pixel value difference
Recently Published Documents


TOTAL DOCUMENTS

23
(FIVE YEARS 13)

H-INDEX

3
(FIVE YEARS 1)

2021 ◽  
Vol 1879 (2) ◽  
pp. 022089
Author(s):  
Sameera Abbas Fadhel ◽  
Zeena N. Al-Kateeb ◽  
Muna Jaffer AL-Shamdeen

With the increase of digital transactions, providing security for the network and its devices is a big challenge today. Sensitive information that has more value in the network is to be protected from unauthorized users in accessing it. Various algorithms are being developed to provide security services for the data. In this paper security is provided by using pixel value differencing technique. Valuable data is embedded in each of the component of color like red, blue and green of a pixel in a color image. In addition to that in providing additional security pixel value has been updated conditionally, that would be more complex to trace the incremented or decremented bits in a pixel of the stegoimage. From this experiment the proposed method provides better visual quality of stego image. This proposed algorithm is suitable for small business applications where small size data is important and threats are more common.


This paper presents a framework that conceal large volume of secret information using distributed file system that permit implantation of decomposed secret images across multiple-cover images. The strong security is imposed utilizing Shamir’s threshold scheme and permutation generator framework. Three layers of security is being applied to protect the secret information, in first, secret image is decomposed into equal size of smaller sub-images and generate a framework of permutations from an integer for distributing and reassembling the circulated broken secret sub images among the intended participants. At the time of embedding purpose of permutation generator is to arrange the sub-images in unknown order for outsider. During the discloser stage only inverse of permutation can rearrange the distributed sub-images to reassemble into original image by authorized contributors. In second, Shamir’s threshold scheme is designed for authentication of shared associated stego-cover images before starting the extraction process. This process provides an extremely secured construction of shared secret information. In third, image is divided in 2x2 blocks of pixels and traverses it in zig-zag manner; the pixel value difference is computed for all Red, Green, and Blue (RGB) components between non-overlapping pixels of selected diagonal path with in targeted block. Secret bits are concealed inside RGB color pixels of cover image by utilizing proposed novel pixel-value differencing (PVD) scheme, furthermore varying embedding capacity may be obtained by controlling the selection of number of 2x2 block. Exploratory result displays that the proposed approach provides productive algorithms in term multilayer unbreakable security and higher payload of embedded information.


Sign in / Sign up

Export Citation Format

Share Document