Skip to main content

A Novel Image Steganography Methodology Based on Adaptive PMS Technique

  • Conference paper
  • First Online:
Book cover Progress in Intelligent Computing Techniques: Theory, Practice, and Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 518))

  • 1046 Accesses

Abstract

The rapid sprout in the usage of secured information exchange through the Internet causes a major security concern today. In this paper, we have proposed a secured approach in the lexicon of modern image steganography frame. The adaptive form of the power modulus scrambling (PMS) technique has been used so as to scramble the pixels of the cover, thereby putting in a secured shield right from the beginning. Next, a comparative key-based permutation combination methodology adeptly carries out the embedding procedure. This ardently caters the concerning security issue while communication. The commendable results of the proposed approach evaluated with respect to substantial performance metrics maintain the foothold of imperceptibility.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jaheel, H., Beiji, Z.: A Novel Approach of Combining Steganography Algorithms. International Journal on Smart Sensing and Intelligent Systems. Vol. 8 (2015).

    Google Scholar 

  2. Mukherjee, S., Ash, S., Sanyal, G.: A Novel Image Steganographic Methodology by Power Modulus Scrambling with logistic Mapping. TENCON, IEEE Region 10 Conference (2015).

    Google Scholar 

  3. Singh, K.: A Survey on Image Steganography Techniques. International Journal of Computer Applications. Vol 97 (2014).

    Google Scholar 

  4. Luo, X., et al.: On F5 Steganography in Images. The Computer Journal. Vol. 55 (2012).

    Google Scholar 

  5. Joshi, R., Gagnani, L., Pandey, S.: Image Steganography with LSB. International Journal of Advanced Research in Computer Engineering & Technology. Vol. 2 (2013).

    Google Scholar 

  6. Sanchetti, A.: Pixel Value Differencing Image Steganography Using Secret Key. International Journal of Innovative Technology and Exploring Engineering. Vol. 2 (2012).

    Google Scholar 

  7. Huang, P., Chang, K., Chang, C., et al.: A Novel Image Steganography Method using Tri-way Pixel Value Differencing. Journal of Multimedia (2008).

    Google Scholar 

  8. Potdar, V., Chang, E.: Gray Level Modification Steganography for Secret Communication. IEEE International Conference on Industrial Informatics, Berlin, Germany (2004) 355–368.

    Google Scholar 

  9. Safarpour, M., Charmi, M.: Capacity Enlargement of the PVD Steganography Method Using the GLM Technique. CoRRabs (2016) 1601.00299.

    Google Scholar 

  10. Lan, T., Mansour, M., Tewfik, A.: Robust High Capacity Data Embedding. ICIP (2000).

    Google Scholar 

  11. Reddy, V., Subramanyam, A., Reddy, P.: A Novel Technique for JPEG Image Steganography and its Performance Evaluation. IJAMC, Vol. 5 (2014) 211–224.

    Google Scholar 

  12. Subhedar, M., Mankar, V.: Current Status and Key Issues in Image Steganography: A Survey. Journal of Computer Science Review, Elsevier (2014) 95–113.

    Google Scholar 

  13. Almohammad, A., Ghinea, G.: Stego-Image Quality and the Reliability of PSNR. Image Processing Theory, Tools and Applications, IEEE (2010).

    Google Scholar 

  14. Roy, R., Samima, S., Changder, S.: A Map-Based Image Steganography Scheme for RGB Images. IJICS Vol. 7 (2015) 196–215.

    Google Scholar 

  15. Xue, W.: Study on Digital Image Scrambling Algorithm. JNW. Vol. 8 (2013) 1673–1679.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Srilekha Mukherjee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Mukherjee, S., Sanyal, G. (2018). A Novel Image Steganography Methodology Based on Adaptive PMS Technique. In: Sa, P., Sahoo, M., Murugappan, M., Wu, Y., Majhi, B. (eds) Progress in Intelligent Computing Techniques: Theory, Practice, and Applications. Advances in Intelligent Systems and Computing, vol 518. Springer, Singapore. https://doi.org/10.1007/978-981-10-3373-5_15

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3373-5_15

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3372-8

  • Online ISBN: 978-981-10-3373-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics