Skip to main content

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing

  • Conference paper
  • First Online:
Genetic and Evolutionary Computing (ICGEC 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 579))

Included in the following conference series:

  • 643 Accesses

Abstract

The pixel value differencing (PVD) scheme provided high embedding payload with imperceptibility in the stego images. In their approach, they used two pixels differencing to represent the complexity of pixels, and applied it to estimate how many bit will be hidden into. As the difference with small value, it means that two pixels can not tolerated with larger change, therefore, few secret bit should be embedded into these pixels. PVD scheme did not completely take pixel tolerance into consideration because of only applying one criterion, pixel differencing. In this paper, a new data hiding scheme using PVD operation and incorporating with pixel tolerance into a cover image is proposed. The pixel tolerance indicates that a greater pixel-value is more change of gray-value could be tolerated. Following up this idea, our proposed scheme applies a threshold (TH) and two quantization tables to hide secret data into a block with two pixels using modified k-bits LSB. The number of k-bits is adaptive and depends on the quantization tables setting. The adjustment strategy is to maintain the differencing value in the same range. The experimental results show that our scheme is superior to those in the previous literature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chu, Y.H., Chang, S.: Dunamical cryptography based on synchronized chaotic system. Inst. Elect. Eng. Electron. Lett. 35, 974–975 (1999)

    Google Scholar 

  2. Kuo, W.C., Lai, P.Y., Wang, C.C., Wuu, L.C.: A formula diamond encoding data hiding scheme. J. Inform. Hind. Multi. Signal Process. 6, 1167–1176 (2015)

    Google Scholar 

  3. Anderson, R.R., Peticolas, F.A.P.: On the limits of steganography. IEEE J. Sel. Areas Commun. 16, 474–481 (1998)

    Article  Google Scholar 

  4. Chen, C.K., Chen, L.M.: Hiding data in images by simple LSB substitution. Pattern Recog. 37, 469–474 (2004)

    Article  Google Scholar 

  5. Yang, C.H.: Inverted pattern appraoch to improve image quality of the information hiding by LSB substitution. Pattern Recognit. 41, 2674–2683 (2008)

    Article  MATH  Google Scholar 

  6. Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recognit. Lett. 24, 1613–1626 (2003)

    Article  MATH  Google Scholar 

  7. Ynag, C.H., Weng, C.Y.: A steganographic method for digital images by multi-pixel differencing. In: Internatioanl Computer Symposium, Taiwan, pp. 831–836 (2006)

    Google Scholar 

  8. Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S.: Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proceed. Vis. Images Signal Process. 152, 611–615 (2005)

    Article  Google Scholar 

  9. Wang, C.M., Wu, N.I., Tsai, C.S., Hwang, M.S.: A high quality steganography method with pixel-value differencing and modulus function. J. Syst. Softw. 81, 150–158 (2008)

    Article  Google Scholar 

  10. Yang, C.H., Weng, C.Y., Tso, H.K., Wang, S.J.: A data hiding scheme using the varieties of pixel-value differencing in multimedia images. J. Syst. Softw. 84, 669–678 (2011)

    Article  Google Scholar 

  11. Yang, C.H., Weng, C.Y., Wang, S.J., Sun, H.M.: Varied PVD+LSB evading detection program to spatial domain in data embedding system. J. Syst. Softw. 83, 1635–1643 (2010)

    Article  Google Scholar 

  12. Yang, C.H., Weng, C.Y., Wang, S.J., Sun, H.M.: Adaptive data hiding in edge area of images with spatial LSB domain system. IEEE Tran. Inform. Fore. Secu. 3, 488–497 (2008)

    Article  Google Scholar 

  13. Wang, S.J.: Steganography of capacity required using modulo operator for embedding secret image. Appl. Math. Compu. 164, 99–116 (2005)

    MATH  MathSciNet  Google Scholar 

  14. Hong, W., Chen, T.S., Luo, C.W.: Data embedding using pixel value differencing and diamond encoding with multiple-base notational system. J. Syst. Softw. 85, 1166–1175 (2012)

    Article  Google Scholar 

  15. Mandal, J.K., Das, D.: Steganography using adaptive pixel value differencing of gray images through exclusion of overflow/underflow. In: International Conference on Computer Science, Engineering and Application, India, pp. 93–102 (2012)

    Google Scholar 

  16. Chen, J.: A PVD-based data hiding method with histogram preserving using pixel pair matching. J. Image Commun. 29, 375–384 (2014)

    Google Scholar 

  17. Swain, G.: Adpative pixel value differencing steganography using both vertical and horizontal edges. Multimedia Tools Appl. 75, 13541–13556 (2016)

    Article  Google Scholar 

  18. Hosam, O., Halima, N.B.: Adaptive block-based pixel value differencing steganography. Sec. Commun. Netw. 9, 5036–5050 (2016)

    Article  Google Scholar 

Download references

Acknowledgments

This research was partially supported by the Ministry of Science and Technology of the Republic of China under the Grant MOST 105-2221-E-324-014 and MOST 105-2221-E-153-010.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chin-Feng Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Weng, CY., Huang, YC., Lee, CF., Lin, DP. (2018). Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing. In: Lin, JW., Pan, JS., Chu, SC., Chen, CM. (eds) Genetic and Evolutionary Computing. ICGEC 2017. Advances in Intelligent Systems and Computing, vol 579. Springer, Singapore. https://doi.org/10.1007/978-981-10-6487-6_14

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6487-6_14

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6486-9

  • Online ISBN: 978-981-10-6487-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics