Open Access   Article Go Back

LSB Substitution and PVD performance analysis for image steganography

Serdar SOLAK1 , Umut ALTINIŞIK2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-10 , Page no. 1-4, Oct-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i10.14

Online published on Oct 31, 2018

Copyright © Serdar SOLAK , Umut ALTINIŞIK . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Serdar SOLAK , Umut ALTINIŞIK, “LSB Substitution and PVD performance analysis for image steganography,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.1-4, 2018.

MLA Style Citation: Serdar SOLAK , Umut ALTINIŞIK "LSB Substitution and PVD performance analysis for image steganography." International Journal of Computer Sciences and Engineering 6.10 (2018): 1-4.

APA Style Citation: Serdar SOLAK , Umut ALTINIŞIK, (2018). LSB Substitution and PVD performance analysis for image steganography. International Journal of Computer Sciences and Engineering, 6(10), 1-4.

BibTex Style Citation:
@article{SOLAK_2018,
author = {Serdar SOLAK , Umut ALTINIŞIK},
title = {LSB Substitution and PVD performance analysis for image steganography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {10},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {1-4},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2971},
doi = {https://doi.org/10.26438/ijcse/v6i10.14}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i10.14}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2971
TI - LSB Substitution and PVD performance analysis for image steganography
T2 - International Journal of Computer Sciences and Engineering
AU - Serdar SOLAK , Umut ALTINIŞIK
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 1-4
IS - 10
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
814 891 downloads 314 downloads
  
  
           

Abstract

Image Steganography is data hiding technology to transmit securely significant data in an open channel. In this paper, we present performance analysis of Least Significant Bit (LSB) substitution and Pixel-Value Differencing (PVD) methods commonly used in image steganography. The comparison of these methods is performed by using Peak Signal-to-Noise Ratio (PSNR), Structural Similarity Index (SSIM) and payload values. The 512 x 512 size of colored and gray-scale cover images as Lena, Baboon, Peppers, and Airplane are used in the experimental studies. In the LSB method, the PSNR values are about 51.6, while the PVD method is between 37.83 and 41.28 for colored cover image. In gray-scale images, while PVD is between 38.52 and 41.42, the LSB is about 51.14. In our paper results shows that PSNR and SSIM values are higher in LSB substitution than PVD method. However, PVD method embeds more secret data than LSB substitution method into cover image with less visual perceptibility.

Key-Words / Index Term

LSB, PVD, Image Steganography, Security, Data hiding

References

[1] C.K. Chan, L.M. Cheng “Hiding data in images by simple LSB substitution” Pattern recognition, Vol.37 Issue 3, pp. 469-474, 2004
[2] R. Bhardwaj, V. Sharma, “Image steganography based on complemented message and inverted bit LSB substitution”. Procedia Computer Science, Issue: 93, pp 832-838, 2016
[3] S.M. Karim, M.S. Rahman, M.I. Hossain, “A new approach for LSB based image steganography using secret key”, In Computer and Information Technology (ICCIT), 2011 14th International Conference on IEEE pp. 286-291. December, 2011.
[4] J. Mielikainen, “LSB matching revisited”. IEEE signal processing letters, Vol. 13, Issue 5,pp. 285-287, 2006.
[5] R.Z. Wang, C.F. Lin, J.C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm”. Pattern recognition, Vol. 34, Issue 3, pp. 671-683, 2001.
[6] C.C. Chang, M.H. Lin, Y.C. Hu, “A fast and secure image hiding scheme based on LSB substitution”. International Journal of Pattern Recognition and Artificial Intelligence, Vol 16, Issue 04, pp 399-416, 2002.
[7] R. Sharma, A. Dwivedi, V. Namdeo, "An Approach of LSB- Symmetric Cryptography to Secure Classified Text Content", International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.176-182, 2018.
[8] Neha, Mr Mohit, "A Review on “Image Steganography with LSB & DWT Techniques”", International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.813-818, 2018.
[9] K. Arora, G. Gandhi, "A Review of Approaches for Steganography", International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.118-122, 2014.
[10] D.C. Wu, W.H. Tsai, “A steganographic method for images by pixel-value differencing”. Pattern Recognition Letters, Vol 24 Issue 9-10, pp.1613-1626, 2003.
[11] A. Sancheti, “Pixel Value Differencing Image Steganography Using Secret Key”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN, 2278-3075, 2012.
[12] C.M. Wang, N.I. Wu, C.S. Tsai, M.S. Hwang, “A high quality steganographic method with pixel-value differencing and modulus function”, Journal of Systems and Software, Vol 8, Issue 1, pp. 150-158, 2008.
[13] J.K. Mandal, D. Das, “Colour image steganography based on pixel value differencing in spatial domain . International journal of information sciences and techniques, Vol. 2, Isuue 4, 2012.
[14] Z. Hanling, G. Guangzhi, X. Caiqiong, “Image steganography using pixel-value differencing”, In Electronic Commerce and Security, 2009. ISECS`09. Second International Symposium on Vol. 2, pp. 109-112, 2009.
[15] S. Prasad, A.K. Pal, “An RGB colour image steganography scheme using overlapping block-based pixel-value differencing”, Royal Society open science, Vol 4, Issue 4, 161066, 2017.
[16] M. Hussain, A.W.A Wahab, Y.I.B. Idris, A.T. Ho, K.H. Jung, “Image steganography in spatial domain: A survey”, Signal Processing: Image Communication, Vol 65, pp 46-66, 2018.
[17] Z. Wang, E. P. Simoncelli, A.C. Bovik, “Multiscale structural similarity for image quality assessment”. In The Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, Vol. 2, pp. 1398-1402, 2003.