CFP last date
20 May 2024
Reseach Article

An Enhanced Data Hiding Approach using Pixel Mapping Method with Optimal Substitution Approach

by Prince Kumar Panjabi, Parvinder Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 74 - Number 10
Year of Publication: 2013
Authors: Prince Kumar Panjabi, Parvinder Singh
10.5120/12922-9927

Prince Kumar Panjabi, Parvinder Singh . An Enhanced Data Hiding Approach using Pixel Mapping Method with Optimal Substitution Approach. International Journal of Computer Applications. 74, 10 ( July 2013), 36-43. DOI=10.5120/12922-9927

@article{ 10.5120/12922-9927,
author = { Prince Kumar Panjabi, Parvinder Singh },
title = { An Enhanced Data Hiding Approach using Pixel Mapping Method with Optimal Substitution Approach },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 74 },
number = { 10 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 36-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume74/number10/12922-9927/ },
doi = { 10.5120/12922-9927 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:41:54.193397+05:30
%A Prince Kumar Panjabi
%A Parvinder Singh
%T An Enhanced Data Hiding Approach using Pixel Mapping Method with Optimal Substitution Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 74
%N 10
%P 36-43
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data Hiding is one of the challenging issues in the field of Network Security. Unlike cryptography, Steganography is used to hide the existence of secret message by embedding the message behind any cover object like image, text, audio, video files. Various authors proposed, various methods for hiding secret information behind gray scale images such as least significant method, gray level modification, pixel value differencing, pixel mapping method and pixel mapping method with BPCS, but all these method are not up to the marks that means increasing the embedding capacity of Stego-Image and to provide Stego-Image with an imperceptible quality are still challenges. To get better imperceptible quality, we proposed an enhanced technique "An Enhanced Data Hiding Approach Using Pixel Mapping Method (PMM) With Optimal Pixel Substitution Approach " that provides a better Peak Signal to noise ratio(PSNR) between Cover-Image and Stego-Image with good embedding capacity. The proposed approach is based on four modules – mapping rules, set classifier method, pixel selection method, and minimum differencing function to hide data within an image. This method works by selecting a set of pixels; map secret data into these selected pixels according to mapping rules and produces new Stego pixel value after mapping secret message according to Minimum Pixel Difference function. This integrated proposed approach provides more security to secret data as without knowing the mapping rules and locations of pixels no one could extract the secret data. This proposed approach not only provides larger embedding capacity but also produces an acceptable Stego image quality that can be seen by human eyes.

References
  1. Souvik Bhattacharyya and Gautama Sanyal. Study and analysis of quality of service in different image based Steganography using PMM. International journal of applied information system – foundation of computer science, New York, USA 2012
  2. Souvik Bhattacharyya and Gautam Sanyal. PMM (Pixel Mapping method) Based Bit plane complexity segmentation (BPCS) Steganography. 978-1-4673-0126-8/11/$26 2011 – IEEE
  3. M. B MEDENI and EI M. Souidi. A novel Steganographic method for gray – level images with four-pixel differencing and LSB Substitution 978-1-61284-7332-0/11/$26 2010 – IEEE
  4. J. K Mandal and Debashis Color image Steganography based on pixel value differencing in spatial domain – international journal of information science and techniques July 2012.
  5. Wang Yan And Ling-di Ping. A new Steganography algorithm based on spatial domain, 978-0-7695-3991-1/09/$26 2009 – IEEE
  6. Transforming LSB substitution for image based Steganography in matching algorithms. Journal of information science and engineering 26, 1199-1212 2010
  7. Potdar V. and Chang E. Gray level modification Steganography for secret communication. In IEEE International Conference on Industrial Informatics. , pages 355–368, Berlin, Germany, 2004.
  8. Chung-Ming Wang, Nan-I Wu ,Chwei-Shyong Tsai and Min-Shiang Hwang A high quality Steganographic method with pixel value differencing and modulus function. The journal of system and software – science direct – 2007
  9. Souvik Bhattacharyya. and Gautam Sanyal. Hiding data in images using pixel mapping method (pmm). In Proceedings of 9th annual Conference on Security and Management (SAM) under The 2010 World Congress in Computer Science, Computer Engineering, and Applied Computing (World Comp 2010), Las Vegas, USA, July 12-15,2010.
  10. Ahmad T. Al-Taani. and Abdullah M. AL-Issa. A novel Steganographic, method for gray-level images. International Journal of Computer, Information, and Systems Science, and Engineering, 3, 2009.
  11. P Huang. K. C. Chang. , C. P Chang. and T. M Tu. A novel image Steganography method using tri-way pixel value differencing. Journal of Multimedia, 3, 2008.
  12. Souvik Bhattacharyya, lalan kumar and Gautam Sanyal. A novel approach of data hiding using PMM(Pixel Mapping method). International journal of computer science and information security – vol 8. No. 4 2010.
  13. C. K. Chan. and L. M. Cheng. Hiding data in images by simple lsb substitution. Pattern Recognition, 37:469–474, 2004.
  14. D. C. Wu. and W. H. Tsai. A steganographic method for images by pixel value differencing. Pattern Recognition Letters, 24:1613–1626, 2003.
  15. J. Y. Hsiao. C. C. Chang. and C. -S. Chan. Finding optimal least significant- bit substitution in image hiding by dynamic programming strategy. Pattern Recognition, 36:1583–1595, 2003.
  16. C. F. Lin. R. Z. Wang. and J. C. Lin. Image hiding by optimal lsb substitution and genetic algorithm. Pattern Recognition, 34:671–683,2001.
  17. Y. K. Lee. and L. H. Chen. High capacity image steganographic model. IEE Proc. -Vision, Image and Signal Processing, 147:288–294, 2000.
  18. Ross J. Anderson. and Fabien A. P. Petitcolas. On the limits of steganography. IEEE Journal on Selected Areas in Communications (J-SAC),Special Issue on Copyright and Privacy Protection, 16:474–481, 1998.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Information Hiding Pixel Mapping Pixel Value Differencing Gray Scale Image Cover Image Method Optimal Substitution Stego Image