Advance Steganography Using Dynamic Octa Pixel Value Differencing

被引:0
作者
Mangela, Sumit [1 ]
Daddikar, Nitin [1 ]
Bargode, Tejasvi [1 ]
Tatwadarshi, P. N. [1 ]
机构
[1] VIVA Inst Technol, Comp Engn, Bombay, Maharashtra, India
来源
2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS) | 2017年
关键词
Steganography; Cryptography; LSB (Least Significant Bit); PVD (Pixel Value Differencing); Cover image; Stego; Range table; AES (Advance Encryption Standard); hashing; Steganalysis;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The practice of concealing messages or information within redundant medium is called as steganography. The various types of steganography depends on the choice of redundant medium, which are text, image, audio and video. In image steganography the secret message are embedded into the pixels of cover image to produce stego image i.e. image embedded with secret message bits. Least Significant Bit technique is one of the most widely used image steganography technique but it has many drawbacks like image distortion, detectability, susceptibility to cryptanalysis. To overcome these drawbacks Pixel Value Differencing technique was introduced. In PVD three neighboring pixels are compared with target pixel and there difference is calculated which in turn decides how many bits to embed in the pixel pair with the help of static range table. It minimizes the distortion and increase the storage capacity. But comparing three neighboring pixels is not enough as other surrounding pixels are not taken into consideration for data embedding. The range table is also static consisting of predefined sets of ranges. The proposed system compares all eight neighboring pixels to enhance data embedding capacity. Also, it uses a dynamic range table values of which changes as per the resolution of the image which helps to reduce the distortion. System also makes use of LSB + PVD approach to increase the embedding capacity, where LSB is used in smooth areas of image and PVD is used in edgy areas. Cryptographic measures are also added into system to provide additional data security and data integrity.
引用
收藏
页数:7
相关论文
共 11 条
[1]  
Hamamreh RA, 2014, INT J COMPUT SCI NET, V14, P94
[2]  
Jairath S., 2015, INT J ENG COMPUTER S, V4, P1086
[3]  
Joseph P, 2015, 2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), P206, DOI 10.1109/GCCT.2015.7342653
[4]  
Jovanovic D, 2005, LECT NOTES COMPUT SC, V3717, P200
[5]  
Khandagale P. M., 2015, INT J COMPUTER APPL, P15
[6]  
Kumar P., 2014, INT J ADV RES COMPUT, V4, P246
[7]  
Laskar S. A., 2012, International Journal of Database Management Systems (IJDMS), V4, P57
[8]  
Manoj R., 2013, INT J COMPUTER SCI E, V3, P185
[9]  
Pahal R., 2013, INT J ADV RES COMPUT, V3, P290
[10]  
Salunkhe J., 2013, INT J COMPUTER APPL, P01