Browse > Article
http://dx.doi.org/10.13089/JKIISC.2006.16.2.113

Steganographic Method on Spatial Domain Using Modular Characteristic  

Park Young-Ran (Pukyong National University)
Shin Sang-Uk (Pukyong National University)
Abstract
Image steganography is a secret communication method used to transmit secret messages that have been embedded into an image. To accommodate a secret message in a digital image, the original cover image is modified by the embedding algorithm. As a result, a stego image is obtained. The sender hides the secret message in a cover image that has no meaning, and then transmits the stego image to the receiver. In this paper, we propose a steganographic method based on spatial domain to embed a secret message using a difference value of two consecutive pixels and a secret quantization range. Especially, we use the modular operation for increasing of insertion information. Through experiments, we have shown that the proposed method has much mon payload capacity, average 60 percent, than some existing methods by using modular operation.
Keywords
Data Hiding; Steganography; Image Procensing; Information Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 T. Zhang and X. Ping, 'A New Approach to Reliable Detection of LSB Steganoraphy in Natural Image', Signal Processing Journal 83, ELSEVIER, pp. 2085-2093, 2003
2 D.C. Wu and W.H. Tsai, 'A Steganographic Method for Images by Pixelvalue Differencing', ELSEVIER Pattern Recognition Letters Vol. 24, pp. 1613-1626, 2003   DOI   ScienceOn
3 Neil F. Johnson, Zoran Duric and Sushil Jajodia, 'Information Hiding', Kluwer Academic Publishers, 2001
4 E. Kawaguchi, H. Noda and M. Niimi, 'Image Data Based Steganography', Information Processing Society of Japan(IPSJ MAGAZINE) Vol. 44, No.3, pp. 236-241, 2003
5 R.Z. Wang and C.F. Lin, 'Image Hiding by Optimal LSB Substitution and Genetic Algorithm', Pattern Recognition Vol. 34, pp. 671-883, 2001   DOI   ScienceOn
6 X. Zhang and S. Wang, 'Vulnerability of pixel-value differencing steganography to histogram analysis and modi fication for enhanced security', Pattern Recognition Letters, ELSEVIER, Vol. 25, pp. 331-339, 2004   DOI   ScienceOn