Login



Other Articles by Author(s)

Archana O. Vyas
Sanjay V. Dudul



Author(s) and WSEAS

Archana O. Vyas
Sanjay V. Dudul


WSEAS Transactions on Computers


Print ISSN: 1109-2750
E-ISSN: 2224-2872

Volume 17, 2018

Notice: As of 2014 and for the forthcoming years, the publication frequency/periodicity of WSEAS Journals is adapted to the 'continuously updated' model. What this means is that instead of being separated into issues, new papers will be added on a continuous basis, allowing a more regular flow and shorter publication times. The papers will appear in reverse order, therefore the most recent one will be on top.



Secure Image Steganography Using Tri - Way Pixel - Value Differencing on Two Cover Images

AUTHORS: Archana O. Vyas, Sanjay V. Dudul

Download as PDF

ABSTRACT: In tri – way pixel – value differencing(TPVD) steganography approach, three different directional edges of the cover image are considered to create a stego image. TPVD gives more hiding capacity as compared to original pixel value differencing (PVD) method referring to only one direction. Encryption with steganography gives more secrecy protection to the system. In this paper, a more secure image steganographic technique is proposed, which includes encryption of image before embedding it in, two cover images using TPVD. Experimental results demonstrate that use of two cover images provide high embedding capacity. The peak signal to noise ratio (PSNR), mean square error (MSE) and hiding capacity are evaluated as performance parameter and found to have reasonable values as compared to previous related work. Encryption before embedding protects the information from unauthorized access. The embedded confidential information can be retrieved from the stego images successfully without assistance of original images.

KEYWORDS: Steganography, stego images, encryption, hiding capacity, TPVD, PVD, PSNR, MSE

REFERENCES:

[1] Ko-Chin Chang, Chien-Ping Chang, A Novel Image Steganographic Method UsingTri-way Pixel-Value Differencing, Journal of Multimedia, VOL. 3, NO. 2, JUNE 2008.

[2] Vajiheh Sabeti, Shadrokh Samavi, Shahram Shirani, Steganalysis of Pixel-Value Differencing Steganographic Method, IEEEPacific Rim Conference On Communication and Computer Signal Processing, 2007.

[3] Cheng-Hsing Yang, Shiuh-Jeng Wang,Analyses of Pixel-Value-Differencing Schemes with LSB Replacement inStegonagraphy, IEEEThirdInternational Conference Intelligent Infermation Hiding and multimedia Signal Processing, 2007.

[4] Wu. D.C., Tsai. W.H., A Steganographic Method for Images by Pixel-Value Differencing, PatternRecognition Letters, Vol. 24, No. 9-10. (2003) 1613.

[5] H.C. Wu, N.I. Wu, C.S. Tsai, and M.S. Hwang, Image steganographic scheme based on pixelvalue differencing and LSB replacement methods, IEE Proceedings on Vision, Image and Signal Processing, Vol. 152, No. 5, pp. 611-615, 2005.

[6] S.L. Li, K.C. Leung, L.M. Cheng, and C.K. Chan,Data Hiding in Images by Adaptive LSB SubstitutionBased on the Pixel-Value Differencing, First InternationalConference on Innovative Computing, Information andControl (ICICIC'06), Vol. 3, pp. 58-61, 2006.

[7] Sandipan Dey, Ajith Abraham, Sugata Sanyal, An LSB Data Hiding Technique Using Prime Numbers,IEEE, Third International Symposium on Information Assurance and Security, 2007.

[8] Sumeet Kaur, Savina Bansal and R. K. Bansal,Steganography and Classification of Image Steganography Techniques, IEEE International Conference on Computing For Sustainable Global Develpoement (INDIACom), 2014, 978-93-80544-12-0/14.

[9] EI sayed M., EI Alfy, Improved Pixel Value Differencing Steganography using Logistic Caotic maps, IEEE International Conference On innovations in information technology, 2012.

[10] Liping Ji, Xialong Li, A Further Study on a PVD Based Steganography, IEEE International Conference on multimedia information networking and security, 2010.

[11] Avinash Tyagi, Ratnakirti Roy, High Capacity Image Steganography Based on Pixel Value Differencing and Pixel value Sum, IEEE, Second International Conference on Computing and Communication Engineering, 2015.

[12] Mohit Rajput, Maroti Deshmukh, A Novel Approach for Concealing Image by Utilizing the Concept of Secret sharing Scheme and Steganography, IEEE, International Conference on Information Technology (ICIT) 2016.

WSEAS Transactions on Computers, ISSN / E-ISSN: 1109-2750 / 2224-2872, Volume 17, 2018, Art. #11, pp. 90-97


Copyright © 2018 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution License 4.0

Bulletin Board

Currently:

The editorial board is accepting papers.


WSEAS Main Site