SlideShare a Scribd company logo
1 of 4
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 5, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1147
Abstract— Steganography is the art and science of invisible
communication, which hides the existence of the
communicated message into media such as text, audio,
image and video without any suspicion. Steganography is
different from cryptography and watermarking in its
objectives which includes undetectability, robustness
(resistance to various image processing methods and
compression) and capacity of the hidden data. Image
Steganography uses digital image as its cover media. This
paper analyzes and discusses various techniques available
today for image steganography along with their strengths
and weaknesses.
Keywords: Image steganography, LSB encoding, payload,
cover image, stego image, security.
I. INTRODUCTION
In recent years, the security and the confidentiality of the
sensitive data has become of prime and supreme importance
due to the explosive growth of internet and the fast
communication techniques. Therefore how to protect secret
messages during transmission becomes an important
issue and hiding data provides a good layer of protection on
the secret message. One of the widely accepted data hiding
technique is image steganography. Image steganography
uses a digital image as cover media and hence it is called
cover image. The data is hidden in the cover image and the
resulting image is called stego image. The data can be
extracted out from the stego image and the existence of a
hidden message in the cover image is invisible. The
embedding of data in an image can cause distortion in the
cover image and this distortion caused by data embedding is
called embedding distortion. A good data-hiding method
should be immune to statistical and visual detection while
providing an adjustable payload [1], [2]. There are a number
of techniques available which can perform image
steganography in a digital image and this paper focuses on
analysing the different techniques and proposing a method
which can offer better results over the methods that are
studied.
Digital SteganographyA.
A digital stenographic encoder is shown on Figure 1. The
message can be text, images, audio, video, or any other data
that can be represented by a stream of bits and it is the data
that the sender wishes to keep confidential. The cover or
host is the medium in which the message is embedded and
serves to hide the presence of the message. This is also
called as the message wrapper. The structure of the cover
strongly influences the message embedding technique. It is
not required to have a homogeneous structure for the cover
and the message.
The image with the secretly embedded message is the stego-
image and is produced by the encoder. It is required that
under casual inspection and analysis the stego-image should
resemble the cover image. In addition, the encoder usually
makes use of a stego-key(optional) which ensures that only
recipients who know the corresponding decoding key will
be able to extract the message from a stego-image.[3]
Fig. 1: Steganographic Encoding
Human Visual System and Image SteganographyB.
The property of human eye on how an image is perceived is
exploited by the human visual system (HVS). Certain
characteristics of an image and not easily visible to human
eye and those characteristics can be used and combined with
image steganography to avoid visual and statistical detection
of the embedded data. The key factors [20] which influence
them include:
1. The eye is less sensitive to noise in the high
resolution bands and in those bands having
orientation of 45.
2. The eye is less sensitive to noise in those areas of
the image where brightness is high or low.
3. The eye is less sensitive to noise in highly textured
areas, but, among these, more sensitive near the
edges.
These properties can prove handy when combined and
exploited in image steganography. Many of the data
embedding techniques developed so far has concentrated
only on the data hiding aspect of image steganography and
not on studying the image characteristics and hiding the
data.
The rest of this paper is organized as follows. Section 2
explains the various methods developed for image
steganography, and also provides the comparisons of
various steganography techniques, a proposed system is
presented in section 3 and section 4 includes conclusion and
remarks.
II. SURVEY
There are various data hiding techniques developed in recent
years.
A Survey of different Data Hiding Techniques in Digital Images
Akhil P V1
Divya John2
1
M.Tech 2
Assistant Professor
1,2
Department of Computer Science and Engineering
1,2
Federal Institute of Science and Technology (FISAT) Angamaly, India
A Survey of different Data Hiding Techniques in Digital Images
(IJSRD/Vol. 1/Issue 5/2013/028)
All rights reserved by www.ijsrd.com 1148
J. Mielikainen developed a method [4] which is based on
pixel pair matching and it uses a pair of pixels as the
embedding unit. The LSB of first pixel carries one bit of
information and a binary function of the two pixel values
carry another bit of information. This method offers same
payload (number of bits embedded in the cover image) as
LSB matching with fewer changes to cover image. The
MSE of LSB for 1 bpp is 0.5, while for LSBMR it is 0.375.
OPAP [5] is an enhancement of LSB substitution method
and it is based on embedding error. It uses only one pixel as
embedding unit. In this method, for a m-bit pixel, if
message bits are embedded to the right-most r LSB’s then
other m-r bits are adjusted by a simple evaluation. These m-r
bits are either replaced by the adjusted result or otherwise
kept unmodified based on if the adjusted result offers
smaller distortion.
An improvement of LSB matching revisited method is EMD
[6] in which each (2n+1)-ary notational system is carried by
n cover pixels and at most only one pixel is increased or
decreased by 1. The secret message is converted into a
sequence of digits in the notational system with an odd base.
Then pseudo-randomly permute all cover pixels according
to a secret key, and divide them into a series of pixel-groups,
each containing n pixels. The method is able to provide
better stego-image quality under the same payload than
traditional LSB.
Diamond Encoding [7] is an extension of EMD method and
it first partitions the cover image into non-overlapping
blocks of two consecutive pixels and transforms the
message to a series of K-ary digits. For each block a
Diamond Characteristic Value (DCV) is calculated and one
secret K-ary digit is concealed into DCV. The DCV is
modified to secret digit and it is done by adjusting pixel
values in a block. This method is capable of hiding more
secret data while keeping the stego-image quality
degradation imperceptible.
Method used in [8] is an enhancement of the EMD method
and this method segments the cover image into pixel
sections and each section is partitioned into the selective and
descriptive groups. The EMD embedding procedure is then
performed on each group by referencing a predefined
selector and descriptor table. The method combines different
pixel groups of the cover image to represent more
embedding directions with less pixel changes than the EMD
method. By selecting the appropriate combination of pixel
groups, the embedding efficiency and the visual quality of
the stego image is enhanced. It offers higher embedding
efficiency than EMD method.
The method [9] partitions the cover image into non-
overlapping blocks of two consecutive pixels. The
difference value is calculated from the values of the two
pixels in each block and all possible difference values are
classified into a number of ranges. The selection of the
range of intervals is based on the characteristics of human
vision’s sensitivity to gray scale values from smoothness to
contrast. The difference value is then replaced by a new
value to embed the value of a sub-stream of the secret
message. The resultant image offers better quality results.
Optimized Bit Plane splicing algorithm [22] is implemented
by M. Naseem et.al. Where in the pixels are grouped based
on their intensity and then the number of bits are to
represent the hidden data are chosen. As the bits are grouped
based on the intensity of the pixels, more number of darker
intensity pixels can be used to represent the hidden data than
just the LSB.
Edge Adaptive Image steganography [10] extends the LSB
matching revisited steganography. The method first divides
the cover pixels into blocks and rotates each block by a
random degree based on the secret key. The rotation causes
new edges to appear and among the edges a threshold value
is used to get the most suitable areas where data is hidden.
Now the blocks are rotated back to normal and thus the data
gets embedded. The reverse of the method is employed to
extract the data. The method offers better image quality and
immunity to steganalysis than the LSBMR method.
Reversible data embedding using interpolation and reference
pixel distribution introduced in [11] is a reversible data
hiding method based on image interpolation and detection of
smooth and complex regions in the cover image. A binary
image that represents the locations of reference pixels is
constructed according to the local image activity. In
complex regions, more reference pixels are chosen and
fewer pixels are used for embedding and vice-versa for
smooth regions. Pixels are interpolated according to the
constructed binary image, and interpolation errors are then
used to embed data through histogram shifting. It offers
better prediction and a mechanism to add or remove
reference pixels based on local image characteristics. The
method achieves better PSNR for a range of embedding
rates.
In [23] the authors implemented a Combined Linked-list and
LSB technique that uses the concept linked list of randomly
embedding the data in the image and linking them together.
The attacker is unable to guess the next message as the data
is not hidden sequentially. Also, without the password it is
not possible to access the hidden data. Thus it offers some
security to the data. The implementation of the method is
time consuming
Pixel Pair Matching(PPM) [12] method uses the values of
pixel pair as a reference coordinate, and search a coordinate
in the neighborhood set of this pixel pair according to a
given message digit. The searched digit conceals the digit
and it replaces the pixel pair. It makes use of a more
compact neighborhood set than used in Diamond encoding.
The extraction process finds the replaced pixel pair to
extract the message data. Exploiting Modification Direction
(EMD) method has a maximum capacity of 1.161 bpp and
Diamond Encoding(DE) extends the payload of EMD by
embedding digits in a larger notational system. The
proposed method offers lower distortion than DE by
providing more compact neighborhood sets and allowing
embedded digits in any notational system. Compared with
the optimal pixel adjustment process (OPAP) method, the
proposed method always has lower distortion for various
payloads.
The proposed method in [13] is a hiding scheme by
replacing the LSB of a cover according to the difference
values between a pixel and its four touching neighbors.
Although this method can embed most secret data along
sharper edges and can achieve more visually imperceptible
stegos, the security performance is poor. Since the method
just modifies the LSB of image pixels when hiding data, it
A Survey of different Data Hiding Techniques in Digital Images
(IJSRD/Vol. 1/Issue 5/2013/028)
All rights reserved by www.ijsrd.com 1149
can be easily detected by existing steganalytic algorithms,
such as the RS analysis.
Besides the methods discussed above the table 1 compares
six different data embedding schemes on digital images
highlighting their advantages and disadvantages.
Table 1: Comparison of Various Schemes
III. PROPOSED SYSTEM
The data embedding methods discussed so far does not take
into consideration any of the image characteristics. A good
data-hiding method should be capable of evading visual and
statistical detection while providing an adjustable payload.
This immunity can be achieved by exploiting the
characteristics of the human visual system (HVS).If the
image characteristics are considered and candidate areas in
an image for data embedding are found out, the data can be
embedded on those areas, and the result can offer more
immunity towards statistical and visual evaluation methods
of steganography. The Pixel Pair Matching(PPM) method
has only very little detection methods available and is
considered to be a method which offers very good results.
The proposed method uses three levels of masking namely,
Spatial frequency masking, luminance masking and texture
masking. These three masking considers the image
characteristics and extracts out the suitable regions for data
embedding. The combined result of three levels of masking
is considered as the candidate area for data embedding. The
resultant area applies the Pixel Pair Matching(PPM) method
where the values of pixel pair as a reference coordinate, and
search a coordinate in the neighborhood set of this pixel pair
according to a given message digit. The searched digit
conceals the digit and it replaces the pixel pair. Thus the
data is embedded in the cover image and during extraction,
the corresponding pixel pair is found to extract the data. The
resultant image produces no artifacts in stego-images and
the steganalysis results are similar to those of the cover
images, it offers a secure communication under adjustable
embedding capacity. The proposed method is shown in
figure 2.
Fig. 2: Proposed System
IV. CONCLUSION
This article discussed the steganography technique and then
the various methods available for data embedding in a
digital image. Comparative study for various methods is also
provided. The methods were closely observed for their
limitations and based on this a new method was proposed
which combines the idea of considering the image
characteristics along with the pixel pair matching technique.
The proposed method is expected to offer better results over
any of the available techniques.
V. REFERENCES
[1] T. Filler, J. Judas, and J. Fridrich, “Minimizing
embedding impact in steganography using trellis-
coded quantization,” in Proc. SPIE, Media Forensics
and Security, 2010, vol. 7541, DOI:
10.1117/12.838002.
[2] S. Lyu and H. Farid, “Steganalysis using higher-order
image statistics,”IEEE Trans. Inf. Forensics Security,
vol. 1, no. 1, pp. 111–119, Mar.2006.
[3] E Lin and E Delp, “A Review of Data Hiding in
Digital Images” CERIAS Tech Report 2001-139
[4] J. Mielikainen, “LSB matching revisited,” IEEE
Signal Process. Lett., vol. 13, no. 5, pp. 285–287,
May 2006.
A Survey of different Data Hiding Techniques in Digital Images
(IJSRD/Vol. 1/Issue 5/2013/028)
All rights reserved by www.ijsrd.com 1150
[5] C. K. Chan and L. M. Cheng, “Hiding data in images
by simple LSB substitution,” Pattern Recognit., vol.
37, no. 3, pp. 469–474, 2004.
[6] X .Zhang and S. Wang, “Efficient steganographic
embedding by exploiting modification direction,”
IEEE Commun. Lett., vol. 10, no. 11, pp. 781–783,
Nov. 2006
[7] R.M. Chao, H. C. Wu, C. C. Lee, and Y. P. Chu, “A
novel image data hiding scheme with diamond
encoding,” EURASIP J. Inf. Security, vol. 2009,
2009, DOI: 10.1155/2009/658047, Article ID
658047.
[8] J. Wang, Y. Sun, H. Xu, K. Chen, H. J. Kim, and S.
H. Joo, “An improved section-wise exploiting
modification direction method,” Signal Process., vol.
90, no. 11, pp. 2954–2964, 2010.
[9] Da-Chun Wu, Wen-Hsiang Tsai, “A steganographic
method for images by pixel-value differencing”,
ELSEVIER Pattern Recognition Letters 24 (2003)
1613–1626
[10] Weiqi Luo, Fangjun Huang, “Edge Adaptive Image
Steganography Based on LSB Matching Revisited” ,
IEEE ransactions on infoemation forensics and
security, Vol. 5, No. 2, June 2010
[11] W Hong and T. S. Chen, “Reversible data embedding
for high quality images using interpolation and
reference pixel distribution mechanism,” J. Vis.
Commun. Image Represent., vol. 22, no. 2, pp. 131–
140, 2011.
[12] Wien Hong ,Tung-Shou Chen, “A Novel Data
Embedding Method Using Adaptive Pixel Pair
Matching”, IEEE transactions on information
forensics and security, Vol. 7, No. 1, February 2012.
[13] K. Hempstalk, “Hiding behind corners: Using edges
in images for better steganography,” in Proc.
Computing Women’s Congress, Hamilton, New
Zealand, 2006.
[14] V.M. Potdar, S. Han, E. Chang, Fingerprinted secret
sharing steganography for robustness against image
cropping attacks, Proceedings of IEEE Third
International Conference on Industrial Informatics
(TNDIN), Perth, Australia, 10-12 August 2005,pp.
717- 724.
[15] Fei Peng, XiaolongLi, BinYang, “Adaptive reversible
data hiding scheme based on integer transform”.
Signal Processing (2012) 54–62
[16] Anastasia Ioannidou , Spyros T. Halkidis , George
Stephanides, “A novel technique for image
steganography based on a high payload method and
edge detection”, Expert Systems with Applications 39
(2012) 11517–11524
[17] P.Y. Tsai, Y.C. Hu, H.L. Yeh, Reversible image
hiding scheme using predictive coding and histogram
shifting, Signal Processing 89 (6) (2009) 1129–1143.
[18] D.M.Thodi, J.J. Rodrı´guez, Expansion embedding
techniques for reversible watermarking, IEEE
Transactions on Image Processing 16 (3) (2007) 721–
730.
[19] Z. Ni, Y.Q. Shi, N. Ansari, W. Su, Reversible data
hiding, IEEE Transactions on Circuits and Systems
for Video Technology 16 (3) (2006) 354–362.
[20] M. Barni, F. Bartolini, V. Cappelini, A. Lipi, and A.
Piva, “Improved wavelet-based watermarking
through pixel-wise masking,” IEEE Trans. Image
Process., vol. 10, no. 5, pp. 783–791, May 2001.
[21] M. Naseem, Ibrahim M. Hussain, M. Kamran Khan,
Aisha Ajmal, “An Optimum Modified Bit Plane
Splicing LSB Algorithm for Secret Data Hiding”,
International Journal of Computer Applications, Vol.
29, No. 12, 2011. Foundation of Computer Science,
New York, USA, pp. 36-43.
[22] M. Nosrati, R. Karimi, H. Nosrati, and A. Nosrati,
“Embedding stego-text in cover images using linked
list concepts and LSB technique”, Journal of
American Science, Vol. 7, No. 6, 2011, pp. 97-100.

More Related Content

What's hot

A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit Goel
Mohit Goel
 
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNELA NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
ijcsit
 

What's hot (17)

A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATIONUSING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
 
E017443136
E017443136E017443136
E017443136
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
C010511420
C010511420C010511420
C010511420
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit Goel
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
 
Advanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubeyAdvanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubey
 
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNELA NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Lecture1
Lecture1Lecture1
Lecture1
 
An enhanced least significant bit steganographic method for information hiding
An enhanced least significant bit steganographic method for information hidingAn enhanced least significant bit steganographic method for information hiding
An enhanced least significant bit steganographic method for information hiding
 
G017444651
G017444651G017444651
G017444651
 

Viewers also liked

Design and Implementation of High Resolution Data Acquisition System
Design and Implementation of High Resolution Data Acquisition SystemDesign and Implementation of High Resolution Data Acquisition System
Design and Implementation of High Resolution Data Acquisition System
ijsrd.com
 

Viewers also liked (14)

A Compressed Sensing Approach to Image Reconstruction
A Compressed Sensing Approach to Image ReconstructionA Compressed Sensing Approach to Image Reconstruction
A Compressed Sensing Approach to Image Reconstruction
 
Effect of Sterilization on Elastomeric components Used in Pharmaceutical Indu...
Effect of Sterilization on Elastomeric components Used in Pharmaceutical Indu...Effect of Sterilization on Elastomeric components Used in Pharmaceutical Indu...
Effect of Sterilization on Elastomeric components Used in Pharmaceutical Indu...
 
Green Marketing Revolution in India
Green Marketing Revolution in IndiaGreen Marketing Revolution in India
Green Marketing Revolution in India
 
A Monitor System in Data Redundancy in Information System
A Monitor System in Data Redundancy in Information SystemA Monitor System in Data Redundancy in Information System
A Monitor System in Data Redundancy in Information System
 
A Review on Effect of Process Parameters on Tensile Strength of Friction Stir...
A Review on Effect of Process Parameters on Tensile Strength of Friction Stir...A Review on Effect of Process Parameters on Tensile Strength of Friction Stir...
A Review on Effect of Process Parameters on Tensile Strength of Friction Stir...
 
Designing PCI/AHB Bridge
Designing PCI/AHB BridgeDesigning PCI/AHB Bridge
Designing PCI/AHB Bridge
 
Design and Implementation of High Resolution Data Acquisition System
Design and Implementation of High Resolution Data Acquisition SystemDesign and Implementation of High Resolution Data Acquisition System
Design and Implementation of High Resolution Data Acquisition System
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
 
Review on Scheduling based Resource Allocation in Cloud computing
Review on Scheduling based Resource Allocation in Cloud computingReview on Scheduling based Resource Allocation in Cloud computing
Review on Scheduling based Resource Allocation in Cloud computing
 
Design & Implementation of LUT Based Multiplier Using APCOMS Technique
Design & Implementation of LUT Based Multiplier Using APCOMS TechniqueDesign & Implementation of LUT Based Multiplier Using APCOMS Technique
Design & Implementation of LUT Based Multiplier Using APCOMS Technique
 
Simulation of D-STATCOM to study Voltage Stability in Distribution system
Simulation of D-STATCOM to study Voltage Stability in Distribution systemSimulation of D-STATCOM to study Voltage Stability in Distribution system
Simulation of D-STATCOM to study Voltage Stability in Distribution system
 
Guidelines to Understanding to estimate MTBF
Guidelines to Understanding to estimate MTBFGuidelines to Understanding to estimate MTBF
Guidelines to Understanding to estimate MTBF
 
Reversible Digital Watermarking of Audio Wav Signal Using Additive Interpolat...
Reversible Digital Watermarking of Audio Wav Signal Using Additive Interpolat...Reversible Digital Watermarking of Audio Wav Signal Using Additive Interpolat...
Reversible Digital Watermarking of Audio Wav Signal Using Additive Interpolat...
 
Wireless Telemetry System
Wireless Telemetry SystemWireless Telemetry System
Wireless Telemetry System
 

Similar to A Survey of different Data Hiding Techniques in Digital Images

Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
IJCNCJournal
 
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
IJCNCJournal
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD Editor
 

Similar to A Survey of different Data Hiding Techniques in Digital Images (20)

Security and imperceptibility improving of image steganography using pixel al...
Security and imperceptibility improving of image steganography using pixel al...Security and imperceptibility improving of image steganography using pixel al...
Security and imperceptibility improving of image steganography using pixel al...
 
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
 
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
O017429398
O017429398O017429398
O017429398
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
N043020970100
N043020970100N043020970100
N043020970100
 
Message Camouflage in an Image using EDGE-Based Steganography
Message Camouflage in an Image using EDGE-Based SteganographyMessage Camouflage in an Image using EDGE-Based Steganography
Message Camouflage in an Image using EDGE-Based Steganography
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 
C010231217
C010231217C010231217
C010231217
 
Adaptive block-based pixel value differencing steganography
Adaptive block-based pixel value  differencing steganographyAdaptive block-based pixel value  differencing steganography
Adaptive block-based pixel value differencing steganography
 
Bp34412415
Bp34412415Bp34412415
Bp34412415
 
Q180304102109
Q180304102109Q180304102109
Q180304102109
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
A secure image steganography based on JND model
A secure image steganography based on JND model A secure image steganography based on JND model
A secure image steganography based on JND model
 

More from ijsrd.com

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (20)

S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 

A Survey of different Data Hiding Techniques in Digital Images

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 5, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 1147 Abstract— Steganography is the art and science of invisible communication, which hides the existence of the communicated message into media such as text, audio, image and video without any suspicion. Steganography is different from cryptography and watermarking in its objectives which includes undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data. Image Steganography uses digital image as its cover media. This paper analyzes and discusses various techniques available today for image steganography along with their strengths and weaknesses. Keywords: Image steganography, LSB encoding, payload, cover image, stego image, security. I. INTRODUCTION In recent years, the security and the confidentiality of the sensitive data has become of prime and supreme importance due to the explosive growth of internet and the fast communication techniques. Therefore how to protect secret messages during transmission becomes an important issue and hiding data provides a good layer of protection on the secret message. One of the widely accepted data hiding technique is image steganography. Image steganography uses a digital image as cover media and hence it is called cover image. The data is hidden in the cover image and the resulting image is called stego image. The data can be extracted out from the stego image and the existence of a hidden message in the cover image is invisible. The embedding of data in an image can cause distortion in the cover image and this distortion caused by data embedding is called embedding distortion. A good data-hiding method should be immune to statistical and visual detection while providing an adjustable payload [1], [2]. There are a number of techniques available which can perform image steganography in a digital image and this paper focuses on analysing the different techniques and proposing a method which can offer better results over the methods that are studied. Digital SteganographyA. A digital stenographic encoder is shown on Figure 1. The message can be text, images, audio, video, or any other data that can be represented by a stream of bits and it is the data that the sender wishes to keep confidential. The cover or host is the medium in which the message is embedded and serves to hide the presence of the message. This is also called as the message wrapper. The structure of the cover strongly influences the message embedding technique. It is not required to have a homogeneous structure for the cover and the message. The image with the secretly embedded message is the stego- image and is produced by the encoder. It is required that under casual inspection and analysis the stego-image should resemble the cover image. In addition, the encoder usually makes use of a stego-key(optional) which ensures that only recipients who know the corresponding decoding key will be able to extract the message from a stego-image.[3] Fig. 1: Steganographic Encoding Human Visual System and Image SteganographyB. The property of human eye on how an image is perceived is exploited by the human visual system (HVS). Certain characteristics of an image and not easily visible to human eye and those characteristics can be used and combined with image steganography to avoid visual and statistical detection of the embedded data. The key factors [20] which influence them include: 1. The eye is less sensitive to noise in the high resolution bands and in those bands having orientation of 45. 2. The eye is less sensitive to noise in those areas of the image where brightness is high or low. 3. The eye is less sensitive to noise in highly textured areas, but, among these, more sensitive near the edges. These properties can prove handy when combined and exploited in image steganography. Many of the data embedding techniques developed so far has concentrated only on the data hiding aspect of image steganography and not on studying the image characteristics and hiding the data. The rest of this paper is organized as follows. Section 2 explains the various methods developed for image steganography, and also provides the comparisons of various steganography techniques, a proposed system is presented in section 3 and section 4 includes conclusion and remarks. II. SURVEY There are various data hiding techniques developed in recent years. A Survey of different Data Hiding Techniques in Digital Images Akhil P V1 Divya John2 1 M.Tech 2 Assistant Professor 1,2 Department of Computer Science and Engineering 1,2 Federal Institute of Science and Technology (FISAT) Angamaly, India
  • 2. A Survey of different Data Hiding Techniques in Digital Images (IJSRD/Vol. 1/Issue 5/2013/028) All rights reserved by www.ijsrd.com 1148 J. Mielikainen developed a method [4] which is based on pixel pair matching and it uses a pair of pixels as the embedding unit. The LSB of first pixel carries one bit of information and a binary function of the two pixel values carry another bit of information. This method offers same payload (number of bits embedded in the cover image) as LSB matching with fewer changes to cover image. The MSE of LSB for 1 bpp is 0.5, while for LSBMR it is 0.375. OPAP [5] is an enhancement of LSB substitution method and it is based on embedding error. It uses only one pixel as embedding unit. In this method, for a m-bit pixel, if message bits are embedded to the right-most r LSB’s then other m-r bits are adjusted by a simple evaluation. These m-r bits are either replaced by the adjusted result or otherwise kept unmodified based on if the adjusted result offers smaller distortion. An improvement of LSB matching revisited method is EMD [6] in which each (2n+1)-ary notational system is carried by n cover pixels and at most only one pixel is increased or decreased by 1. The secret message is converted into a sequence of digits in the notational system with an odd base. Then pseudo-randomly permute all cover pixels according to a secret key, and divide them into a series of pixel-groups, each containing n pixels. The method is able to provide better stego-image quality under the same payload than traditional LSB. Diamond Encoding [7] is an extension of EMD method and it first partitions the cover image into non-overlapping blocks of two consecutive pixels and transforms the message to a series of K-ary digits. For each block a Diamond Characteristic Value (DCV) is calculated and one secret K-ary digit is concealed into DCV. The DCV is modified to secret digit and it is done by adjusting pixel values in a block. This method is capable of hiding more secret data while keeping the stego-image quality degradation imperceptible. Method used in [8] is an enhancement of the EMD method and this method segments the cover image into pixel sections and each section is partitioned into the selective and descriptive groups. The EMD embedding procedure is then performed on each group by referencing a predefined selector and descriptor table. The method combines different pixel groups of the cover image to represent more embedding directions with less pixel changes than the EMD method. By selecting the appropriate combination of pixel groups, the embedding efficiency and the visual quality of the stego image is enhanced. It offers higher embedding efficiency than EMD method. The method [9] partitions the cover image into non- overlapping blocks of two consecutive pixels. The difference value is calculated from the values of the two pixels in each block and all possible difference values are classified into a number of ranges. The selection of the range of intervals is based on the characteristics of human vision’s sensitivity to gray scale values from smoothness to contrast. The difference value is then replaced by a new value to embed the value of a sub-stream of the secret message. The resultant image offers better quality results. Optimized Bit Plane splicing algorithm [22] is implemented by M. Naseem et.al. Where in the pixels are grouped based on their intensity and then the number of bits are to represent the hidden data are chosen. As the bits are grouped based on the intensity of the pixels, more number of darker intensity pixels can be used to represent the hidden data than just the LSB. Edge Adaptive Image steganography [10] extends the LSB matching revisited steganography. The method first divides the cover pixels into blocks and rotates each block by a random degree based on the secret key. The rotation causes new edges to appear and among the edges a threshold value is used to get the most suitable areas where data is hidden. Now the blocks are rotated back to normal and thus the data gets embedded. The reverse of the method is employed to extract the data. The method offers better image quality and immunity to steganalysis than the LSBMR method. Reversible data embedding using interpolation and reference pixel distribution introduced in [11] is a reversible data hiding method based on image interpolation and detection of smooth and complex regions in the cover image. A binary image that represents the locations of reference pixels is constructed according to the local image activity. In complex regions, more reference pixels are chosen and fewer pixels are used for embedding and vice-versa for smooth regions. Pixels are interpolated according to the constructed binary image, and interpolation errors are then used to embed data through histogram shifting. It offers better prediction and a mechanism to add or remove reference pixels based on local image characteristics. The method achieves better PSNR for a range of embedding rates. In [23] the authors implemented a Combined Linked-list and LSB technique that uses the concept linked list of randomly embedding the data in the image and linking them together. The attacker is unable to guess the next message as the data is not hidden sequentially. Also, without the password it is not possible to access the hidden data. Thus it offers some security to the data. The implementation of the method is time consuming Pixel Pair Matching(PPM) [12] method uses the values of pixel pair as a reference coordinate, and search a coordinate in the neighborhood set of this pixel pair according to a given message digit. The searched digit conceals the digit and it replaces the pixel pair. It makes use of a more compact neighborhood set than used in Diamond encoding. The extraction process finds the replaced pixel pair to extract the message data. Exploiting Modification Direction (EMD) method has a maximum capacity of 1.161 bpp and Diamond Encoding(DE) extends the payload of EMD by embedding digits in a larger notational system. The proposed method offers lower distortion than DE by providing more compact neighborhood sets and allowing embedded digits in any notational system. Compared with the optimal pixel adjustment process (OPAP) method, the proposed method always has lower distortion for various payloads. The proposed method in [13] is a hiding scheme by replacing the LSB of a cover according to the difference values between a pixel and its four touching neighbors. Although this method can embed most secret data along sharper edges and can achieve more visually imperceptible stegos, the security performance is poor. Since the method just modifies the LSB of image pixels when hiding data, it
  • 3. A Survey of different Data Hiding Techniques in Digital Images (IJSRD/Vol. 1/Issue 5/2013/028) All rights reserved by www.ijsrd.com 1149 can be easily detected by existing steganalytic algorithms, such as the RS analysis. Besides the methods discussed above the table 1 compares six different data embedding schemes on digital images highlighting their advantages and disadvantages. Table 1: Comparison of Various Schemes III. PROPOSED SYSTEM The data embedding methods discussed so far does not take into consideration any of the image characteristics. A good data-hiding method should be capable of evading visual and statistical detection while providing an adjustable payload. This immunity can be achieved by exploiting the characteristics of the human visual system (HVS).If the image characteristics are considered and candidate areas in an image for data embedding are found out, the data can be embedded on those areas, and the result can offer more immunity towards statistical and visual evaluation methods of steganography. The Pixel Pair Matching(PPM) method has only very little detection methods available and is considered to be a method which offers very good results. The proposed method uses three levels of masking namely, Spatial frequency masking, luminance masking and texture masking. These three masking considers the image characteristics and extracts out the suitable regions for data embedding. The combined result of three levels of masking is considered as the candidate area for data embedding. The resultant area applies the Pixel Pair Matching(PPM) method where the values of pixel pair as a reference coordinate, and search a coordinate in the neighborhood set of this pixel pair according to a given message digit. The searched digit conceals the digit and it replaces the pixel pair. Thus the data is embedded in the cover image and during extraction, the corresponding pixel pair is found to extract the data. The resultant image produces no artifacts in stego-images and the steganalysis results are similar to those of the cover images, it offers a secure communication under adjustable embedding capacity. The proposed method is shown in figure 2. Fig. 2: Proposed System IV. CONCLUSION This article discussed the steganography technique and then the various methods available for data embedding in a digital image. Comparative study for various methods is also provided. The methods were closely observed for their limitations and based on this a new method was proposed which combines the idea of considering the image characteristics along with the pixel pair matching technique. The proposed method is expected to offer better results over any of the available techniques. V. REFERENCES [1] T. Filler, J. Judas, and J. Fridrich, “Minimizing embedding impact in steganography using trellis- coded quantization,” in Proc. SPIE, Media Forensics and Security, 2010, vol. 7541, DOI: 10.1117/12.838002. [2] S. Lyu and H. Farid, “Steganalysis using higher-order image statistics,”IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 111–119, Mar.2006. [3] E Lin and E Delp, “A Review of Data Hiding in Digital Images” CERIAS Tech Report 2001-139 [4] J. Mielikainen, “LSB matching revisited,” IEEE Signal Process. Lett., vol. 13, no. 5, pp. 285–287, May 2006.
  • 4. A Survey of different Data Hiding Techniques in Digital Images (IJSRD/Vol. 1/Issue 5/2013/028) All rights reserved by www.ijsrd.com 1150 [5] C. K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognit., vol. 37, no. 3, pp. 469–474, 2004. [6] X .Zhang and S. Wang, “Efficient steganographic embedding by exploiting modification direction,” IEEE Commun. Lett., vol. 10, no. 11, pp. 781–783, Nov. 2006 [7] R.M. Chao, H. C. Wu, C. C. Lee, and Y. P. Chu, “A novel image data hiding scheme with diamond encoding,” EURASIP J. Inf. Security, vol. 2009, 2009, DOI: 10.1155/2009/658047, Article ID 658047. [8] J. Wang, Y. Sun, H. Xu, K. Chen, H. J. Kim, and S. H. Joo, “An improved section-wise exploiting modification direction method,” Signal Process., vol. 90, no. 11, pp. 2954–2964, 2010. [9] Da-Chun Wu, Wen-Hsiang Tsai, “A steganographic method for images by pixel-value differencing”, ELSEVIER Pattern Recognition Letters 24 (2003) 1613–1626 [10] Weiqi Luo, Fangjun Huang, “Edge Adaptive Image Steganography Based on LSB Matching Revisited” , IEEE ransactions on infoemation forensics and security, Vol. 5, No. 2, June 2010 [11] W Hong and T. S. Chen, “Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism,” J. Vis. Commun. Image Represent., vol. 22, no. 2, pp. 131– 140, 2011. [12] Wien Hong ,Tung-Shou Chen, “A Novel Data Embedding Method Using Adaptive Pixel Pair Matching”, IEEE transactions on information forensics and security, Vol. 7, No. 1, February 2012. [13] K. Hempstalk, “Hiding behind corners: Using edges in images for better steganography,” in Proc. Computing Women’s Congress, Hamilton, New Zealand, 2006. [14] V.M. Potdar, S. Han, E. Chang, Fingerprinted secret sharing steganography for robustness against image cropping attacks, Proceedings of IEEE Third International Conference on Industrial Informatics (TNDIN), Perth, Australia, 10-12 August 2005,pp. 717- 724. [15] Fei Peng, XiaolongLi, BinYang, “Adaptive reversible data hiding scheme based on integer transform”. Signal Processing (2012) 54–62 [16] Anastasia Ioannidou , Spyros T. Halkidis , George Stephanides, “A novel technique for image steganography based on a high payload method and edge detection”, Expert Systems with Applications 39 (2012) 11517–11524 [17] P.Y. Tsai, Y.C. Hu, H.L. Yeh, Reversible image hiding scheme using predictive coding and histogram shifting, Signal Processing 89 (6) (2009) 1129–1143. [18] D.M.Thodi, J.J. Rodrı´guez, Expansion embedding techniques for reversible watermarking, IEEE Transactions on Image Processing 16 (3) (2007) 721– 730. [19] Z. Ni, Y.Q. Shi, N. Ansari, W. Su, Reversible data hiding, IEEE Transactions on Circuits and Systems for Video Technology 16 (3) (2006) 354–362. [20] M. Barni, F. Bartolini, V. Cappelini, A. Lipi, and A. Piva, “Improved wavelet-based watermarking through pixel-wise masking,” IEEE Trans. Image Process., vol. 10, no. 5, pp. 783–791, May 2001. [21] M. Naseem, Ibrahim M. Hussain, M. Kamran Khan, Aisha Ajmal, “An Optimum Modified Bit Plane Splicing LSB Algorithm for Secret Data Hiding”, International Journal of Computer Applications, Vol. 29, No. 12, 2011. Foundation of Computer Science, New York, USA, pp. 36-43. [22] M. Nosrati, R. Karimi, H. Nosrati, and A. Nosrati, “Embedding stego-text in cover images using linked list concepts and LSB technique”, Journal of American Science, Vol. 7, No. 6, 2011, pp. 97-100.