SlideShare a Scribd company logo
1 of 9
Image Steganography
Method Based on PVD and
Modulus Function
Image Processing Project
Abstract
● The traditional steganography methods with Pixel Value Differencing
usually only deal with the PVD in the horizontal direction but ignore the
vertical one.
● In this paper, the cover image is divided into 2×2 non overlapping blocks,
then the modulus function method is used in horizontal direction and the
simple PVD method is used in vertical direction for steganography.
● In addition, the falling-off-boundary problem is solved.
● Experimental results show that the proposed approach provides higher
stego-image quality, larger embedding capacity, and can against common
attacks.
The problem
● PVD (Pixel Value Differencing), uses the difference value of two adjacent
pixels of cover image to determine the number of bits that could embed
into the cover image
● This method has low embedding capacity, poor stego image quality and
also low security.
The solution
STEGANOGRAPHY
METHOD
BASED ON
PVD AND
MODULUS
FUNCTION
● Existing Methods
Original Method
of PVD
● The cover image is divided
into non- overlapping blocks.
● Denote the pixel pair in some
block as P i and P j ˈthe
difference d is calculated as
d=P j − P i
● This range is divided into r
sub-regions R k (k=1,2,..,r), the
width of each sub-region are
power of 2. The number of
bits embedding in the region
of R k is n = log 2 ( w k ) ,
where w k is the width of the
k-th sub-region.
A method of PVD based
on modulus function
Improved PVD method
based on horizontal
and vertical direction
● The cover image is divided into non-
overlapping blocks, b is the decimal
value of secret information,
calculate:
● F rem = ( p i + p j ) mod(2 )
● When extract the secret information,
first of all , calculate the number of
bits each pixel can be embedded
● n = log 2 ( w k ) , then using
equation (1) to calculate the
decimal value of the embedded
information, and finally change the
decimal value F rem to n bits secret
message.
● 2 × 2 pixel blocks, two pairs
of horizontal direction’s
pixels and a pair of vertical
direction’s pixels.
● In order to extract the
secret information correctly,
a modification to another
pair of vertical direction’s
pixels is needed; if there
has falling-oơ-boundary
problems, the value of
pixels will have to be
adjusted.
Embedding Process
Let the original cover image from left to right, from top to bottom into non-
overlapping blocks with 2 × 2 pixels.
For an image with M×N (length and width), we can get blocks nblocks = M/2 X N/2
blocks.
Then a series of steps occurs to embed the hidden image into the original image
The Extraction process work exactly opposite to the embedding process to obtain the
original image.
Experimental Analysis
Experimental Analysis
Conclusion
This paper presents an image steganography method which utilize horizontal pixels and vertical pixel difference,
in the horizontal direction we use high-quality model function method for two pairs of pixels to embed message
and in the vertical direction we select one pair of pixels to embed message with the common PVD methods.
Experiments show that this scheme has not only improved the embedding capacity, stego image quality, but also
achieved high security such as resistance to common attacks and RS histogram attack

More Related Content

Similar to Image Steganography Method Based on PVD and Modulus Function

Real time implementation of object tracking through
Real time implementation of object tracking throughReal time implementation of object tracking through
Real time implementation of object tracking through
eSAT Publishing House
 

Similar to Image Steganography Method Based on PVD and Modulus Function (20)

A binarization technique for extraction of devanagari text from camera based ...
A binarization technique for extraction of devanagari text from camera based ...A binarization technique for extraction of devanagari text from camera based ...
A binarization technique for extraction of devanagari text from camera based ...
 
Ijcatr04041020
Ijcatr04041020Ijcatr04041020
Ijcatr04041020
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
A Novel Method for Image Watermarking Using Luminance Based Block Selection a...
A Novel Method for Image Watermarking Using Luminance Based Block Selection a...A Novel Method for Image Watermarking Using Luminance Based Block Selection a...
A Novel Method for Image Watermarking Using Luminance Based Block Selection a...
 
Cj36511514
Cj36511514Cj36511514
Cj36511514
 
Efficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixelsEfficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixels
 
Ijnsa050205
Ijnsa050205Ijnsa050205
Ijnsa050205
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and Decryption
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
 
DTAM: Dense Tracking and Mapping in Real-Time, Robot vision Group
DTAM: Dense Tracking and Mapping in Real-Time, Robot vision GroupDTAM: Dense Tracking and Mapping in Real-Time, Robot vision Group
DTAM: Dense Tracking and Mapping in Real-Time, Robot vision Group
 
NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for...
NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for...NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for...
NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for...
 
Q180304102109
Q180304102109Q180304102109
Q180304102109
 
Reversible Encrypytion and Information Concealment
Reversible Encrypytion and Information ConcealmentReversible Encrypytion and Information Concealment
Reversible Encrypytion and Information Concealment
 
Real time implementation of object tracking through
Real time implementation of object tracking throughReal time implementation of object tracking through
Real time implementation of object tracking through
 
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement  Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...
 
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATIONUSING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
 
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKINGA PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
 
Image Denoising by using Modified SGHP Algorithm
Image Denoising by using Modified SGHP Algorithm Image Denoising by using Modified SGHP Algorithm
Image Denoising by using Modified SGHP Algorithm
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Image Steganography Method Based on PVD and Modulus Function

  • 1. Image Steganography Method Based on PVD and Modulus Function Image Processing Project
  • 2. Abstract ● The traditional steganography methods with Pixel Value Differencing usually only deal with the PVD in the horizontal direction but ignore the vertical one. ● In this paper, the cover image is divided into 2×2 non overlapping blocks, then the modulus function method is used in horizontal direction and the simple PVD method is used in vertical direction for steganography. ● In addition, the falling-off-boundary problem is solved. ● Experimental results show that the proposed approach provides higher stego-image quality, larger embedding capacity, and can against common attacks.
  • 3. The problem ● PVD (Pixel Value Differencing), uses the difference value of two adjacent pixels of cover image to determine the number of bits that could embed into the cover image ● This method has low embedding capacity, poor stego image quality and also low security.
  • 5. ● Existing Methods Original Method of PVD ● The cover image is divided into non- overlapping blocks. ● Denote the pixel pair in some block as P i and P j ˈthe difference d is calculated as d=P j − P i ● This range is divided into r sub-regions R k (k=1,2,..,r), the width of each sub-region are power of 2. The number of bits embedding in the region of R k is n = log 2 ( w k ) , where w k is the width of the k-th sub-region. A method of PVD based on modulus function Improved PVD method based on horizontal and vertical direction ● The cover image is divided into non- overlapping blocks, b is the decimal value of secret information, calculate: ● F rem = ( p i + p j ) mod(2 ) ● When extract the secret information, first of all , calculate the number of bits each pixel can be embedded ● n = log 2 ( w k ) , then using equation (1) to calculate the decimal value of the embedded information, and finally change the decimal value F rem to n bits secret message. ● 2 × 2 pixel blocks, two pairs of horizontal direction’s pixels and a pair of vertical direction’s pixels. ● In order to extract the secret information correctly, a modification to another pair of vertical direction’s pixels is needed; if there has falling-oơ-boundary problems, the value of pixels will have to be adjusted.
  • 6. Embedding Process Let the original cover image from left to right, from top to bottom into non- overlapping blocks with 2 × 2 pixels. For an image with M×N (length and width), we can get blocks nblocks = M/2 X N/2 blocks. Then a series of steps occurs to embed the hidden image into the original image The Extraction process work exactly opposite to the embedding process to obtain the original image.
  • 9. Conclusion This paper presents an image steganography method which utilize horizontal pixels and vertical pixel difference, in the horizontal direction we use high-quality model function method for two pairs of pixels to embed message and in the vertical direction we select one pair of pixels to embed message with the common PVD methods. Experiments show that this scheme has not only improved the embedding capacity, stego image quality, but also achieved high security such as resistance to common attacks and RS histogram attack