Login



Other Articles by Author(s)

Ki-Hyun Jung



Author(s) and WSEAS

Ki-Hyun Jung


WSEAS Transactions on Systems and Control


Print ISSN: 1991-8763
E-ISSN: 2224-2856

Volume 13, 2018

Notice: As of 2014 and for the forthcoming years, the publication frequency/periodicity of WSEAS Journals is adapted to the 'continuously updated' model. What this means is that instead of being separated into issues, new papers will be added on a continuous basis, allowing a more regular flow and shorter publication times. The papers will appear in reverse order, therefore the most recent one will be on top.


Volume 13, 2018



Comparative Histogram Analysis of LSB-based Image Steganography

AUTHORS: Ki-Hyun Jung

Download as PDF

ABSTRACT: In image steganography, least significant bits replacement and pixel value differencing methods have been used. In this paper, data hiding methods based on least significant bits substitution are analyzed and compared on the side of histogram attack. In comparative histogram analysis, histogram of stego image is displayed considering the embedding capacity and visual image quality. Through histogram analysis, a new image steganography will be designed that has a high embedding capacity and be robust to histogram attack.

KEYWORDS: data hiding, steganography, steganalysis, least significant bit, histogram attack.

REFERENCES:

[1] Khan, A., Siddiqa, A., Munib, S., and Malik, S.A., A recent survey of reversible watermarking techniques, Information Sciences, Vol. 279, 2014, pp. 251-272.

[2] Subhedar, M.S., Mankar, V.H., Current status and key issues in image steganography: A survey, Computer Science Review, Vol.13, No.14, 2014, pp. 95-113.

[3] Jung, K.H., Yoo, K.Y. Steganographic method based on interpolation and LSB substitution of digital images, Multimedia Tools and Applications, Vol.74, No.6, 2015, pp. 2143- 2155.

[4] Khodaei, M., Faez, K., New adaptive steganographic method using least significant bit substation and pixel value differencing, IET Image Processing, Vol. , No.5, 2012, pp. 677 686.

[5] Ker, A., Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters, Vol.12, 2005, pp. 441444.

[6] Chang, C.C., Lin, M.H., Hu, Y.C., A fast and secure image hiding scheme based on LSB substitution. International Journal of Pattern Recognition, Vol.16, 2002, pp. 399416.

[7] Sharp, T. An implementation of key based digital signal steganography, Information Hiding Workshop, Vol.2137, 2001, pp. 13-26.

[8] Mielikainen, J., LSB matching revisited. IEEE Signal Processing Letters, Vol.13, 2006, pp. 285287.

[9] Chan, C.K., Cheng, L.M., Hiding data in images by simple LSB substitution, Pattern Recognition, Vol.37, 2004, pp. 469474.

[10] Wang, R.Z., Lin, C.F., Lin, J.C., Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition, Vol.34, 2001, pp. 671683.

[11] Lin, C.C., An information hiding scheme with minimal image distortion, Computer Standards & Interfaces, Vol.33, 2011, pp. 477-484.

[12] Xu, W.L., Chang, C.C., Chen, T.S., and Wang, L.M., An improved least significant bit substitution method using the modulo three strategy, Displays, Vol.42, 2016, pp. 36-42.

[13] Wu, N.I., Hwang, M.S., A novel LSB data hiding scheme with the lowest distortion, The Imaging Science Journal, Vol.65, No.6, 2017, pp. 371-378.

[14] Thien, C.C., Lin, J.C., A simple and high hiding capacity method for hiding digit by digit data in images based on modulus function, Pattern Recognition, Vol.36, 2003, pp. 2876-2881.

[15] Joshi, K. Yadav, R. Chawla. G., An enhanced method for data hiding using 2 bit XOR in image steganography, International Journal of Engineering and Technology, Vol. , No.6, 2017, pp. 3043-3055.

[16] Jung, K.H., Performance analysis of LSB based data hiding techniques, International Journal of Signal Processing, Vol.2, 2017, pp. 129-132.

[17] Yang, C.N., Hsu, S.C., Kim, C., Improving stego image quality in image interpolation based data hiding, Computer Standards & Interfaces, Vol.50, 2017, pp. 209-215.

[18] Wang, C.M., Wu, N.I., Tsai, C.S., and Hwang, M.S., A high quality steganographic method with pixel value differencing and modulus function, The ournal of Systems and Software, Vol.81, 2008, pp. 150158.

[19] Wu, D.C., Tsai, W.H., A steganographic method for images by pixel value differencing, Pattern Re ognition Letters, Vol.24, 2003, pp. 16131626.

[20] Liao, X., Wen, Q.Y., Zhang, J., A steganographic method for digital images with four pixel differencing and modified LSB substitution, Journal of Visual Communication and Image Representation, Vol.22, No.1, 2011, pp. 18.

[21] Wu, N. I., Wu, K. C., and Wang, C. M. Exploring pixel value differencing and base decomposition for low distortion data embedding, Applied Soft Computing, Vol.12, 2002, pp. 942960.

[22] Lee, Y. P., Lee, J. C., Chen, W. K., Chang, K. C. Su, I. J., and Chang, C. P. High payload image hiding with quality recovery using tri way pixel value differencing, Information Sciences, Vol.191, pp. 214 225.

[23] Wu, H.C., Wu, N.I., Tsai, C.S., and Hwang, M.S., Image steganographic scheme based on pixel value differencing and LSB replacement methods, IEE Processing Visualization, Image Signal Process, Vol.152, 2005, pp. 611615.

[24] Chang, K.C., Huang, P.S., Tu, T.M., Chang, C.P., Adaptive image steganographic scheme based on tri way pixel value differencing, Systems, Man and Cybernetics, 2007, pp. 11651170.

[25] Jung, K.H., A high capacity reversible data scheme based on sorting and prediction in digital images, Multimedia Tools and Applications, Vol.76, 2017, pp. 13127-13137.

[26] Hussain, M., Wahab, A.W.A., Ho, T.S., Javed, N., Jung, K.H., A data hiding scheme using parity bit pixel value differencing and improved rightmost digit replacement, Signal Processing: Image Communication, Vol.50, 2017, pp. 44-57.

[27] Bai, J. Chang, C.C., Nguyen, T.S., Zhu, C. Liu, Y., A high payload steganographic algorithm based on edge detection, Displays, Vol.46, 2017, pp. 42-51.

[28] Jung, K.H., Dual image based reversible data hiding method using neighboring pixel value referencing, The Imaging Science Journal, Vol.63, 2015, pp. 398-407.

[29] Lu, T.C., An interpolation based lossless hiding scheme based on message recoding mechanism, Optik, Vol.130, 201 , pp. 13771396.

[30] Cao, X., Wei, X. Guo, R., Wang, C., No embedding: a novel image cryptosystem for meaningful encryption, Journal of Visual Communication and Image Representation, Vol.44, 2017, pp. 236249.

[31]The USC SIPI Image Database, http://sipi.usc.edu/database/ (access on January 2018)

WSEAS Transactions on Systems and Control, ISSN / E-ISSN: 1991-8763 / 2224-2856, Volume 13, 2018, Art. #13, pp. 103-112


Copyright © 2018 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution License 4.0

Bulletin Board

Currently:

The editorial board is accepting papers.


WSEAS Main Site