Image Steganography Using Remainder Replacement, Adaptive QVD and QVC

被引:7
|
作者
Swain, Gandharba [1 ]
Pradhan, Anita [2 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Dept Comp Sci & Engn, Guntur 522502, Andhra Pradesh, India
[2] PSCMR Coll Engn & Technol, Dept Comp Sci & Engn, Vijayawada 520001, Andhra Pradesh, India
关键词
Steganography; RR; AQVD; QVC; RS analysis; PDH analysis; MODIFICATION DIRECTIONS; LSB; PVD; SUBSTITUTION;
D O I
10.1007/s11277-021-09131-6
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This research article reports a steganography method based on adaptive quotient value differencing (AQVD), quotient value correlation (QVC), and remainder replacement. It possesses two advantages, (i) avoids unused pixel blocks problem, and (ii) performs data integrity verification at the receiver. It accomplishes data camouflaging and retrieval on 3-by-3 disjoint pixel blocks. From a 3-by-3 size pixel block three new blocks are derived, (i) quotient (QT) block, (ii) middle bit (M) block and (iii) remainder (R) block. A quotient of the quotient block is decimal equivalent of six binary bits. AQVD procedure is enforced to hide data in 4 corner quotients of the quotient block. The top-middle and bottom-middle quotients are appraised as reference values for AQVD procedure. In left-middle, center, and right-middle quotients, QVC embedding procedure is plied for data camouflaging by using their respective top and below neighbors as reference values. The 7th bit forms the M block and the 8th bit (least significant bit) forms the R block. Secret bits are camouflaged in M block by bit substitution. The verification bits are computed from QT block and M block. The verification bits are stored at R block, so that at the receiver side the integrity of the pulled-out bits can be checked. The experimental results prove that the recorded HC and PSNR values are improved. Furthermore, regular-singular (RS) and pixel difference histogram (PDH) analyses could not detect this technique.
引用
收藏
页码:273 / 293
页数:21
相关论文
共 50 条
  • [31] Adaptive batch steganography considering image embedding capacity
    Sajedi, Hedieh
    Jamzad, Mansour
    OPTICAL ENGINEERING, 2009, 48 (08)
  • [32] An adaptive fuzzy inference approach for color image steganography
    Lili Tang
    Dongrui Wu
    Honghui Wang
    Mingzhi Chen
    Jialiang Xie
    Soft Computing, 2021, 25 : 10987 - 11004
  • [33] Image-Adaptive Steganalysis for LSB Matching Steganography
    Juarez-Sandoval, Oswaldo
    Cedillo-Hernandez, Manuel
    Nakano-Miyatake, Mariko
    Perez-Meana, Hector
    Toscano-Medina, Karina
    2016 39TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2016, : 478 - 483
  • [34] Embedding Suitability Adaptive Cover Selection for Image Steganography
    Yuan, Junying
    Chen, Haishan
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON E-EDUCATION, E-BUSINESS AND INFORMATION MANAGEMENT, 2014, 91 : 36 - 39
  • [35] Cover image preprocessing for more reliable LSB replacement steganography
    Shreelekshmi, R.
    Wilscy, M.
    Madhavan, C. E. Veni
    2010 INTERNATIONAL CONFERENCE ON SIGNAL ACQUISITION AND PROCESSING: ICSAP 2010, PROCEEDINGS, 2010, : 153 - 156
  • [36] Content-adaptive Adversarial Embedding for Image Steganography Using Deep Reinforcement Learning
    Luo, Jie
    He, Peisong
    Liu, Jiayong
    Wang, Hongxia
    Wu, Chunwang
    Chen, Yijing
    Li, Wanjie
    Li, Jiangchuan
    2023 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, ICME, 2023, : 49 - 54
  • [37] An adaptive image steganography method based on integer wavelet transform using genetic algorithm
    Sabeti, Vajiheh
    Sobhani, Masomeh
    Hasheminejad, Seyed Mohammad Hossein
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 99
  • [38] Variable Load Image Steganography using Multiple Edge Detection and Minimum Error Replacement Method
    Geetha, C. R.
    Basavaraju, S.
    Puttamadappa, C.
    2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICT 2013), 2013, : 53 - 58
  • [39] Adaptive image data hiding using transformation and error replacement
    Ejaz, Naveed
    Anwar, Jamil
    Ishtiaq, M.
    Baik, Sung Wook
    MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 73 (02) : 825 - 840
  • [40] Adaptive image data hiding using transformation and error replacement
    Naveed Ejaz
    Jamil Anwar
    M. Ishtiaq
    Sung Wook Baik
    Multimedia Tools and Applications, 2014, 73 : 825 - 840