Call for Paper - November 2019 Edition
IJCA solicits original research papers for the November 2019 Edition. Last date of manuscript submission is October 21, 2019. Read More

Comparison of LSB and PVD Steganography Methods

Print
PDF
IJCA Proceedings on Emerging Applications of Electronics System, Signal Processing and Computing Technologies
© 2015 by IJCA Journal
NCESC 2015 - Number 2
Year of Publication: 2015
Authors:
Khandagale P. M
Mukane S. M
Sadekar D. G

Khandagale P.m, Mukane S.m and Sadekar D.g. Article: Comparison of LSB and PVD Steganography Methods. IJCA Proceedings on Emerging Applications of Electronics System, Signal Processing and Computing Technologies NCESC 2015(2):15-17, September 2015. Full text available. BibTeX

@article{key:article,
	author = {Khandagale P.m and Mukane S.m and and Sadekar D.g},
	title = {Article: Comparison of LSB and PVD Steganography Methods},
	journal = {IJCA Proceedings on Emerging Applications of Electronics System, Signal Processing and Computing Technologies},
	year = {2015},
	volume = {NCESC 2015},
	number = {2},
	pages = {15-17},
	month = {September},
	note = {Full text available}
}

Abstract

Now a day's as the internet is widely in-use hence the information is transferred with a single click. Information is transferred usingviz; images, videos, texts but the most popular format is the images. In order to transfer the information in a secure way, methods like cryptography, watermarking and Steganography have come into practice. But amongst all above methods Steganography is more reliable and apt because itsan art that involves communication of secret data with an appropriate carrier. Many Steganography methods have been design depending upon requirements such as data hiding capacity, robustness, image quality and each having its pros and cons. This paper aims to give thorough understanding and evolution of different existing 'Digital Image Steganography Techniques' of data hiding in spatial and transform domain. It also covers and integrates comparison of Least Significant bit (LSB) method as well as Pixel Value Difference Method (PVD).

References

  • C. K. Chan and L. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition, vol. 37, no. 3, 2004, pp. 469–474.
  • D. C. Wu and W. H. Tsai, "A steganographic method for images by pixel-value differencing," Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1613–1626, 2003.
  • Johnson, N. F. &Jajodia, S. , "Exploring Steganography: Seeing the Unseen", Computer Journal,February 1998.
  • Krenn, R. , "Steganography and Steganalysis", http://www. krenn. nl/univ/cry/steg/article. pdf.
  • Wang, H & Wang, S, "Cyber warfare: Steganography vs. Steganalysis", Communications of the ACM,47:10, October 2004.
  • H. B. Kekre, ArchanaAthawale, and PallaviN. Halarnkar, "Increased Capacity of Information Hiding in LSB's Method for Text and Image", International Journal of Electrical and Electronics Engineering 2:4 2008.

Keywords