CFP last date
22 April 2024
Reseach Article

Efficient BEMD Data Hiding Algorithm

by Shuchi Agarwal, Jaipal Singh Bisht
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 160 - Number 5
Year of Publication: 2017
Authors: Shuchi Agarwal, Jaipal Singh Bisht
10.5120/ijca2017913051

Shuchi Agarwal, Jaipal Singh Bisht . Efficient BEMD Data Hiding Algorithm. International Journal of Computer Applications. 160, 5 ( Feb 2017), 24-29. DOI=10.5120/ijca2017913051

@article{ 10.5120/ijca2017913051,
author = { Shuchi Agarwal, Jaipal Singh Bisht },
title = { Efficient BEMD Data Hiding Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2017 },
volume = { 160 },
number = { 5 },
month = { Feb },
year = { 2017 },
issn = { 0975-8887 },
pages = { 24-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume160/number5/27069-2017913051/ },
doi = { 10.5120/ijca2017913051 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:05:50.889191+05:30
%A Shuchi Agarwal
%A Jaipal Singh Bisht
%T Efficient BEMD Data Hiding Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 160
%N 5
%P 24-29
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Improved BEMD steganographic algorithm to hide secret text behind cover pixels of image to increase security of digital communication for exchanging private information worldwide using binary coefficient and modulus is proposed. From simulation results, Stego image quality better than 70dB which is higher than BEMD Kuo-Chang scheme thereby reducing mean square error difference between cover image and stego image.

References
  1. Wen-Chung Kuo, Chun-Cheng Wang, Yu-Chih Huang, “Binary power data hiding scheme”, Elsevier, 2015.
  2. Xinpeng Zhang and Shuozhong Wang, 2006, “Efficient steganographic embedding by Exploiting modification Direction”, IEEE Communication Letters.
  3. W-C Kuo, C-C Wang, “Data hiding based on generalized exploiting modification direction method”, Imaging Science Journal, 2013.
  4. Ratnakirti Roy, Suvamoy Changder, Anirban Sarkar, Narayan C Debnath, “Evaluating Image Steganography Techniques: Future Research Challenges”, IEEE, 2013.
  5. Fabien A.P. Petit colas, Ross J. Anderson, Markus G. Kuhn, “Information hiding-A survey”, Proceedings of the IEEE, July 1999, 0018-9219.
  6. Wen-Chung Kuo, Sheng-Yi Chang, “Hybrid GEMD data hiding”, Journal of information hiding and multimedia signal processing, July 2014, 2073-4212.
  7. Min WU, Heather Yu, Bede Liu, “Data hiding in image and video: Design and Applications”, IEEE transactions on image processing, June 2003, 1057-7149.
  8. R.J.Anderson, “Information Hiding: 1st International workshop (Lecture notes in computer science), Springer-Verlag, 1996, 1174.
  9. Vipul J Patel, Ms. Neha Ripal Soni, “Uncompressed Image Steganography using BPCS: Survey and Analysis”, IOSR Journal of Computer Engineering (IOSR-JCE), Dec 2013.
  10. A. Westfeld, “F5-A Steganographic Algorithm: High capacity despite better steganalysis”, Proc. 4th International Workshop on Information Hiding., 2001, Springer, 2001, 289-302.
  11. Huang, Y. M. and Jhan, P. W., “Two improved data hiding schemes”, Proc. 4th Int. Cong. on Image and signal processing: CISP 2011, Shanghai, China, October 2011, IEEE, pp. 1784–1787.
  12. Wen-Chung Kuo, Lih-Chyau ,Wuu Chia-Nian Shyi Shao-Hung Kuo, “A Data Hiding Scheme with High Embedding Capacity Based on General Improving Exploiting Modification Direction method”, Ninth International Conference on Hybrid Intelligent Systems, 2009, IEEE, 978-0-7695-3745.
  13. F. Cayre, C. Fontaine, T. Furon, “Watermarking Security Theory and Practice,” IEEE Trans. on Signal Processing, 2005, Vol.53, pp.3976- 3987.
  14. M.D. Swanson, B. Zhu and A.H.Tewfik, “Robust Data hiding for Images”, IEEE Digital Signal Processing Workshop, September 1996.
  15. H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, “Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods”, IEEE Proceedings-Vision, Image and Signal Processing, Vol.152, No. 5, pp.611-615, October 2005.
  16. Y.-C. Tseng, Y.-Y. Chen, and H.-K. Pan, “A secure data hiding scheme for binary images,” IEEE Transaction Communication, Vol. 50, pp. 1227-1231, August 2002.
  17. W. Zhang, X. Zhang, S. Wang, “A Double Layered ‘‘Plus–Minus One data embedding scheme”, IEEE Signal Processing Letters, 2007, 848–851.
  18. N. Provos and P. Honeyman, “Hide and Seek: An Introduction to Steganography”, IEEE Security and Privacy Magazine, 2003.
  19. A. Cheddad, J. Condell, K. Curran and P.M. Kevitt, “Digital Image Steganography: Survey and Analysis of Current Methods”, Signal Processing, 90(3), 727-752, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Data hiding steganography stego image cover image MSE PSNR EMD BEMD pixel value.