Secret communication via image hiding in image by pixel value differencing

Author(s):  
A. L. Khade ◽  
B. G. Hogade ◽  
V. B. Gaikwad
2010 ◽  
Vol 10 (04) ◽  
pp. 589-607 ◽  
Author(s):  
NAGARAJ V. DHARWADKAR ◽  
B. B. AMBERKER

The exchange of secret message using images has vital importance in secret communication. Steganographic scheme is employed to achieve the task of secret message communication using images. The existing scheme based on pixel value differencing (PVD) with least significant bit (LSB) sequential substitution suffer from low embedding capacity. The embedding capacity is increased by using the edge regions of image obtained by neighborhood connectivity of pixel. We propose an adaptive steganographic scheme for gray-level images. Our scheme relies on the neighborhood connectivity of pixels to estimate the embedding capacity and resolves the problem of sequential substitution by jumbling the bits of secret message. The effect of cropping and filtration attacks on stegoimage is minimized by embedding the copies of secret message into four different regions of the cover image. The performance of the scheme is analyzed for various types of image processing attacks like cropping, blurring, filtering, adding noise, and sharpening. The proposed scheme is found rigid to these attacks.


2012 ◽  
Vol 191 ◽  
pp. 214-225 ◽  
Author(s):  
Yen-Po Lee ◽  
Jen-Chun Lee ◽  
Wei-Kuei Chen ◽  
Ko-Chin Chang ◽  
Ing-Jiunn Su ◽  
...  

Author(s):  
Agung Lestari ◽  
Abdul Sani Sembiring ◽  
Taronisokhi Zebua

Optimization of data security techniques is very necessary so that the data or information that is secured is really safe from attack. Data that has been encrypted based on cryptographic techniques very quickly raises suspicion that the data is confidential or important. Therefore, this technique is better combined with steganography techniques. Utilization of steganography techniques can minimize the attacker's suspicion of data that is secured, because by using steganography data techniques can be hidden on certain objects. This study discusses how to encode a text based on the Merkle-Hellman Knapsack algorithm and the resulting password is hidden in a grayscale digital image as a hiding object based on the pixel value differencing algorithm. This is done to minimize suspicion and make it difficult for attackers to find out confidential or important data.Keywords: cryptography,steganography, merkle-hellmankanpsack, PVD, image


2011 ◽  
Vol 84 (4) ◽  
pp. 669-678 ◽  
Author(s):  
Cheng-Hsing Yang ◽  
Chi-Yao Weng ◽  
Hao-Kuan Tso ◽  
Shiuh-Jeng Wang

Sign in / Sign up

Export Citation Format

Share Document