Block-Based High Capacity Multilevel Image Steganography

2016 ◽  
Vol 25 (08) ◽  
pp. 1650091 ◽  
Author(s):  
Geeta Kasana ◽  
Kulbir Singh ◽  
Satvinder Singh Bhatia

This paper proposes a block-based high capacity steganography technique for digital images. The cover image is decomposed into blocks of equal size and the largest pixel of each block is found to embed the secret data bits and also the smallest pixel of each block is used for embedding to enhance the capacity. Embedding of secret data is performed using the concept that the pixel of a cover image has only two states — even and odd. Multilevel approach is also combined in the proposed technique to achieve high embedding capacity. In order to make the proposed technique more secure, a key is generated using embedding levels, block size, pixel embedding way, encryption parameters, and starting blocks of each embedding levels. Embedding capacity and visual quality of stego images generated by the proposed steganography technique are higher than the existing techniques. Steganalysis tests have been performed to show the un-detectability and imperceptibility of the proposed technique.

2018 ◽  
Vol 8 (11) ◽  
pp. 2199 ◽  
Author(s):  
Abdul Zakaria ◽  
Mehdi Hussain ◽  
Ainuddin Wahab ◽  
Mohd Idris ◽  
Norli Abdullah ◽  
...  

Steganography is the art and practice of communication using hidden messages. The least significant bits (LSB) based method is the well-known type of steganography in the spatial domain. Usually, achieving the larger embedding capacity in LSB-based methods requires a large number of LSB bits modification which indirectly reduces the visual quality of stego-image and increases the risk of steganalysis detection attacks. In this study, we propose a novel steganography method with data mapping strategy which can reduce the number of bits modification per pixel. In the proposed method, four secret data bits are mapped with the four most significant bits of a cover pixel. Furthermore, the only two LSBs of a pixel are modified to indicate the mapping strategy. Experimental results show that the proposed method is able to achieve 3.48% larger embedding capacity while enhancing the visual quality (i.e., peak signal to noise ratio (PSNR) 3.73 dB) and reducing the modification of 0.76 bits per pixel. Moreover, the proposed method provides security against basic Regular and Singular groups (RS) steganalysis and histogram steganalysis detection attacks.


2019 ◽  
Vol 9 (24) ◽  
pp. 5311 ◽  
Author(s):  
Yu-Xia Sun ◽  
Bin Yan ◽  
Jeng-Shyang Pan ◽  
Hong-Mei Yang ◽  
Na Chen

In recent years, reversible data hiding (RDH) has become a research hotspot in the field of multimedia security that has aroused more and more researchers’ attention. Most of the existing RDH algorithms are aiming at continuous-tone images. For RDH in encrypted halftone images (RDH-EH), the original cover image cannot be recovered losslessly after the watermark is extracted. For some application scenarios such as medical or military images sharing, reversibility is critical. In this paper, a reversible data hiding scheme in encrypted color halftone images (RDH-ECH) is proposed. In the watermark embedding procedure, the cover image is copied into two identical images to increase redundancy. We use wet paper code to embed the watermark into the image blocks. Thus, the receiver only needs to process the image blocks by the check matrices in order to extract the watermarks. To increase embedding capacity, we embed three layers in the embedding procedure and combine the resulting images into one image for convenience of transmission. From the experimental results, it can be concluded that the original image can be restored entirely after the watermarks are extracted. Besides, for marked color halftone images, our algorithm can implement high embedding capacity and moderate visual quality.


2018 ◽  
Vol 27 (11) ◽  
pp. 1850175 ◽  
Author(s):  
Neeraj Kumar Jain ◽  
Singara Singh Kasana

The proposed reversible data hiding technique is the extension of Peng et al.’s technique [F. Peng, X. Li and B. Yang, Improved PVO-based reversible data hiding, Digit. Signal Process. 25 (2014) 255–265]. In this technique, a cover image is segmented into nonoverlapping blocks of equal size. Each block is sorted in ascending order and then differences are calculated on the basis of locations of its largest and second largest pixel values. Negative predicted differences are utilized to create empty spaces which further enhance the embedding capacity of the proposed technique. Also, the already sorted blocks are used to enhance the visual quality of marked images as pixels of these blocks are more correlated than the unsorted pixels of the block. Experimental results show the effectiveness of the proposed technique.


2017 ◽  
Vol 4 (4) ◽  
pp. 161066 ◽  
Author(s):  
Shiv Prasad ◽  
Arup Kumar Pal

This paper presents a steganographic scheme based on the RGB colour cover image. The secret message bits are embedded into each colour pixel sequentially by the pixel-value differencing (PVD) technique. PVD basically works on two consecutive non-overlapping components; as a result, the straightforward conventional PVD technique is not applicable to embed the secret message bits into a colour pixel, since a colour pixel consists of three colour components, i.e. red, green and blue. Hence, in the proposed scheme, initially the three colour components are represented into two overlapping blocks like the combination of red and green colour components, while another one is the combination of green and blue colour components, respectively. Later, the PVD technique is employed on each block independently to embed the secret data. The two overlapping blocks are readjusted to attain the modified three colour components. The notion of overlapping blocks has improved the embedding capacity of the cover image. The scheme has been tested on a set of colour images and satisfactory results have been achieved in terms of embedding capacity and upholding the acceptable visual quality of the stego-image.


2018 ◽  
Vol 2018 ◽  
pp. 1-13 ◽  
Author(s):  
Chunqiang Yu ◽  
Xianquan Zhang ◽  
Zhenjun Tang ◽  
Yan Chen ◽  
Jingyu Huang

Data hiding in encrypted image is a recent popular topic of data security. In this paper, we propose a reversible data hiding algorithm with pixel prediction and additive homomorphism for encrypted image. Specifically, the proposed algorithm applies pixel prediction to the input image for generating a cover image for data embedding, referred to as the preprocessed image. The preprocessed image is then encrypted by additive homomorphism. Secret data is finally embedded into the encrypted image via modular 256 addition. During secret data extraction and image recovery, addition homomorphism and pixel prediction are jointly used. Experimental results demonstrate that the proposed algorithm can accurately recover original image and reach high embedding capacity and good visual quality. Comparisons show that the proposed algorithm outperforms some recent algorithms in embedding capacity and visual quality.


Author(s):  
Balkar Singh

In this paper, a novel image steganography approach is proposed to enhance the visual quality of stego image. The cover image is decomposed using Discrete Wavelet Transform (DWT) to produce wavelet subbands and threshold value is calculated for each higher frequency wavelet subbands. Wavelet coefficients having magnitude larger than the threshold of its subband are selected to embed the secret data. Semi Hexadecimal Code (SHC) is proposed to convert pixel value of secret image into smaller equivalent value so that it distorts stego image as less as possible. Experimental results shows that maximum PSNR between cover image and stego image is more than 75 dB .Proposed approach is also compared with the existing approaches and this comparison shows that the proposed approach is better than the existing approaches. 


2017 ◽  
Vol 26 (06) ◽  
pp. 1750103 ◽  
Author(s):  
Pankaj Garg ◽  
Singara Singh Kasana ◽  
Geeta Kasana

A Reversible Data Hiding technique by using histogram shifting and modulus operator is proposed in which secret data is embedded into blocks of the cover image. These blocks are modified by using modulus operator to increase the number of peak points in the histogram of the cover image which further increases its embedding capacity. Secret data is embedded in the original cover blocks of the cover image by using peak points of the predicted blocks, which are generated by using modulus operator. Peak Signal to Noise Ratio and PSNR-Human Visual System are used to show the human visual acceptance of the proposed technique. Experimental results show that the embedding capacity is high as compared to the capacity of existing RDH techniques, while distortion in marked images is also less as compared to distortion produced by these existing techniques.


2019 ◽  
Vol 11 (4) ◽  
pp. 118-129
Author(s):  
Bin Ma ◽  
Xiao-Yu Wang ◽  
Bing Li

A novel high capacity and security reversible data hiding scheme is proposed in this article, in which the secret data is represented by different orthogonal spreading sequences and repeatedly embedded into the cover image without disturbing each other in the light of Code Division Multiple Access (CDMA) technique, and thus the embedding capacity is enlarged. As most elements of orthogonal spreading sequences are mutually canceled in the process of repeated embedding, it keeps the distortion of the embedded image at a low level even with high embedding capacity. Moreover, only the receiver who has the spreading sequence and the embedding gain factor the same as the sender can extract the secret data and achieve the original image exactly, thus the proposed scheme achieves high embedding security than other schemes. The results of the experiment demonstrates that the CDMA based reversible data hiding scheme could achieve higher image quality at moderate-to-high embedding capacity compared with other state-of-the-art schemes.


In this paper a new image steganographic technique has been proposed which is capable of hiding data and produces a stego image that is totally indistinguishable from the original image by the human eye. To estimate the contrast and smoothness of pixels we check the relation between neighboring pixels. Our method first arranges the pixel in ascending manner, then takes the highest pixel value common with the other two pixels and then applies the pixel value differencing (PVD) method. To hide the secret data PVD technique is used in each pixel block. The two overlapping blocks are readjusted to attain the modified three-pixel components. Then calculate the new stego pixel block. In this way, take the middle and lowest pixel as the common pixel and apply the same procedure. In comparison, we get that if the highest value pixel value takes as a common one then the data hiding capacity is increased. The embedding capacity of the cover image is increased by using the pixel block overlapping mechanism. It has been tested on a set of images and also maintains the visual quality of the image.


Electronics ◽  
2020 ◽  
Vol 9 (4) ◽  
pp. 644 ◽  
Author(s):  
Cheonshik Kim ◽  
Ching-Nung Yang ◽  
Lu Leng

We present a new data hiding method based on Adaptive BTC Edge Quantization (ABTC-EQ) using an optimal pixel adjustment process (OPAP) to optimize two quantization levels. The reason we choose ABTC-EQ as a cover media is that it is superior to AMBTC in maintaining a high-quality image after encoding is executed. ABTC-EQ is represented by a form of t r i o ( Q 1 , Q 2 , [ Q 3 ] , BM) where Q is quantization levels ( Q 1 ≤ Q 2 ≤ Q 3 ) , and BM is a bitmap). The number of quantization levels are two or three, depending on whether the cover image has an edge or not. Before embedding secret bits in every block, we categorize every block into smooth block or complex block by a threshold. In case a block size is 4x4, the sixteen secret bits are replaced by a bitmap of the smooth block for embedding a message directly. On the other hand, OPAP method conceals 1 bit into LSB and 2LSB respectively, and maintains the quality of an image as a way of minimizing the errors which occur in the embedding procedure. The sufficient experimental results demonsrate that the performance of our proposed scheme is satisfactory in terms of the embedding capacity and quality of an image.


Sign in / Sign up

Export Citation Format

Share Document