Open Access   Article Go Back

High Capacity PVD Steganography Using Back Propagation Artificial Neural Network

Jyoti Pandey1 , Kamaldeep Joshi2 , Mohit Jangra3 , Tanu Garg4 , Sangeeta 5 , Parth Kaushik6

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-6 , Page no. 322-330, Jun-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i6.322330

Online published on Jun 30, 2018

Copyright © Jyoti Pandey, Kamaldeep Joshi, Mohit Jangra, Tanu Garg, Sangeeta, Parth Kaushik . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Jyoti Pandey, Kamaldeep Joshi, Mohit Jangra, Tanu Garg, Sangeeta, Parth Kaushik, “High Capacity PVD Steganography Using Back Propagation Artificial Neural Network,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.322-330, 2018.

MLA Style Citation: Jyoti Pandey, Kamaldeep Joshi, Mohit Jangra, Tanu Garg, Sangeeta, Parth Kaushik "High Capacity PVD Steganography Using Back Propagation Artificial Neural Network." International Journal of Computer Sciences and Engineering 6.6 (2018): 322-330.

APA Style Citation: Jyoti Pandey, Kamaldeep Joshi, Mohit Jangra, Tanu Garg, Sangeeta, Parth Kaushik, (2018). High Capacity PVD Steganography Using Back Propagation Artificial Neural Network. International Journal of Computer Sciences and Engineering, 6(6), 322-330.

BibTex Style Citation:
@article{Pandey_2018,
author = {Jyoti Pandey, Kamaldeep Joshi, Mohit Jangra, Tanu Garg, Sangeeta, Parth Kaushik},
title = {High Capacity PVD Steganography Using Back Propagation Artificial Neural Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {322-330},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2183},
doi = {https://doi.org/10.26438/ijcse/v6i6.322330}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.322330}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2183
TI - High Capacity PVD Steganography Using Back Propagation Artificial Neural Network
T2 - International Journal of Computer Sciences and Engineering
AU - Jyoti Pandey, Kamaldeep Joshi, Mohit Jangra, Tanu Garg, Sangeeta, Parth Kaushik
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 322-330
IS - 6
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
529 578 downloads 253 downloads
  
  
           

Abstract

To represent the image on a screen, several bits is used. Image compression a technique which is used to reduce the number of bits used for representation. Image compression helps in reducing the size of the image which results in less storage space and less cost of the transmission. The image is as compressed as the quality of the image is retained. In this paper, the image is compressed first and then the secret message is hidden in it using Tri-way Pixel Value Difference method. A neural network algorithm called Back Propagation Neural Network Algorithm is used for image compression. The benefit of using back propagation algorithm for using image compression is the vast increase in performance of the system as well as less convergence time for neural network training which not only maintain the quality of the image but also reduce the overall size of the image. This neural network method for image compression has shown a very promising result in image compression. After compression of the image, the secret message is embedded using Tri-way pixel Value Difference method which not only provides imperceptible stego image but also enlarges the capacity of the hidden secret information.

Key-Words / Index Term

Artificial Neural Network, Steganography, Image Compression, Back Propagation Algorithm, Pixel-Value Differencing, Data Hiding

References

[1] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, “Information Hiding - a Survey,” Proceedings of the IEEE, Vol. 87, pp. 1062–1078, 1999.
[2] W. Bender, D. Gruhl, N. Morimoto, A. Lu, “Techniques for data hiding,” IBM Systems Journal Vol. 35 (3–4), pp. 313–336, 1996.
[3] Y. K. Lee, L. H. Chen, “High capacity image steganographic model,” IEE Proceedings on Vision, Image and Signal Processing, Vol. 147, No.3, pp. 288-294, 2000.
[4] R.-Z. Wang, C.-F. Lin, and J.-C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, Vol. 34, pp. 671–683, 2001.
[5] C.-C. Chang, J.-Y. Hsiao, C.-S. Chan, “Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy,” Pattern Recognition ,Vol. 36, Issue 7, pp. 1583-1595, 2003.
[6] C.-K. Chan, L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition Vol. 37, Issue 3, pp. 469-474, 2004.
[7] W.-N. Lie, and L.-C. Chang, “Data hiding in images with adaptive numbers of least significant bits based on the human visual system,” IEEE International Conference on Image Processing, Vol. 1, pp. 286–290, 1999.
[8] D.-C. Wu, and W.-H. Tsai, “A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters, Vol. 24, pp. 1613–1626, 2003.
[9] H.-C. Wu, N.-I. Wu, C.-S. Tsai, and M.-S. Hwang, “Image steganographic scheme based on pixel-value differencing and LSB replacement methods,” IEE Proceedings on Vision, Image and Signal Processing, Vol. 152, No. 5, pp. 611-615, 2005.
[10] S.-L. Li, K.-C. Leung, L.-M. Cheng, and C.-K. Chan,“Data Hiding in Images by Adaptive LSB Substitution Based on the Pixel-Value Differencing,” First International Conference on Innovative Computing, Information and Control (ICICIC`06), Vol. 3, pp. 58-61, 2006.
[11] S. Voloshynovskiy, S. Pereira, T. Pun, J. J. Eggers, and J. K. Su, “Attacks on digital watermarks: classification, estimation based attacks, and benchmarks,” IEEE Communications Magazine, Vol. 39, Issue 8, 118-126, 2001.
[12] J. Fridrich, M. Goljan, and R. Du, “Detecting LSB steganography in color, and gray-scale images,” IEEE multimedia, Vol. 8, Issue 4, pp. 22-28, 2001.

[13] Ko-Chin Changa, Chien-Ping Changa, Ping S. Huangb, and Te-Ming Tua, “A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing,” Journal Of Multimedia, Vol. 3, NO. 2, 2008.
[14] Abbas Razavi, Rutie Adar, Isaac Shenberg, Rafi Retter and Rami Friedlander “VLSI implementation of an image compression algorithm with a new bit rate control capability,” Zoran Corporation, 1705 Wyatt Drive, Santa Clara, CA 95054.This paper was published in IEEE international conference ,vol. 5, pp.669-672, 1992.
[15] Ronald A .DeVore, Bjorn Jawerth, and Bradley J.Lucier. “Image compression through wavelet transforms coding,” Ieee Transactions on Information Theory, Vol. 38. No .2, 1992.
[16] David Jeff Jackson and Sidney Jwl Hannah “Comparative analysis of image compression technique” Department of Electrical Engineering ,The University of Alabama, Tuscaloosa, AL 35487.This paper appears in system theory 1993,proceeding SSSST’93, twenty fifth edition southeastern symposium, pp. 513-517, 1993.
[17] P.Moravie, H.Essafi, C. Lambertt-Nebout and J-L. Basill. “Real time image compression using SIMD architecture” Centre Spatial de Toulouse 18 Avenue Edouard Belin BP 1421. This paper appears in computer architecture for machine perception, 274-279, 1995.
[18] JJiang “Neural network technology for image compression,” Bolton Institute, UK. This paper appears in broadcasting convection, pp.250-257, 1995.
[19] Michael T. Kurdziel. “Image compression and transmission for HF radio system”. Harrish corporation RF communication division Rochester, NY. This paper appears in MILLCON, vol 2 on pp.1281-1285, 2002.
[20] Aaron T. Deever and Sheila S. “Lossless image compression with projection based and adaptive reversible integer wavelet transform”. This paper appears in IEEE transactions of image processing, vol 12, 2003.
[21] Jian Li, Caixin Sun. “Partial discharge image recognition influced by fractal image compression ,” Department of High Voltage and Insulation Technology, College of Electrical Engineering, Chongqing University. China. This paper appears in Dielectric and electrical insulation, IEEE transactions, vol 15, pp. 496-504, 2008.
[22] Guan-Nan Hu, Chen-Chung Liu, Kai-Wen Chuang, Shyr-Shen Yu, Ta-Shan Tsui, “General Regression Neural Network utilized for color transformation between images on RGB color space,” Proceedings of international conference on machine learning and cybernatics, pp. 1793 – 1799, 2011.