Lossless Data Hiding Based on Adjacency Pixel Differences

Authors

  • Lakshmanan S D Department of Computer Science and Applications, The Gandhigram Rural Institute - Deemed to be University, Gandhigram,Dindigul, Tamilnadu - 624
  • Rani MS D Department of Computer Science and Applications, The Gandhigram Rural Institute - Deemed to be University, Gandhigram,Dindigul, Tamilnadu - 624

Keywords:

Reversible data hiding, Lossless reconstruction, Information security

Abstract

Image steganography has become a vibrant research area due to increase in digital image transmission over untrusted network. Generally, after recovering the hidden data from a stego image, the host image data cannot be reconstructed perfectly. This is a main challenge for applications demanding lossless host image recovery. In this paper, a new lossless reversible data hiding technique is proposed based on differences of adjacent pixels for embedding data and has more hiding capacity compared to existing methods. The number of hiding bits that can be embedded into an image equals the number of pixels related with the peak point. The performance of the algorithm has been evaluated with hiding capacity and peak signal to noise ratio (dB). The experimental results show that the host image and hidden information can be exactly retrieved from the stego image.

References

[1] I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread

spectrum watermarking for multimedia,” in IEEE Trans. on Image

Processing, vol. 6. No. 12, pp. 1673-1687, Dec. 1997.

[2] J. Huang and Y. Q. Shi, "An adaptive image watermarking scheme

based on visual masking," IEE Electronic Letters, vol. 34, no. 8,

pp. 748-750, April 1998.

[3] C. W. Honsinger, P. Jones, M. Rabbani, and J. C. Stoffel,

“Lossless recovery of an original image containing embedded

data,” US Patent: 6,278,791, 2001.

[4] M. Goljan, J. Fridrich, and R. Du, “Distortion-free data

embedding,” Proceedings of 4th Information Hiding Workshop,

pp. 27-41, Pittsburgh, PA, April, 2001.

[5] Jun Tian, "Reversible data embedding using a difference

expansion," in IEEE Transactions on Circuits and Systems for

Video Technology, vol. 13, no. 8, pp. 890-896, Aug. 2003.

[6] M.MaryShanthi Rani and K.Rosemary Euphrasia, ”Data Security

Through QR Code Encryption and Steganography”, Advanced

Computing: An International Journal (ACIJ), Vol.7, No.1/2,pp.1-7

March 2016.

[7] M. Mary Shanthi Rani and K.Rosemary Euphrasi, ”A Comparative

Study On Video Steganography in Spatial and IWT Domain”,

International Conference on Advances in Computer

Applications,2016

[8] K. A. Navas, S. Archana Thampy, and M. Sasikumar “EPR Hiding

In Medical Images for Telemedicine” International Journal of

Electrical, Computer, Energetic, Electronic and Communication

Engineering Vol: 2, No: 2, 2008.

[9] M.Maryshanthi Rani, S.Lakshmanan, “An Integrated Method of

Data Hiding and Compression of Medical Images” International

Journal of Advanced Information Technology (IJAIT) Vol. 6, No.

1, February 2016

[10] M.MaryShanthi Rani and S.Lakshmanan, ”Region Based Data

Hiding in Medical Images”,International Journal of Advanced

Research in Computer Science,vol.8 ,No.3 March – April 2017

[11] M.MaryShanthi Rani, G.Germine Mary and K.RosemaryEuphrasia

“Multilevel multimedia security by Integrating Visual

Cryptography and Stegnography Techniques”, Computational

intelligence, Cyber Security and Computational Models. Advances

in Intelligent Systems and Computing, vol.412, pp.403-412,

December, 2015.

[12] C Nagaraju and S S ParthaSarath, “Embedding ECG and patient

information in medical images” IEEE International Conference on

Recent Advances and Innovations in Engineering (ICRAIE-2014),

May 09-11, 2014, Jaipur, India.

[13] Mohit Gupta, Praveen, Kr. Tripathi, “Data Hiding Using Blind

Algorithm of Steganography”, International Journal for Research

in Applied Science & Engineering Technology, Vol. 4, Issue IX,

Sep 2016.

[14] M.MaryShanthi Rani and G.Germine Mary, “Compression of VC

Shares”, International Journal of Computational Science and

Information Technology (IJCSITY), Vol.4, Issue.1, pp.57-65,

February 2016.

[15] Mary Shanthi Rani, M. Germine Mary, G. and Rosemary

Euphrasia,K. “High level Multimedia Security by incorporating

Steganography and Visual Cryptography” International Journal of

Innovations &Advancement in Computer Science IJIACS - ISSN

2347 – 8616 Volume 4, Special Issue September 2015.

[16] Anupriya Sohaland Dr.Lalita Bhutani, „Unique Steganography

Technique Using Wavelet Transform and Neural Network”,

International Journal of Latest Trends in Engineering and

Technology, vol .5,Issue 1,jan 2015.

[17] E Divya and P Raj Kumar, "Steganographic Data Hiding using

Modified APSO", International Journal of Intelligent Systems and

Applications (IJISA), Vol.8, Issue.7, pp.37-45, 2016.

[18] M. Mary Shanthi Rani and K.Rosemary Euphrasia, “Dynamic

Hiding of message in RGB Domain based on Random Channel

Indicator”, International Journal of Applied Engineering Research,

Vol.10, Issue.76, pp.478-483, 2015.

[19] P.Thiyagarajan, V. Natarajan, G. Aghila, V. PrasannaVenkatesan

and R. Anitha, “Pattern Based 3D Image Steganography”, 3D

Research, Springer, Vol.4, Issue.1, pp.1-8, 2013

[20] M.Mary Shanthi Rani, S.Lakshmanan and P.Saranya, “Video

Steganography using Mid-Prime and Discrete Wavelet

Technique”, International Journal of Computer Engineering and

Applications, Vol. 11, Issue 8, pp.180-190, August 17.

[21] M.Mary Shanthi Rani, S.Lakshmanan and G.Deepalakshmi,

“Video Steganography using Mid-Point Circle Algorithm and

Spatial Domain Technique”, International Journal of Engineering

and Techniques, Vol. 4 Issue. 1, Jan – Feb 2018.

[22] Z.Ni, Y.-Q.Shi, N. Ansari, W. Su, “Reversible data hiding”, IEEE

Trans. Circuits Syst. Video Technol. 16 (2006) 354–362.

[23] Rajkumar Ramaswamy and Vasuki Arumugam, “Lossless Data

Hiding Based on Histogram Modification”, Int. Arab J. Inf.

Technol. 9 (2012) 445–451.

[24] M.Mary Shanthi Rani and S.Lakshmanan, “Combination of

Reversible Data Hiding and Medical Image Compression”, Journal

of Global Research in Computer Science, Vol. 9 Issue. 2, Feb

2018.

[25] R.Anushia devi, Padmapriya Praveenkumar, John bosco Balaguru

Rayappan and Rengarajan amirtharajan, „Reversible Secret Data

Hiding Based on Adjacency Pixel Difference, Journal if artificial

Intelligence, Vol.10 Issue. 1 pp.22-31, 2017.

Downloads

Published

2018-05-31

How to Cite

[1]
S. Lakshmanan and M. S. Rani, “Lossless Data Hiding Based on Adjacency Pixel Differences”, Int. J. Comp. Sci. Eng., vol. 6, no. 4, pp. 308–312, May 2018.