Lossless Data Hiding Based on Adjacency Pixel Differences
Keywords:
Reversible data hiding, Lossless reconstruction, Information securityAbstract
Image steganography has become a vibrant research area due to increase in digital image transmission over untrusted network. Generally, after recovering the hidden data from a stego image, the host image data cannot be reconstructed perfectly. This is a main challenge for applications demanding lossless host image recovery. In this paper, a new lossless reversible data hiding technique is proposed based on differences of adjacent pixels for embedding data and has more hiding capacity compared to existing methods. The number of hiding bits that can be embedded into an image equals the number of pixels related with the peak point. The performance of the algorithm has been evaluated with hiding capacity and peak signal to noise ratio (dB). The experimental results show that the host image and hidden information can be exactly retrieved from the stego image.
References
[1] I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread
spectrum watermarking for multimedia,” in IEEE Trans. on Image
Processing, vol. 6. No. 12, pp. 1673-1687, Dec. 1997.
[2] J. Huang and Y. Q. Shi, "An adaptive image watermarking scheme
based on visual masking," IEE Electronic Letters, vol. 34, no. 8,
pp. 748-750, April 1998.
[3] C. W. Honsinger, P. Jones, M. Rabbani, and J. C. Stoffel,
“Lossless recovery of an original image containing embedded
data,” US Patent: 6,278,791, 2001.
[4] M. Goljan, J. Fridrich, and R. Du, “Distortion-free data
embedding,” Proceedings of 4th Information Hiding Workshop,
pp. 27-41, Pittsburgh, PA, April, 2001.
[5] Jun Tian, "Reversible data embedding using a difference
expansion," in IEEE Transactions on Circuits and Systems for
Video Technology, vol. 13, no. 8, pp. 890-896, Aug. 2003.
[6] M.MaryShanthi Rani and K.Rosemary Euphrasia, ”Data Security
Through QR Code Encryption and Steganography”, Advanced
Computing: An International Journal (ACIJ), Vol.7, No.1/2,pp.1-7
March 2016.
[7] M. Mary Shanthi Rani and K.Rosemary Euphrasi, ”A Comparative
Study On Video Steganography in Spatial and IWT Domain”,
International Conference on Advances in Computer
Applications,2016
[8] K. A. Navas, S. Archana Thampy, and M. Sasikumar “EPR Hiding
In Medical Images for Telemedicine” International Journal of
Electrical, Computer, Energetic, Electronic and Communication
Engineering Vol: 2, No: 2, 2008.
[9] M.Maryshanthi Rani, S.Lakshmanan, “An Integrated Method of
Data Hiding and Compression of Medical Images” International
Journal of Advanced Information Technology (IJAIT) Vol. 6, No.
1, February 2016
[10] M.MaryShanthi Rani and S.Lakshmanan, ”Region Based Data
Hiding in Medical Images”,International Journal of Advanced
Research in Computer Science,vol.8 ,No.3 March – April 2017
[11] M.MaryShanthi Rani, G.Germine Mary and K.RosemaryEuphrasia
“Multilevel multimedia security by Integrating Visual
Cryptography and Stegnography Techniques”, Computational
intelligence, Cyber Security and Computational Models. Advances
in Intelligent Systems and Computing, vol.412, pp.403-412,
December, 2015.
[12] C Nagaraju and S S ParthaSarath, “Embedding ECG and patient
information in medical images” IEEE International Conference on
Recent Advances and Innovations in Engineering (ICRAIE-2014),
May 09-11, 2014, Jaipur, India.
[13] Mohit Gupta, Praveen, Kr. Tripathi, “Data Hiding Using Blind
Algorithm of Steganography”, International Journal for Research
in Applied Science & Engineering Technology, Vol. 4, Issue IX,
Sep 2016.
[14] M.MaryShanthi Rani and G.Germine Mary, “Compression of VC
Shares”, International Journal of Computational Science and
Information Technology (IJCSITY), Vol.4, Issue.1, pp.57-65,
February 2016.
[15] Mary Shanthi Rani, M. Germine Mary, G. and Rosemary
Euphrasia,K. “High level Multimedia Security by incorporating
Steganography and Visual Cryptography” International Journal of
Innovations &Advancement in Computer Science IJIACS - ISSN
2347 – 8616 Volume 4, Special Issue September 2015.
[16] Anupriya Sohaland Dr.Lalita Bhutani, „Unique Steganography
Technique Using Wavelet Transform and Neural Network”,
International Journal of Latest Trends in Engineering and
Technology, vol .5,Issue 1,jan 2015.
[17] E Divya and P Raj Kumar, "Steganographic Data Hiding using
Modified APSO", International Journal of Intelligent Systems and
Applications (IJISA), Vol.8, Issue.7, pp.37-45, 2016.
[18] M. Mary Shanthi Rani and K.Rosemary Euphrasia, “Dynamic
Hiding of message in RGB Domain based on Random Channel
Indicator”, International Journal of Applied Engineering Research,
Vol.10, Issue.76, pp.478-483, 2015.
[19] P.Thiyagarajan, V. Natarajan, G. Aghila, V. PrasannaVenkatesan
and R. Anitha, “Pattern Based 3D Image Steganography”, 3D
Research, Springer, Vol.4, Issue.1, pp.1-8, 2013
[20] M.Mary Shanthi Rani, S.Lakshmanan and P.Saranya, “Video
Steganography using Mid-Prime and Discrete Wavelet
Technique”, International Journal of Computer Engineering and
Applications, Vol. 11, Issue 8, pp.180-190, August 17.
[21] M.Mary Shanthi Rani, S.Lakshmanan and G.Deepalakshmi,
“Video Steganography using Mid-Point Circle Algorithm and
Spatial Domain Technique”, International Journal of Engineering
and Techniques, Vol. 4 Issue. 1, Jan – Feb 2018.
[22] Z.Ni, Y.-Q.Shi, N. Ansari, W. Su, “Reversible data hiding”, IEEE
Trans. Circuits Syst. Video Technol. 16 (2006) 354–362.
[23] Rajkumar Ramaswamy and Vasuki Arumugam, “Lossless Data
Hiding Based on Histogram Modification”, Int. Arab J. Inf.
Technol. 9 (2012) 445–451.
[24] M.Mary Shanthi Rani and S.Lakshmanan, “Combination of
Reversible Data Hiding and Medical Image Compression”, Journal
of Global Research in Computer Science, Vol. 9 Issue. 2, Feb
2018.
[25] R.Anushia devi, Padmapriya Praveenkumar, John bosco Balaguru
Rayappan and Rengarajan amirtharajan, „Reversible Secret Data
Hiding Based on Adjacency Pixel Difference, Journal if artificial
Intelligence, Vol.10 Issue. 1 pp.22-31, 2017.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Lakshmanan S, Rani MS

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
