Image Steganography Using Remainder Replacement, Adaptive QVD and QVC

被引:7
|
作者
Swain, Gandharba [1 ]
Pradhan, Anita [2 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Dept Comp Sci & Engn, Guntur 522502, Andhra Pradesh, India
[2] PSCMR Coll Engn & Technol, Dept Comp Sci & Engn, Vijayawada 520001, Andhra Pradesh, India
关键词
Steganography; RR; AQVD; QVC; RS analysis; PDH analysis; MODIFICATION DIRECTIONS; LSB; PVD; SUBSTITUTION;
D O I
10.1007/s11277-021-09131-6
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This research article reports a steganography method based on adaptive quotient value differencing (AQVD), quotient value correlation (QVC), and remainder replacement. It possesses two advantages, (i) avoids unused pixel blocks problem, and (ii) performs data integrity verification at the receiver. It accomplishes data camouflaging and retrieval on 3-by-3 disjoint pixel blocks. From a 3-by-3 size pixel block three new blocks are derived, (i) quotient (QT) block, (ii) middle bit (M) block and (iii) remainder (R) block. A quotient of the quotient block is decimal equivalent of six binary bits. AQVD procedure is enforced to hide data in 4 corner quotients of the quotient block. The top-middle and bottom-middle quotients are appraised as reference values for AQVD procedure. In left-middle, center, and right-middle quotients, QVC embedding procedure is plied for data camouflaging by using their respective top and below neighbors as reference values. The 7th bit forms the M block and the 8th bit (least significant bit) forms the R block. Secret bits are camouflaged in M block by bit substitution. The verification bits are computed from QT block and M block. The verification bits are stored at R block, so that at the receiver side the integrity of the pulled-out bits can be checked. The experimental results prove that the recorded HC and PSNR values are improved. Furthermore, regular-singular (RS) and pixel difference histogram (PDH) analyses could not detect this technique.
引用
收藏
页码:273 / 293
页数:21
相关论文
共 50 条
  • [1] Image Steganography Using Remainder Replacement, Adaptive QVD and QVC
    Gandharba Swain
    Anita Pradhan
    Wireless Personal Communications, 2022, 123 : 273 - 293
  • [2] Adaptive image steganography using contourlet transform
    Fakhredanesh, Mohammad
    Rahmati, Mohammad
    Safabakhsh, Reza
    JOURNAL OF ELECTRONIC IMAGING, 2013, 22 (04)
  • [3] Robust image adaptive steganography using integer wavelets
    Raja, K. B.
    Sindhu, S.
    Mahalakshmi, T. D.
    Akshatha, S.
    Nithin, B. K.
    Sarvajith, M.
    Venugopal, K. R.
    Patnaik, L. M.
    2008 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEM SOFTWARE AND MIDDLEWARE AND WORKSHOPS, VOLS 1 AND 2, 2008, : 614 - +
  • [4] Efficient Image Steganography Using Adaptive Cryptographic Algorithms
    Hasan, Mahadi
    Tabassum, Mehnaz
    Hossain, Md Jakir
    INTELLIGENT COMPUTING, VOL 1, 2019, 858 : 558 - 568
  • [5] An adaptive image steganography using AMBTC compression and interpolation technique
    Tang, Mingwei
    Zeng, Shenke
    Chen, Xiaoliang
    Hu, Jie
    Du, Yajun
    OPTIK, 2016, 127 (01): : 471 - 477
  • [6] Adaptive Image Steganography with Mod-4 Embedding using Image Contrast
    Ramezani, Mahdi
    Ghaemmaghami, Shahrokh
    2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010, 2010, : 243 - +
  • [7] Adaptive Batch Size Image Merging Steganography and Quantized Gaussian Image Steganography
    Sharifzadeh, Mehdi
    Aloraini, Mohammed
    Schonfeld, Dan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 867 - 879
  • [8] VidaGAN: Adaptive GAN for image steganography
    Ramandi, Vida Yousefi
    Fateh, Mansoor
    Rezvani, Mohsen
    IET IMAGE PROCESSING, 2024, 18 (12) : 3329 - 3342
  • [9] An adaptive and high capacity image steganography
    Cao, Longhan
    Dai, Qinfang
    Bai, Sen
    Liu, Ruipeng
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 2938 - 2942
  • [10] DTCWT Based High Capacity Steganography using Coefficient Replacement and Adaptive Scaling
    Sathisha, N.
    Priya, R.
    Babu, K. Suresh
    Raja, K. B.
    Venugopal, K. R.
    Patnaik, L. M.
    SIXTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2013), 2013, 9067