A Novel Image Steganography Methodology Based on Adaptive PMS Technique

  • Srilekha MukherjeeEmail author
  • Goutam Sanyal
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 518)


The rapid sprout in the usage of secured information exchange through the Internet causes a major security concern today. In this paper, we have proposed a secured approach in the lexicon of modern image steganography frame. The adaptive form of the power modulus scrambling (PMS) technique has been used so as to scramble the pixels of the cover, thereby putting in a secured shield right from the beginning. Next, a comparative key-based permutation combination methodology adeptly carries out the embedding procedure. This ardently caters the concerning security issue while communication. The commendable results of the proposed approach evaluated with respect to substantial performance metrics maintain the foothold of imperceptibility.


Steganography Adaptive power modulus scrambling Peak signal to noise ratio Cross-correlation coefficient 


  1. 1.
    Jaheel, H., Beiji, Z.: A Novel Approach of Combining Steganography Algorithms. International Journal on Smart Sensing and Intelligent Systems. Vol. 8 (2015).Google Scholar
  2. 2.
    Mukherjee, S., Ash, S., Sanyal, G.: A Novel Image Steganographic Methodology by Power Modulus Scrambling with logistic Mapping. TENCON, IEEE Region 10 Conference (2015).Google Scholar
  3. 3.
    Singh, K.: A Survey on Image Steganography Techniques. International Journal of Computer Applications. Vol 97 (2014).Google Scholar
  4. 4.
    Luo, X., et al.: On F5 Steganography in Images. The Computer Journal. Vol. 55 (2012).Google Scholar
  5. 5.
    Joshi, R., Gagnani, L., Pandey, S.: Image Steganography with LSB. International Journal of Advanced Research in Computer Engineering & Technology. Vol. 2 (2013).Google Scholar
  6. 6.
    Sanchetti, A.: Pixel Value Differencing Image Steganography Using Secret Key. International Journal of Innovative Technology and Exploring Engineering. Vol. 2 (2012).Google Scholar
  7. 7.
    Huang, P., Chang, K., Chang, C., et al.: A Novel Image Steganography Method using Tri-way Pixel Value Differencing. Journal of Multimedia (2008).Google Scholar
  8. 8.
    Potdar, V., Chang, E.: Gray Level Modification Steganography for Secret Communication. IEEE International Conference on Industrial Informatics, Berlin, Germany (2004) 355–368.Google Scholar
  9. 9.
    Safarpour, M., Charmi, M.: Capacity Enlargement of the PVD Steganography Method Using the GLM Technique. CoRRabs (2016) 1601.00299.Google Scholar
  10. 10.
    Lan, T., Mansour, M., Tewfik, A.: Robust High Capacity Data Embedding. ICIP (2000).Google Scholar
  11. 11.
    Reddy, V., Subramanyam, A., Reddy, P.: A Novel Technique for JPEG Image Steganography and its Performance Evaluation. IJAMC, Vol. 5 (2014) 211–224.Google Scholar
  12. 12.
    Subhedar, M., Mankar, V.: Current Status and Key Issues in Image Steganography: A Survey. Journal of Computer Science Review, Elsevier (2014) 95–113.Google Scholar
  13. 13.
    Almohammad, A., Ghinea, G.: Stego-Image Quality and the Reliability of PSNR. Image Processing Theory, Tools and Applications, IEEE (2010).Google Scholar
  14. 14.
    Roy, R., Samima, S., Changder, S.: A Map-Based Image Steganography Scheme for RGB Images. IJICS Vol. 7 (2015) 196–215.Google Scholar
  15. 15.
    Xue, W.: Study on Digital Image Scrambling Algorithm. JNW. Vol. 8 (2013) 1673–1679.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Computer Science and Engineering DepartmentNational Institute of Technology DurgapurDurgapurIndia

Personalised recommendations