We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

A High Capacity Steganographic Technique based on LSB and PVD Modulus Methods

by Manjunath Gadiparthi, Keshav Sagar, Divya Sahukari, Rakesh Chowdary
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 22 - Number 5
Year of Publication: 2011
Authors: Manjunath Gadiparthi, Keshav Sagar, Divya Sahukari, Rakesh Chowdary
10.5120/2582-3568

Manjunath Gadiparthi, Keshav Sagar, Divya Sahukari, Rakesh Chowdary . A High Capacity Steganographic Technique based on LSB and PVD Modulus Methods. International Journal of Computer Applications. 22, 5 ( May 2011), 8-11. DOI=10.5120/2582-3568

@article{ 10.5120/2582-3568,
author = { Manjunath Gadiparthi, Keshav Sagar, Divya Sahukari, Rakesh Chowdary },
title = { A High Capacity Steganographic Technique based on LSB and PVD Modulus Methods },
journal = { International Journal of Computer Applications },
issue_date = { May 2011 },
volume = { 22 },
number = { 5 },
month = { May },
year = { 2011 },
issn = { 0975-8887 },
pages = { 8-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume22/number5/2582-3568/ },
doi = { 10.5120/2582-3568 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:08:36.143202+05:30
%A Manjunath Gadiparthi
%A Keshav Sagar
%A Divya Sahukari
%A Rakesh Chowdary
%T A High Capacity Steganographic Technique based on LSB and PVD Modulus Methods
%J International Journal of Computer Applications
%@ 0975-8887
%V 22
%N 5
%P 8-11
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Though many novel image steganographic techniques have been proposed in the recent years, PVD modulus method produces high quality stego images, when compared with other methods. But a significant drawback of PVD modulus method is low capacity. The hiding capacity is extremely low in PVD modulus method, when compared with other methods like LSB, etc. The reason for the low hiding capacity is that, with PVD modulus method we divide the pixel blocks in to smooth blocks where, the pixel value difference is low and edge blocks where the pixel value difference is high. In this paper, we propose a technique, which is a combination of PVD modulus and LSB method. As per the experimental results hiding capacity increases enormously.

References
  1. Johnson, N. and Jajodia, S. Exploring steganography: Seeing the unseen, IEEE Computers. Vol.31, 1998, pp.26–34.
  2. Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica Fridrich and Ton Kalker, Digital Watermarking and Steganography 2nd Edition, Morgan Kaufmann Publishers, 2008.
  3. Nan-I Wu and Min-Shiang Hwang, Data Hiding: Current Status and Key Issues, International Journal of Network Security, Vol.4, No.1, 2007 PP.1–9
  4. C.-C. Chang and W.-C. Wu, Hiding secret data adaptively in vector quantization index tables, IEEE Proceedings -Vison and Image Signal Processing, Vol. 153, 2006, pp.589-597
  5. Artz, D., Digital Steganography: Hiding Data within Data, IEEE Internet Computing Journal, June2001
  6. Bao, P., and Ma, X.: Image adaptive watermarking using wavelet domain singular value decomposition, IEEE Trans. Circuits Syst. Video Technol., vol.15, 2005, pp. 96–102
  7. Walton, S,Image authentication for a slippery new age, Dr. Dobbs J., 1995, 20, (4), pp. 18–26
  8. Wang, R.Z., Lin, C.F., and Lin, J.C.: Image hiding by optimal LSB substitution and genetic algorithm‟, Pattern Recognition., 2001, 34, (3),pp. 671–683
  9. Chang, C.C., Hsiao, J.Y., and Chan, C.S.: „Finding optimal least significant- bit substitution in image hiding by dynamic programming strategy‟, Pattern Recognition., 2003, 36, (7), pp. 1583–1595
  10. Lee, Y.K., and Chen, L.H.: „High capacity steganographic model, IEE Proc., Vis. Image Signal Process., 2000, 147, (3), pp. 288–294
  11. Fu, M.S., and Au, O.C.: „Data hiding watermarking for halftone images‟, IEEE Trans. Image Process., 2002, Tseng, Y.C., Chen, Y.Y., and Pan, H.K.: „A secure data hiding scheme for binary images, IEEE Trans. Commun., 2002, 50, pp. 1227–123.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography LSB Method PVD Modulus Method