Image Steganography Using Remainder Replacement, Adaptive QVD and QVC

被引:7
|
作者
Swain, Gandharba [1 ]
Pradhan, Anita [2 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Dept Comp Sci & Engn, Guntur 522502, Andhra Pradesh, India
[2] PSCMR Coll Engn & Technol, Dept Comp Sci & Engn, Vijayawada 520001, Andhra Pradesh, India
关键词
Steganography; RR; AQVD; QVC; RS analysis; PDH analysis; MODIFICATION DIRECTIONS; LSB; PVD; SUBSTITUTION;
D O I
10.1007/s11277-021-09131-6
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This research article reports a steganography method based on adaptive quotient value differencing (AQVD), quotient value correlation (QVC), and remainder replacement. It possesses two advantages, (i) avoids unused pixel blocks problem, and (ii) performs data integrity verification at the receiver. It accomplishes data camouflaging and retrieval on 3-by-3 disjoint pixel blocks. From a 3-by-3 size pixel block three new blocks are derived, (i) quotient (QT) block, (ii) middle bit (M) block and (iii) remainder (R) block. A quotient of the quotient block is decimal equivalent of six binary bits. AQVD procedure is enforced to hide data in 4 corner quotients of the quotient block. The top-middle and bottom-middle quotients are appraised as reference values for AQVD procedure. In left-middle, center, and right-middle quotients, QVC embedding procedure is plied for data camouflaging by using their respective top and below neighbors as reference values. The 7th bit forms the M block and the 8th bit (least significant bit) forms the R block. Secret bits are camouflaged in M block by bit substitution. The verification bits are computed from QT block and M block. The verification bits are stored at R block, so that at the receiver side the integrity of the pulled-out bits can be checked. The experimental results prove that the recorded HC and PSNR values are improved. Furthermore, regular-singular (RS) and pixel difference histogram (PDH) analyses could not detect this technique.
引用
收藏
页码:273 / 293
页数:21
相关论文
共 50 条
  • [41] Using the Chaotic Map in Image Steganography
    Enayatifar, Rasul
    Mahmoudi, Fariborz
    Mirzaei, Khadije
    2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 491 - +
  • [42] Steganography using image histogram specification
    Zhang Guicang
    Yang Jun
    Chen Wanghu
    Yang Xiaodong
    3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, PROCEEDINGS, 2005, : 226 - 231
  • [43] Using image steganography for decryptor distribution
    Morkel, T.
    Eloff, J. H. P.
    Olivier, M. S.
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 322 - +
  • [44] Using the Chaotic Map in Image Steganography
    Enayatifar, Rasul
    Faridnia, Saed
    Sadeghi, Hossein
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, : 754 - +
  • [45] An image steganography using pixel characteristics
    Park, YR
    Kang, HH
    Shin, SU
    Kwon, KR
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 581 - 588
  • [46] A secure image steganography based on modified matrix encoding using the adaptive region selection technique
    Tuan Duc Nguyen
    Hai Quoc Le
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (18) : 25251 - 25281
  • [47] An Adaptive Steganography of Optical Image using Bit-Planes and Multi-channel Characteristics
    Kang, Jin-Suk
    Jeong, Taikyeong T.
    JOURNAL OF THE OPTICAL SOCIETY OF KOREA, 2008, 12 (03) : 136 - 146
  • [48] A secure image steganography based on modified matrix encoding using the adaptive region selection technique
    Tuan Duc Nguyen
    Hai Quoc Le
    Multimedia Tools and Applications, 2022, 81 : 25251 - 25281
  • [49] An adaptive multi bit-plane image steganography using block data-hiding
    Tuan Duc Nguyen
    Arch-int, Somjit
    Arch-int, Ngamnij
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (14) : 8319 - 8345
  • [50] An adaptive multi bit-plane image steganography using block data-hiding
    Tuan Duc Nguyen
    Somjit Arch-int
    Ngamnij Arch-int
    Multimedia Tools and Applications, 2016, 75 : 8319 - 8345