CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Multimedia based Steganography using PMM and M4M

Published on December 2011 by Souvik Bhattacharyya, Indradip Banerjee, Gautam Sanyal
Network Security and Cryptography
Foundation of Computer Science USA
NSC - Number 4
December 2011
Authors: Souvik Bhattacharyya, Indradip Banerjee, Gautam Sanyal

Souvik Bhattacharyya, Indradip Banerjee, Gautam Sanyal . Multimedia based Steganography using PMM and M4M. Network Security and Cryptography. NSC, 4 (December 2011), 24-33.

author = { Souvik Bhattacharyya, Indradip Banerjee, Gautam Sanyal },
title = { Multimedia based Steganography using PMM and M4M },
journal = { Network Security and Cryptography },
issue_date = { December 2011 },
volume = { NSC },
number = { 4 },
month = { December },
year = { 2011 },
issn = 0975-8887,
pages = { 24-33 },
numpages = 10,
url = { /specialissues/nsc/number4/4346-spe044t/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Special Issue Article
%1 Network Security and Cryptography
%A Souvik Bhattacharyya
%A Indradip Banerjee
%A Gautam Sanyal
%T Multimedia based Steganography using PMM and M4M
%J Network Security and Cryptography
%@ 0975-8887
%N 4
%P 24-33
%D 2011
%I International Journal of Computer Applications

In today’s highly digitalized world maintaining the secrecy of the secret data is a vital problem. Steganography is an emerging area which may be used for secure transmission of the digital data. It is the art and science of embedding data into different covers such that the data embedded is imperceptible. The covers that can be used cover all forms of digital multimedia object namely text, image, audio and video. This paper proposes a novel multimedia based steganography technique for an un-compressed movie. This proposed work hides the data both in audio and video signal part of the movie. In video part data hiding operations are executed entirely in the discrete integer wavelet domain by converting the gray level version of each frame of the video in to transform domain using discrete integer wavelet technique through 2-D lifting scheme through Haar lifted wavelet. For providing an imperceptible stego-frame/stego-video for human vision, a novel image based steganographic approach called pixel mapping method (PMM) is used for data hiding in the wavelet coefficients. To enlarge the embedding capacity the secret information also has been embedded in the audio portion of the movie with the help of M4M technique. Experimental results demonstrate that the proposed algorithm has high imperceptibility and capacity and produces satisfactory results.

  1. T Mrkel, JHP Eloff and MS Olivier.”An Overview of Image Steganography,” in proceedings of the fifth annual Information Security South Africa Conference, 2005.
  2. Kahn, The Code breakers - the comprehensive history of secret communication from ancient times to the Internet, Scribner, New York (1996).
  3. J.T. Brassil, S. Low, N.F. Maxemchuk, and L. O’Gorman, "Electronic Marking and Identification Techniques to Discourage Document Copying", IEEE Journal on Selected Areas in Communications, vol. 13, Issue. 8, October 1995, pp. 1495-1504.
  4. L.Y. Por and B. Delina, “Information Hiding: A New Approach in Text Steganography”, 7th WSEAS International Conference on Applied Computer & Applied Computational Science, April 2008, pp- 689-695.
  5. A.M. Alattar and O.M. Alattar, "Watermarking electronic text documents containing justified paragraphs and irregular line spacing ", Proceedings of SPIE - Volume5306, Security, Steganography, and Watermarking of Multimedia Contents VI, June 2004, pp- 685-695.
  6. M.H. Shirali-Shahreza and M. Shirali-Shahreza, "Text Steganography in Chat", Proceedings of the Third IEEE/IFIP International Conference in Central Asia on Internet the Next Generation of Mobile, Wireless and Optical Communications Networks (ICI 2007), Tashkent, Uzbekistan, September 26-28, 2007.
  7. L. M. Marvel, C. G. Boncelet, Jr. and C. T. Retter, "Spread spectrum image steganography," IEEE Trans. on Image Processing, 8(8), 1075-1083 (1999).
  8. Analysis of LSB Based Image Steganography Techniques ,R. Chandramouli, Nasir Memon, Proc. IEEE ICIP, 2001.
  9. An Evaluation of Image Based Steganography Methods,Kevin Curran, Kran Bailey, International Journal of Digital Evidence,Fall 2003.
  10. Doërr and J.L. Dugelay, "A Guide Tour of Video Watermarking", Signal Processing: Image Communication, vol. 18, Issue 4, 2003, pp. 263-282.
  11. K. Gopalan, "Audio steganography using bit modification", Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, (ICASSP '03), vol. 2, 6-10 April 2003, pp. 421-424.
  12. Doërr and J.L. Dugelay, "Security Pitfalls of Frameby-Frame Approaches to Video Watermarking", IEEE Transactions on Signal Processing, Supplement on Secure Media, vol. 52, Issue 10, 2004, pp. 2955-2964.
  13. J.Y. Hsiao. C.C. Chang. and C.-S. Chan. Finding optimal least significant- bit substitution in image hiding by dynamic programming strategy. Pattern Recognition, 36:1583–1595, 2003.
  14. C.K. Chan. and L. M. Cheng. Hiding data in images by simple lsb substitution. Pattern Recognition, 37:469–474, 2004.
  15. P Huang. K.C. Chang., C.P Chang. and T.M Tu. A novel image steganography method using tri-way pixel value differencing. Journal of Multimedia, 3, 2008.
  16. Ahmad T. Al-Taani. and Abdullah M. AL-Issa. A novel steganographic method for gray-level images. International Journal of Computer, Information, and Systems Science, and Engineering, 3, 2009.
  17. Potdar V.and Chang E. Gray level modification steganography for secret communication. In IEEE International Conference on Industria lInformatics, pages 355–368, Berlin, Germany, 2004.
  18. C.S. Lu: Multimedia security: steganography and digital watermarking techniques for protection of intellectual property. Artech House, Inc (2003).
  19. J.J. Chae and B.S. Manjunath: Data hiding in Video. Proceedings of the 6th IEEE International Conference on Image Processing, Kobe, Japan (1999).
  20. Provos, N., Honeyman, P.: Hide and Seek: An Introduction to Steganography. IEEE Security & Privacy Magazine 1 (2003).
  21. I.J.Cox, J. Kilian, T. Leighton, T.Shamoon: Secure spread spectrum watermarking for multimedia. Proceedings of IEEE Image processing (1997).
  22. J.J. Chae, D. Mukherjee and B.S. Manjunath: A Robust Data Hiding Technique using Multidimensional Lattices. Proceedings of the IEEE Forum on Research and Technology Advances in Digital Libraries, Santa Barbara, USA (1998).
  23. X. Niu, M. Schmucker and C. Busch: Video watermarking resisting to rotation, scaling, and translation. Proceedings of SPIE Security and Watermarking of Multimedia Contents IV (2002).
  24. Y. Wang, E. Izquierdo, “High-Capacity Data Hiding in MPEG-2 Compressed Video”, 9th International Workshop on Systems, Signals and Image Processing, UK, 2002.
  25. D.E. Lane “Video-in-Video Data Hiding”, 2007.
  26. “Hiding Data in Images Using Pixel Mapping Method (PMM) by Souvik Bhattacharyya and Gautam Sanyal at SAM'10 - 9th annual Conference on Security and Management under The 2010 World Congress in Computer Science, Computer Engineering, and Applied Computing held on July 12-15, 2010, USA.
  27. A Novel approach of Data Hiding Using Pixel Mapping Method (PMM) by Souvik Bhattacharyya, Lalan Kumar and Gautam Sanyal at International Journal of Computer Science and Information Security (IJCSIS-ISSN 1947-5500) , Volume. 8 , N0. 4 , JULY 2010,Page No -207-214.
  28. Nedeljko Cvejic and Tapio Seppben, Increasing the capacity of LSB-based audio steganography, in IEEE 2002, (2002).
  29. Natarajan Meghanathan and Lopamudra Nayak, Steganalysis Algorithms for Detecting the Hidden Information in Image, Audio and Video Cover Media, in at International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January 2010.
  30. 30] W. Bender. and D. Gruhl, Steganography: Techniques for data hiding, in IBM SYSTEMS JOURNAL, 35(1996).
  31. Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Poulami Das, Debashis Ganguly and Swarnendu Mukherjee,A tutorial review on Steganography, in In the Proceedings of International Conference on Contemporary Computing, (2008).
  32. Souvik Bhattacharyya, Indradip Banerjee and Gautam Sanyal,A Survey of Steganography and Steganalysis Technique in Image, Text, Audio and Video as Cover Carrier, in Journal of Global Research in Computer Science (JGRCS) VOL 2, NO 4 (2011),APRIL-2011.
  33. Arko Kundu, Kaushik Chakraborty and Souvik Bhattacharyya,Data Hiding in Images Using Mod 16 Method, in In the Proceedings of ETECE 2011,(2011)
  34. S. Dowdy and S. Wearden. Statistics for research. Wiley. ISBN 0471086029, page 230, 1983.
  35. W. E. Winkler. The state of record linkage and current research problems. Statistics of Income Division, Internal Revenue Service Publication R99/04., 1999.
  36. Audio Steganography Using Mod 4 Method (M4M) by Souvik Bhattacharyya, Arko Kundu, Kaushik Chakraborty and Gautam Sanyal at JOURNAL OF COMPUTING, VOLUME 3, ISSUE 8, AUGUST 2011
  37. C. Cachin, An information theoretic model for steganography, Proceedings of 2nd Workshop on Information Hiding. D. Aucsmith (Eds.). Lecture Notes in Computer Sciences, Springer-verlag, USA, 1525, (1998).
Index Terms

Computer Science
Information Sciences


PMM (Pixel Mapping Method) M4M (Mod 4 Method) Integer Wavelet Transform