CFP last date
20 January 2025
Reseach Article

Comparison of LSB and PVD Steganography Methods

Published on September 2015 by Khandagale P.m, Mukane S.m, and Sadekar D.g
Emerging Applications of Electronics System, Signal Processing and Computing Technologies
Foundation of Computer Science USA
NCESC2015 - Number 2
September 2015
Authors: Khandagale P.m, Mukane S.m, and Sadekar D.g
78c9cd9d-fafb-46e4-a9ee-c798eb5c597f

Khandagale P.m, Mukane S.m, and Sadekar D.g . Comparison of LSB and PVD Steganography Methods. Emerging Applications of Electronics System, Signal Processing and Computing Technologies. NCESC2015, 2 (September 2015), 15-17.

@article{
author = { Khandagale P.m, Mukane S.m, and Sadekar D.g },
title = { Comparison of LSB and PVD Steganography Methods },
journal = { Emerging Applications of Electronics System, Signal Processing and Computing Technologies },
issue_date = { September 2015 },
volume = { NCESC2015 },
number = { 2 },
month = { September },
year = { 2015 },
issn = 0975-8887,
pages = { 15-17 },
numpages = 3,
url = { /proceedings/ncesc2015/number2/22368-7338/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Emerging Applications of Electronics System, Signal Processing and Computing Technologies
%A Khandagale P.m
%A Mukane S.m
%A and Sadekar D.g
%T Comparison of LSB and PVD Steganography Methods
%J Emerging Applications of Electronics System, Signal Processing and Computing Technologies
%@ 0975-8887
%V NCESC2015
%N 2
%P 15-17
%D 2015
%I International Journal of Computer Applications
Abstract

Now a day's as the internet is widely in-use hence the information is transferred with a single click. Information is transferred usingviz; images, videos, texts but the most popular format is the images. In order to transfer the information in a secure way, methods like cryptography, watermarking and Steganography have come into practice. But amongst all above methods Steganography is more reliable and apt because itsan art that involves communication of secret data with an appropriate carrier. Many Steganography methods have been design depending upon requirements such as data hiding capacity, robustness, image quality and each having its pros and cons. This paper aims to give thorough understanding and evolution of different existing 'Digital Image Steganography Techniques' of data hiding in spatial and transform domain. It also covers and integrates comparison of Least Significant bit (LSB) method as well as Pixel Value Difference Method (PVD).

References
  1. C. K. Chan and L. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition, vol. 37, no. 3, 2004, pp. 469–474.
  2. D. C. Wu and W. H. Tsai, "A steganographic method for images by pixel-value differencing," Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1613–1626, 2003.
  3. Johnson, N. F. &Jajodia, S. , "Exploring Steganography: Seeing the Unseen", Computer Journal,February 1998.
  4. Krenn, R. , "Steganography and Steganalysis", http://www. krenn. nl/univ/cry/steg/article. pdf.
  5. Wang, H & Wang, S, "Cyber warfare: Steganography vs. Steganalysis", Communications of the ACM,47:10, October 2004.
  6. H. B. Kekre, ArchanaAthawale, and PallaviN. Halarnkar, "Increased Capacity of Information Hiding in LSB's Method for Text and Image", International Journal of Electrical and Electronics Engineering 2:4 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Lsb Pvd.