pixel value differencing
Recently Published Documents


TOTAL DOCUMENTS

152
(FIVE YEARS 45)

H-INDEX

19
(FIVE YEARS 3)

Author(s):  
Wen-Bin Lin ◽  
Tai-Hung Lai ◽  
Ko-Chin Chang

AbstractPixel-value differencing (PVD) steganography is a popular spatial domain technology. Several PVD-based studies have proposed extended PVD steganography methods. The majority of these studies have verified their security against the regular-singular (RS) analysis. However, RS analysis is aimed at the feature of the least significant bit substitution method, which is relatively less significant for PVD steganography. The pixel difference histogram (PDH) is generally utilized to attack PVD steganography. If the embedding capacity is high, then the features on the PDH are evident; otherwise, the features are less obvious. In this paper, we propose a statistical feature-based steganalysis technique for the original PVD steganography. Experimental results demonstrate that, compared with existing steganalysis technique with weighted stego-image (WS) method, the proposed method effectively detects PVD steganography at low embedding ratios, such that there is no need of using the original embedding parameters. Furthermore, the accuracy and precision of the method are better than those of existing PVD steganalysis techniques. Therefore, the proposed method contributes to the security analysis of the original PVD steganography as an alternative to the commonly used RS, PDH and WS attack techniques.


2021 ◽  
Vol 8 (9) ◽  
pp. 373-377
Author(s):  
Alade Oluwaseun. Modupe ◽  
Amusan Elizabeth Adedoyin ◽  
Adedeji Oluyinka Titilayo

Steganography is the art and science of hiding information by embedding data into cover media. Numerous techniques are designed to provide the security for the communication of data over the Internet. A good steganographic algorithm is recognized by the performance of the techniques measured with the support of the performance metrics among which are PSNR, MSE, SSIM, robustness and capacity to hide the information in the cover image. In this paper a comparative analysis of Least Significant Bit (LSB), Most Significant Bit (MSB) and Pixel Value Differencing (PVD) image steganography in grayscale and colored images was performed. Three different cover images was used to hide secret message. A comparative performance analysis of LSB, MSB and PVD methods used in image steganography was performed using peak signal to noise ratio (PSNR), Mean square error (MSE) and Structural Similarity index (SSIM) as performance metrics. LSB technique gives higher PSNR and SSIM values than MSB and PVD method with lower MSE than the other two techniques. Future research can be geared towards investigating the embedding capacity, security, and computational complexity of each technique. Keywords: Least Significant Bit (LSB), Most Significant Bit (MSB), Pixel value differencing (PVD), PSNR, SSIM and MSE,


Author(s):  
Oluwaseun M. Alade ◽  
Elizabeth A. Amusan ◽  
Oluyinka T. Adedeji ◽  
Oluwaseun O. Alo

Steganography deals with the ways of hiding communicated data in such a way that it remains confidential. Finding best position inside cover image to embed text message, maintaining a reasonable trade-off between security, robustness, higher bit embedding rate and imperceptibility are some of the challenges of steganography system. Hence, this paper presents firefly algorithm for finding best positions inside cover image in order to embed text message into cover image using Pixel Value Differencing (PVD) technique. Four different cover image was used. Experimental result showed the cover image with selected location using firefly algorithm as well as the stego image using PVD technique. The stego image was evaluated using Peak Signal to Noise Ratio (PSNR) and Mean square Error (MSE).  Firefly Algorithm with PVD technique produced a promising result for image steganography.


2021 ◽  
Author(s):  
Wen-Bin Lin ◽  
Tai-Hung Lai ◽  
Ko-Chin Chang

Abstract The security and embedding capacity of pixel-value differencing (PVD) steganography is superior to that of least significant bit replacement steganography. Several studies have proposed extended PVD steganography methods that use the original concept of PVD steganography. The majority of the studies have verified their security against regular-singular detection analysis or pixel difference histogram attacks. Weighted stego image steganalysis is the state-of-the-art technology for PVD steganography. This study proposed a suitable parameter for the estimator based on different relative embedding ratios and the size of normal embedding blocks. The experimental results revealed that the proposed technology does not require advance knowledge of the original image. In addition, the proposed method is accurate and precise at any embedding ratio. In the future, this method may be utilized to analyze the security of extended PVD steganography.


Author(s):  
Mehdi Hussain ◽  
Qaiser Riaz ◽  
Shahzad Saleem ◽  
Abdul Ghafoor ◽  
Ki-Hyun Jung

2021 ◽  
Author(s):  
Mark R. Hedrick ◽  
Justin Holman

Abstract The paper introduces StegArmory, a new open source software package with practical applications for offensive cyber security operators. StegArmory uses steganography techniques to embed machine code, or shellcode, in images. Shellcode is typically flagged as malicious by antivirus software due to the payloads they often contain, but detection becomes more difficult when shellcode is embedded in a common image file. Using steganography to embed shellcode within portable network graphic (PNG) images, StegArmory provides a new way to avoid detection of potentially malicious payloads while ensuring reliable transmission. In this paper, the StegArmory software development process is described, performance benchmarks are established and detection metrics are measured using sample cover images. Two image-based steganography techniques are utilized, least significant bit (LSB) and pixel value differencing (PVD). Test results indicate the software effectively produces PNG image files, using both LSBand PVD approaches, with embedded shellcode capable of avoiding malicious payload detection. The LSB method is faster but the PVD method handles larger payloads and image modifications are more difficult to detect.


Sign in / Sign up

Export Citation Format

Share Document