Steganography based on quotient value differencing and pixel value correlation

Abstract Pixel value differencing (PVD) steganography techniques produce imperceptible stego‐images. Most PVD‐based techniques have a fall‐off boundary problem (FOBP). To avoid FOBP, a steganographic scheme is presented that combines the quotient value difference (QVD) with pixel value correlation (...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Reshma Sonar, Gandharba Swain
Formato: article
Lenguaje:EN
Publicado: Wiley 2021
Materias:
Acceso en línea:https://doaj.org/article/b24afb7059884fafa65867659d4d1ea5
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:b24afb7059884fafa65867659d4d1ea5
record_format dspace
spelling oai:doaj.org-article:b24afb7059884fafa65867659d4d1ea52021-11-17T03:12:44ZSteganography based on quotient value differencing and pixel value correlation2468-232210.1049/cit2.12050https://doaj.org/article/b24afb7059884fafa65867659d4d1ea52021-12-01T00:00:00Zhttps://doi.org/10.1049/cit2.12050https://doaj.org/toc/2468-2322Abstract Pixel value differencing (PVD) steganography techniques produce imperceptible stego‐images. Most PVD‐based techniques have a fall‐off boundary problem (FOBP). To avoid FOBP, a steganographic scheme is presented that combines the quotient value difference (QVD) with pixel value correlation (PVC). It performs data embedding in two stages on 3 × 3 size pixel blocks. The first stage of the embedding procedure performs QVD and remainder substitution on five pixels. These five pixels are central pixel and it's neighbours on the left, right, upper, and lower sides. Based on the new values of these five pixels, the PVC embedding procedure is applied on the remaining four corner pixels of the block. The experimental results are found to be improved. The hiding capacity is high that is 3.92 bits per byte with an acceptable peak signal‐to‐noise ratio value. A security check was performed using two tests: (i) a regular‐singular (RS) test, (ii) a pixel difference histogram (PDH) test. The experimental outcomes demonstrate that PDH curves of the stego‐images do not have a zigzag shape, that means the PDH test could not detect this steganography technique. Furthermore, the RS curves show that the RS test could not detect this steganography technique.Reshma SonarGandharba SwainWileyarticleComputational linguistics. Natural language processingP98-98.5Computer softwareQA76.75-76.765ENCAAI Transactions on Intelligence Technology, Vol 6, Iss 4, Pp 504-519 (2021)
institution DOAJ
collection DOAJ
language EN
topic Computational linguistics. Natural language processing
P98-98.5
Computer software
QA76.75-76.765
spellingShingle Computational linguistics. Natural language processing
P98-98.5
Computer software
QA76.75-76.765
Reshma Sonar
Gandharba Swain
Steganography based on quotient value differencing and pixel value correlation
description Abstract Pixel value differencing (PVD) steganography techniques produce imperceptible stego‐images. Most PVD‐based techniques have a fall‐off boundary problem (FOBP). To avoid FOBP, a steganographic scheme is presented that combines the quotient value difference (QVD) with pixel value correlation (PVC). It performs data embedding in two stages on 3 × 3 size pixel blocks. The first stage of the embedding procedure performs QVD and remainder substitution on five pixels. These five pixels are central pixel and it's neighbours on the left, right, upper, and lower sides. Based on the new values of these five pixels, the PVC embedding procedure is applied on the remaining four corner pixels of the block. The experimental results are found to be improved. The hiding capacity is high that is 3.92 bits per byte with an acceptable peak signal‐to‐noise ratio value. A security check was performed using two tests: (i) a regular‐singular (RS) test, (ii) a pixel difference histogram (PDH) test. The experimental outcomes demonstrate that PDH curves of the stego‐images do not have a zigzag shape, that means the PDH test could not detect this steganography technique. Furthermore, the RS curves show that the RS test could not detect this steganography technique.
format article
author Reshma Sonar
Gandharba Swain
author_facet Reshma Sonar
Gandharba Swain
author_sort Reshma Sonar
title Steganography based on quotient value differencing and pixel value correlation
title_short Steganography based on quotient value differencing and pixel value correlation
title_full Steganography based on quotient value differencing and pixel value correlation
title_fullStr Steganography based on quotient value differencing and pixel value correlation
title_full_unstemmed Steganography based on quotient value differencing and pixel value correlation
title_sort steganography based on quotient value differencing and pixel value correlation
publisher Wiley
publishDate 2021
url https://doaj.org/article/b24afb7059884fafa65867659d4d1ea5
work_keys_str_mv AT reshmasonar steganographybasedonquotientvaluedifferencingandpixelvaluecorrelation
AT gandharbaswain steganographybasedonquotientvaluedifferencingandpixelvaluecorrelation
_version_ 1718426009917718528