We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

High Capacity Data Embedding in Images by Pixel Triplets Matching

by R. Sunder, P. Eswaran, A. Nagalinga Rajan, S. Poonkuntran
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 13
Year of Publication: 2013
Authors: R. Sunder, P. Eswaran, A. Nagalinga Rajan, S. Poonkuntran
10.5120/12804-0063

R. Sunder, P. Eswaran, A. Nagalinga Rajan, S. Poonkuntran . High Capacity Data Embedding in Images by Pixel Triplets Matching. International Journal of Computer Applications. 73, 13 ( July 2013), 38-43. DOI=10.5120/12804-0063

@article{ 10.5120/12804-0063,
author = { R. Sunder, P. Eswaran, A. Nagalinga Rajan, S. Poonkuntran },
title = { High Capacity Data Embedding in Images by Pixel Triplets Matching },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 13 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 38-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number13/12804-0063/ },
doi = { 10.5120/12804-0063 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:40:01.959210+05:30
%A R. Sunder
%A P. Eswaran
%A A. Nagalinga Rajan
%A S. Poonkuntran
%T High Capacity Data Embedding in Images by Pixel Triplets Matching
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 13
%P 38-43
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper a data hiding method based on pixel pair matching (PPM) is presented. Pixel pair matching uses a pair of pixel intensity values as reference coordinates and searches the coordinate neighborhood according to the given message digit. The searched coordinate which encodes the message digit is put in place of the pixel pair. Exploiting modification direction (EMD), Diamond Encoding (DE) and Adaptive Pixel Pair Matching (APPM) are recently proposed methods based on PPM. Among these Adaptive Pixel Pair Matching provides the highest capacity of embedding with a given distortion. This paper presents an extension of the method to higher dimensional coordinate system and in particular with Pixel Triplet Matching (PTM). The experiments showed that PTM achieves higher capacity while being computationally feasible. The method is also resistant to simple steganalysis with adjacent HCF-COM.

References
  1. Ingemar. J. Cox et al, "Digital Watermarking and Steganography,", 2nd ed. Morgan Kaufmann series in computer security.
  2. J. Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge, U. K. : Cambridge Univ. Press, 2009.
  3. C. K. Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition. , vol. 37, no. 3, pp. 469–474, 2004.
  4. J. Fridrich, M. Goljan, and R. Du, "Reliable detection of LSB steganography in color and grayscale images," in Proc. Int. Workshop on Multimedia and Security, 2001, pp. 27–30.
  5. J. Mielikainen, "LSB matching revisited," IEEE Signal Process. Lett. , vol. 13, no. 5, pp. 285–287, May 2006.
  6. X. Zhang and S. Wang, "Efficient steganographic embedding by exploiting modification direction," IEEE Commun. Lett. , vol. 10, no. 11, pp. 781–783, Nov. 2006.
  7. R. M. Chao, H. C. Wu, C. C. Lee, and Y. P. Chu, "A novel image data hiding scheme with diamond encoding," EURASIP J. Inf. Security, vol. 2009, 2009, DOI: 10. 1155/2009/658047, Article ID 658047.
  8. Wien Hong; Tung-Shou Chen; , "A Novel Data Embedding Method Using Adaptive Pixel Pair Matching," Information Forensics and Security, IEEE Transactions on , vol. 7, no. 1, pp. 176-184, Feb. 2012 doi: 10. 1109/TIFS. 2011. 2155062
  9. T. Filler, J. Judas, and J. Fridrich, "Minimizing embedding impact in steganography using trellis-coded quantization," in Proc. SPIE, Media Forensics and Security, 2010, vol. 7541, DOI: 10. 1117/12. 838002.
  10. S. Lyu and H. Farid, "Steganalysis using higher-order image statistics," IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 111–119, Mar. 2006.
  11. N. Provos and P. Honeyman, "Hide and seek: An introduction to steganography," IEEE Security Privacy, vol. 3, no. 3, pp. 32–44, May/Jun. 2003.
  12. A. D. Ker, "Steganalysis of LSB matching in grayscale images," IEEE Signal Process. Lett. , vol. 12, no. 6, pp. 441–444, Jun. 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Diamond Encoding Least Significant Bit Pixel Pair Matching