Int. J. Comput. Sci. Eng. Surv. (IJCSES) 4(6), 9–25 (2013)CrossRefGoogle Scholar
  7. 7.
    Shih, F.Y.: Digital Watermarking and Steganography: Fundamentals and Techniques, p. 137. CRC Press, Taylor & Francis Group, HRD (2007)Google Scholar
  8. 8.
    Shelke, S.G.., Jagtap, S.K.: Analysis of spatial domain image steganography techniques. In: International Conference on Computing Communication Control and Automation, pp. 665–667. IEEE Computer Society (2015).
  9. 9.
    Muhammad, K., Ahmad, J., Rehman, N.U., Jan, Z., Sajjad, M.: CISSKA-LSB: color image steganography using stegokey-directed adaptive LSB substitution method. Multimedia Tools Appl. . (2016). (Springer)CrossRefGoogle Scholar
  10. 10.
    Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004) (Elsevier)CrossRefGoogle Scholar
  11. 11.
    Mielikainen, J.: LSB matching revisited. Sig. Process. Lett. 13(5), 285–287 (2006) (IEEE)CrossRefGoogle Scholar
  12. 12.
    Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forens. Secur. 5(2), 201–214 (2010) (IEEE)Google Scholar
  13. 13.
    Wu, D.-C., Tsai, W.-H.: A steganographic method for images by pixel value differencing. Pattern Recogn. Lett. 24, 1613–1626 (2003) (Elsevier)CrossRefGoogle Scholar
  14. 14.
    Yang, C.H., Weng, C.Y., A steganographic method for digital images by multipixel Differencing. In: Proceedings of International Computer Symposium, Taipei, Taiwan, ROC, pp. 831–836 (2006)Google Scholar
  15. 15.
    Luo, W., Huang, F., Huang, J.: A more secure steganography based on adaptive pixel-value differencing scheme. Multimedia Tools Appl. 407–430 (2010). Scholar
  16. 16.
    Zhang, X., Wang, S.: Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recogn. Lett. 25, 331–339 (2004)CrossRefGoogle Scholar
  17. 17.
    Chang, K.-C., Chang, C.-P., Huangb, P.S., Tua, T.-M.: A novel image steganographic method using tri-way pixel-value differencing. J. Multimedia 3(2) (2008) (Elsevier)Google Scholar
  18. 18.
    Joo, J.C., Lee, H.Y., Lee, H.K.: Improved steganographic method preserving pixel-value differencing histogram with modulus function. EURASIP J. Adv. Signal Process. 1–13 (2010).
  19. 19.
    Pan, F., Li, J., Yang, X.: Image steganography method based on PVD and modulus function. In: International Conference on Electronics, Communications and Control (ICECC), pp. 282–284 (2011).
  20. 20.
    Luo, W., Huang, F., Huang, J.: A more secure steganography based on adaptive pixel-value differencing scheme. Multimedia Tools Appl. 52, 407–430 (2011) Scholar
  21. 21.
    Mandal, J.K., Das, D.: Color image steganography based on pixel value differencing in spatial domain. Int. J. Inf. Sci. Tech. 2(4), 83–93 (2012)Google Scholar
  22. 22.
    Nagaraj, V., Vijayalakshmi, V., Zayaraz, G.: Color image steganography based on pixel value modification method using modulus function. In: International Conference on Electronic Engineering and Computer Science, pp. 17–24 (2013)CrossRefGoogle Scholar
  23. 23.
    Tseng, H.-W., Leng, H.-S.: A steganographic method based on pixel-value differencing and the perfect square number. J. Appl. Math. Res. Article ID 189706 1–8 (2013). (Hindawi Publishing Corporation)MathSciNetCrossRefGoogle Scholar
  24. 24.
    Swain, G.: Adaptive pixel value differencing steganography using both vertical and horizontal edges. Multimedia Tools Appl. 75, 13541–13556 (2015). (Springer)CrossRefGoogle Scholar
  25. 25.
    Hameed, M.A., Aly, S., Hassaballah, M.: An efficient data hiding method based on adaptive directional pixel value differencing (ADPVD). Multimedia Tools Appl. (2017). (Springer)CrossRefGoogle Scholar
  26. 26.
    Prasad, S., Pal, A.K., An RGB color image steganography scheme using overlapping block-based pixel-value differencing. Dryad Digital Repository (2017).
  27. 27.
    Swain, G.: Adaptive and non-adaptive PVD steganography using overlapped pixel blocks. Arab. J. Sci. Eng. (2018). Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Department of Information TechnologyKannur UniversityKannurIndia
  2. 2.Department of Computer ScienceMary Matha Arts & Science College, Kannur UniversityMananthavady, WayanadIndia

Personalised recommendations