CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Article:PVD Blend with Pixel Indicator - OPAP Composite for High Fidelity Steganography

by R.Amirtharajan, Adharsh.D, Vignesh.V, R.John Bosco Balaguru
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 7 - Number 9
Year of Publication: 2010
Authors: R.Amirtharajan, Adharsh.D, Vignesh.V, R.John Bosco Balaguru
10.5120/1275-1801

R.Amirtharajan, Adharsh.D, Vignesh.V, R.John Bosco Balaguru . Article:PVD Blend with Pixel Indicator - OPAP Composite for High Fidelity Steganography. International Journal of Computer Applications. 7, 9 ( October 2010), 31-37. DOI=10.5120/1275-1801

@article{ 10.5120/1275-1801,
author = { R.Amirtharajan, Adharsh.D, Vignesh.V, R.John Bosco Balaguru },
title = { Article:PVD Blend with Pixel Indicator - OPAP Composite for High Fidelity Steganography },
journal = { International Journal of Computer Applications },
issue_date = { October 2010 },
volume = { 7 },
number = { 9 },
month = { October },
year = { 2010 },
issn = { 0975-8887 },
pages = { 31-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume7/number9/1275-1801/ },
doi = { 10.5120/1275-1801 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:55:53.864855+05:30
%A R.Amirtharajan
%A Adharsh.D
%A Vignesh.V
%A R.John Bosco Balaguru
%T Article:PVD Blend with Pixel Indicator - OPAP Composite for High Fidelity Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 7
%N 9
%P 31-37
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The defense researchers have started concentrating on the info-wars, which now has become a new plausible area of interest in the electronic epoch. Valuable secret information could be sabotaged, manipulated or even sold thereby, posing a threat to the very essence of confidentiality. Steganography has been playing a remarkable role in prevention of info-sabotage by adopting a principle of undetectable secret sharing. This technique camouflages the secret data into an unsuspecting image, thereby protecting the very existence of it. The security can be enhanced by cleverly embedding the data, taking care not to affect the quality of the image, along with a random choice of ‘plane of embedding’, in case of a colour image. The MSE can be decreased by using Optimal Pixel Adjustment Process, thereby making the secret information more secure and conceited. In this paper the Optimum Pixel Adjustment Process (OPAP) coupled with Pixel Indicator (PI) technique and Pixel value differencing (PVD) in the colour image, is proposed for enhanced stego-image quality and fortified security. The colour cover image, split into three layers namely Red, Blue and Green, act as an embedding platform by adapting Raster scan. While embedding, PI technique, followed by PVD is used to decide the number of bits embedded in a target pixel and finally OPAP technique is employed to enhance the image quality. In order to prove the efficiency of the proposed composite stego, Mean square error (MSE),and Peak Signal to Noise Ratio (PSNR) of the stego image have been reported.

References
  1. Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt, Digital image steganography: Survey and analysis of current methods Signal Processing 90 (2010) 727–752
  2. Adnan Gutub, Mahmoud Ankeer, Muhammad Abu-Ghalioun, Abdulrahman Shaheen, and Aleem Alvi, “Pixel Indicator high capacity Technique for RGB image Based Steganography”, WoSPA 2008 – 5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, Sharjah, U.A.E. 18 – 20 March 2008
  3. R.Amirtharajan.R.Akila. P.Deepikachowdavarapu Article: A Comparative Analysis of ImageSteganography. International Journal of Computer Applications 2(3)(2010) 41–47.
  4. R.Amirtharajan, Krishnendra Nathella and J Harish, “Info Hide – A Cluster Cover Approach” International Journal of Computer Applications 3(5) (2010) 11–18.
  5. R.Amirtharajan, Venkata Abhiram Murarisetty and R.John Bosco Balaguru, “Binary in Binary for Secret Writing - A Cryptic’s Cousin Approach” International Journal of Computer Applications 5(11) (2010) 41–47.
  6. W. Bender, D. Gruhl, N. Morimoto, A. Lu, Techniques for data hiding, IBM Syst. J. 35 (3&4) (1996) 313–336.
  7. C.K. Chan, L.M. Chen, Hiding data in images by simple LSB substitution, Pattern Recognition 37 (3) (2004) 469–474.
  8. Chang, C.C., Tseng, H.W., 2004. A steganographic method for digital images using side match. Pattern Recognition Letter 25 (September), 1431–1437.
  9. Chang, C.C., Hsiao, J.Y., Chan, C.S., 2003. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition 36 (July), 1583–1595.
  10. Fridrich, J., Goljan, M., Du, R., 2001. Reliable detection of LSB steganography in color and grayscale images. In: Proceedings of ACM Workshop on Multimedia and Security, pp. 27–30.
  11. S. Katzenbeisser, F.A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Norwood, MA, 2000
  12. Nabarun Bagchi. Article: Secure BMP Image Steganography Using Dual Security Model (I.D.E.A, image intensity and Bit Randomization)and Max-Bit Algorithm.. International Journal of Computer Applications 1(21)(2010):18–22
  13. M.Padmaa Dr.Y.Venkataramani.” ZIG-ZAG PVD - A Nontraditional Approach”. International Journal of Computer Applications 5(7)(2010) 5–10
  14. F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, Information hiding—a survey, Proc. IEEE 87 (7) (1999) 1062–1078.
  15. C.C. Thien, J.C. Lin, A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function, Pattern Recognition 36 (11) (2003) 2875–2881
  16. R.Z. Wang, C.F. Lin, J.C. Lin, Image hiding by optimal LSB substitution and genetic algorithm, Pattern Recognition 34 (3) (2000) 671–683.
  17. Wu, D.C., Tsai, W.H., 2003. A steganographic method for images by pixel-value differencing. Pattern Recognition Letters 24 (June), 1613–1626.
  18. Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S., 2005. Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proceedings – Vision Image and Signal Processing 152 (October), 611–615.
  19. Young-Ran Park, Hyun-Ho Kang, Sang-Uk Shin, and Ki-Ryong Kwon, An Image Steganography Using Pixel Characteristics Y. Hao et al. (Eds.): CIS 2005, Part II, Springer-Verlag Berlin Heidelberg LNAI 3802, (2005) 581– 588.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography OPAP Pixel indicator(PI) Pixel value differencing (PVD)