Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Image steganographic scheme based on pixel-value differencing and LSB replacement methods

Image steganographic scheme based on pixel-value differencing and LSB replacement methods

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IEE Proceedings - Vision, Image and Signal Processing — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In order to improve the capacity of the hidden secret data and to provide an imperceptible stego-image quality, a novel steganographic method based on least-significant-bit (LSB) replacement and pixel-value differencing (PVD) method is presented. First, a different value from two consecutive pixels by utilising the PVD method is obtained. A small difference value can be located on a smooth area and the large one is located on an edged area. In the smooth areas, the secret data is hidden into the cover image by LSB method while using the PVD method in the edged areas. Because the range width is variable, and the area in which the secret data is concealed by LSB or PVD method are hard to guess, the security level is the same as that of a single using the PVD method of the proposed method. From the experimental results, compared with the PVD method being used alone, the proposed method can hide a much larger information and maintains a good visual quality of stego-image.

References

    1. 1)
    2. 2)
    3. 3)
      • S. Walton . Image authentication for a slippery new age. Dr. Dobb's J. , 4 , 18 - 26
    4. 4)
    5. 5)
      • B. Schneier . (1996) Applied cryptography.
    6. 6)
    7. 7)
    8. 8)
      • F. Hartung , M. Kutter . Information hiding - a survey. Proc. IEEE , 1062 - 1078
    9. 9)
    10. 10)
    11. 11)
    12. 12)
    13. 13)
      • Simmons, G.J.: `The prisoners' problem and the subliminal channel.', CRYPTO'83, 1983, p. 51–67.
    14. 14)
http://iet.metastore.ingenta.com/content/journals/10.1049/ip-vis_20059022
Loading

Related content

content/journals/10.1049/ip-vis_20059022
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address