Very High Capacity Image Steganography Technique Using Quotient Value Differencing and LSB Substitution

被引:57
|
作者
Swain, Gandharba [1 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Dept Comp Sci & Engn, Vaddeswaram 522502, Andhra Pradesh, India
关键词
Steganography; LSB substitution; QVD; RS analysis; PDH analysis; ALGORITHM; PVD; NETWORKS; CLOUD;
D O I
10.1007/s13369-018-3372-2
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
This article proposes a very high capacity steganography technique using differencing and substitution mechanisms. It divides the image into non-overlapped 3x3 pixel blocks. For every pixel of a block, least significant bit (LSB) substitution is applied on two LSBs and quotient value differencing (QVD) is applied on the remaining six bits. Thus, there are two levels of embedding: (i) LSB substitution at lower bit planes and (ii) QVD at higher bit planes. If a block after embedding in this fashion suffers with fall off boundary problem, then that block is undone from the above hybrid embedding and modified 4-bit LSB substitution is applied. Experimentally, it is evidenced that the hiding capacity is improved to a greater extent. It is also experimentally proved that pixel difference histogram and RS analysis techniques cannot detect the proposed steganography technique.
引用
收藏
页码:2995 / 3004
页数:10
相关论文
共 50 条
  • [31] High Embedding Capacity Color Image Steganography Scheme Using Pixel Value Differencing and Addressing the Falling-Off Boundary Problem
    Dharwadkar, Nagaraj V.
    Lonikar, Ashutosh A.
    Mahmud, Mufti
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2024, 24 (04)
  • [32] A Weighted Location Based LSB Image Steganography Technique
    Nag, Amitava
    Singh, Jyoti Prakash
    Khan, Srabani
    Ghosh, Saswati
    Biswas, Sushanta
    Sarkar, D.
    Sarkar, Partha Pratim
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 620 - 627
  • [33] High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution
    Njoum, Murad
    Sulaiman, Rossilawati
    Shukur, Zarina
    Qamar, Faizan
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 81 (01): : 183 - 211
  • [34] Image Steganography using improved algorithms to enhance security and payload of traditional LSB Substitution
    Bhagat, Jayti
    Gupta, Pragya
    Kohli, Neeraj
    2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,
  • [35] MULTIPLE EMBEDDING SECRET KEY IMAGE STEGANOGRAPHY USING LSB SUBSTITUTION AND ARNOLD TRANSFORM
    Das, Pallavi
    Kushwaha, Satish Chandra
    Chakraborty, Madhuparna
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 845 - 849
  • [36] Image Steganography by Pixel-Value Differencing Using General Quantization Ranges
    Wu, Da-Chun
    Shih, Zong-Nan
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 141 (01): : 353 - 383
  • [37] Data Hiding Using Quotient Value Differencing and Remainder Value Substitution Avoiding Incorrect Extraction Problem
    Khadse, Dipak Bhayyaji
    Swain, Gandharba
    SENSING AND IMAGING, 2021, 22 (01):
  • [38] Data Hiding Using Quotient Value Differencing and Remainder Value Substitution Avoiding Incorrect Extraction Problem
    Dipak Bhayyaji Khadse
    Gandharba Swain
    Sensing and Imaging, 2021, 22
  • [39] CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method
    Muhammad, Khan
    Ahmad, Jamil
    Rehman, Naeem Ur
    Jan, Zahoor
    Sajjad, Muhammad
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (06) : 8597 - 8626
  • [40] CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method
    Khan Muhammad
    Jamil Ahmad
    Naeem Ur Rehman
    Zahoor Jan
    Muhammad Sajjad
    Multimedia Tools and Applications, 2017, 76 : 8597 - 8626