Open Access   Article Go Back

Improved Random Area Selective Image Steganography with LSBMR

Neethan Elizabeth Abraham1 , Reshm Chandran2 , Jyothisree 3 , Sunu Ann Thomas4

Section:Research Paper, Product Type: Journal Paper
Volume-4 , Issue-10 , Page no. 166-171, Oct-2016

Online published on Oct 28, 2016

Copyright © Neethan Elizabeth Abraham, Reshm Chandran, Jyothisree, Sunu Ann Thomas . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Neethan Elizabeth Abraham, Reshm Chandran, Jyothisree, Sunu Ann Thomas, “Improved Random Area Selective Image Steganography with LSBMR,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.166-171, 2016.

MLA Style Citation: Neethan Elizabeth Abraham, Reshm Chandran, Jyothisree, Sunu Ann Thomas "Improved Random Area Selective Image Steganography with LSBMR." International Journal of Computer Sciences and Engineering 4.10 (2016): 166-171.

APA Style Citation: Neethan Elizabeth Abraham, Reshm Chandran, Jyothisree, Sunu Ann Thomas, (2016). Improved Random Area Selective Image Steganography with LSBMR. International Journal of Computer Sciences and Engineering, 4(10), 166-171.

BibTex Style Citation:
@article{Abraham_2016,
author = {Neethan Elizabeth Abraham, Reshm Chandran, Jyothisree, Sunu Ann Thomas},
title = {Improved Random Area Selective Image Steganography with LSBMR},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2016},
volume = {4},
Issue = {10},
month = {10},
year = {2016},
issn = {2347-2693},
pages = {166-171},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5482},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5482
TI - Improved Random Area Selective Image Steganography with LSBMR
T2 - International Journal of Computer Sciences and Engineering
AU - Neethan Elizabeth Abraham, Reshm Chandran, Jyothisree, Sunu Ann Thomas
PY - 2016
DA - 2016/10/28
PB - IJCSE, Indore, INDIA
SP - 166-171
IS - 10
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1088 1120 downloads 1079 downloads
  
  
           

Abstract

Image steganography is the art of hiding secret message in grayscale or color images. Easy detection of secret message for any state-of-art image steganogra- phy can break the stego system. To prevent the breakdown of the stego system data is embedded in the selected area of an image which reduces the probability of detection. Most of the existing adaptive image steganography techniques achieve low embedding capacity. In this paper a high capacity Predictive Edge Adaptive image steganography technique is proposed where selective area of cover image is predicted using Modified Median Edge Detector (MMED) predictor to embed the binary payload (data). The cover image used to embed the payload is a grayscale image. Experimental results show that the proposed scheme achieves better embedding capacity with minimum level of distortion and higher level of security. The proposed scheme is compared with the existing image steganography schemes. Results show that the proposed scheme achieves better embedding rate with lower level of distortion.

Key-Words / Index Term

Edge adaptive .High level bit plane .Low level bit plane .Predictive image

References

[1]. Alattar M (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147–1156
[2]. Böhme R (2010) Principles of modern steganography and steganalysis. In: Böhme R (ed) Advanced statistical steganalysis, 1st edn. Springer, Berlin Heidelberg, pp 11–77
[3]. Chang CC, Tai WL, Lin CC (2006) A reversible data hiding scheme based on side-match vector quantiza- tion. IEEE Trans Circuits Syst Video Technol 16(10):1301–1308
[4]. Cheddad, Condell J, Curran K, McKevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90:727–752
[5]. Farid H (2002) Detecting hidden messages using higher-order statistical models. IEEE Image Process IntConfProc 2:905–908
[6]. Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in color and grayscale images. In: Proceedings of the 2001 workshop on Multimedia and security, pp 27–30. doi:10.1145/1232454.1232466
[7]. Harmsen J, Pearlman W (2003) Steganalysis of additive-noise modelable information hiding. SPIE Electron Imaging ConfProc 5020:131–142
[8]. Hempstalk K (2006) Hiding behind corners: using edges in images for better steganography. In: Computing Women’s Congress Proceedings, Hamilton, New Zealand
[9]. Hong W, Chen TS (2011) Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism. J Vis Commun Image Represent 22:131–140
[10]. Huang F, Li B, Huang J (2007) Attack LSB matching steganography by counting alteration rate of the number of neighborhood gray levels. IEEE Image Process ConfProc 1:401–404
[11]. Huang F, Zhong Y, Huang J (2014) Improved algorithm of edge adaptive image steganography based on LSB matching revisited algorithm. Digital-forensics and watermarking. Lect Notes ComputSci 8389:19–31
[12]. Hwang J, Kim JW, Choi JU (2006) A reversible watermarking based on histogram shifting. Lect Notes ComputSci 4283:348–361
[13]. Kamstra L, Heijmans HJAM (2005) Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans Image Process 14(12):2082–2090
[14]. Ker D (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 12(6):441–444
[15]. Khosravi MJ, Naghsh-Nilchi AR (2014) A novel joint secret image sharing and robust steganography method using wavelet. Multimedia Systems 20(2):215–226
[16]. Kim K, Lee M, Lee H, Lee H (2009) Reversible data hiding exploiting spatial correlation between sub-sampled images. Pattern Recogn 42(11):3083–3096
[17]. Lin CC, Tai WL, Chang CC (2008) Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn 41(12):3582–3591
[18]. Luo XY, Wang DS, Wang P, Liu FL (2008) A review on blind detection for image steganography. Signal Process 88:2138–2157
[19]. Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5(1):187–193
[20]. Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5(2):201–214
[21]. Luo W, Huang F, Huang J (2011) A more secure steganography based on adaptive pixel value differencing scheme. Multimed Tools Appl 52(2–3):407–430
[22]. Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287
[23]. Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362
[24]. Ou D, Sun W (2014) High payload image steganography with minimum distortion based on absolute moment block truncation coding. Multimed Tools Appl. doi:10.1007/s11042-014-2059-2
[25]. Roy R, Changder S, Sarkar A, Debnath NC (2013) Evaluating image steganography techniques: future research challenges. In: Proceedings of International Conference on Computing, Management and Telecommunications (ComManTel), pp 309–314. doi:10.1109/ComManTel.2013.6482411
[26]. Thodi M, Rodríguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730
[27]. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896
[28]. Tsai PY, Hu YC, Yeh HL (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89(6):1129–1143
[29]. Ulutas G, Ulutas M, Nabiyev VV (2012) Secret image sharing with reversible capabilities. International Journal of Internet Technology and Secured Transactions 4(1):1–11
[30]. Vetterli M (1987) A theory of multirate filter banks. IEEE Trans Acoust Speech Signal Process 35(3):356– 372
[31]. Walton S (1995) Image authentication for a slippery new age. Dr Dobbs J Softw Tools Prof Program 20:18–26
[32]. Wu HC, Wang HC, Tsai CS, Wang CM (2010) Reversible image steganographic scheme via predictive coding. Displays 31:35–43
[33]. Zhang L, Wu X (2006) An edge-guided image interpolation algorithm via directional filtering and data fusion. IEEE Trans Image Process 15(8):2226–2238