Open Access   Article Go Back

Reversible Image Steganography Based on Interpolation and Adaptive Approach

Sumeet Kaur1 , Savina Bansal2 , R.K. Bansal3

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 1394-1398, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.13941398

Online published on May 31, 2019

Copyright © Sumeet Kaur, Savina Bansal, R.K. Bansal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sumeet Kaur, Savina Bansal, R.K. Bansal, “Reversible Image Steganography Based on Interpolation and Adaptive Approach,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1394-1398, 2019.

MLA Style Citation: Sumeet Kaur, Savina Bansal, R.K. Bansal "Reversible Image Steganography Based on Interpolation and Adaptive Approach." International Journal of Computer Sciences and Engineering 7.5 (2019): 1394-1398.

APA Style Citation: Sumeet Kaur, Savina Bansal, R.K. Bansal, (2019). Reversible Image Steganography Based on Interpolation and Adaptive Approach. International Journal of Computer Sciences and Engineering, 7(5), 1394-1398.

BibTex Style Citation:
@article{Kaur_2019,
author = {Sumeet Kaur, Savina Bansal, R.K. Bansal},
title = {Reversible Image Steganography Based on Interpolation and Adaptive Approach},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {1394-1398},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4419},
doi = {https://doi.org/10.26438/ijcse/v7i5.13941398}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.13941398}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4419
TI - Reversible Image Steganography Based on Interpolation and Adaptive Approach
T2 - International Journal of Computer Sciences and Engineering
AU - Sumeet Kaur, Savina Bansal, R.K. Bansal
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 1394-1398
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
274 205 downloads 102 downloads
  
  
           

Abstract

Information has to face certain data security related issues like confidentiality, message integrity, authorization etc while transmitted over internet, therefore need to design appropriate mechanism and techniques that ensures secrecy of private information while it is communicated over public networks has turn out to be an urgent and desired research problem. Steganography has been widely used in historical times and the also currently used with intensive interest. The advantage of steganography over cryptography is that it doesn’t raise any suspicion and the message can be exchanged over a public communication channel. It is an ongoing research area having vast number of applications in distinct fields such as defense and intelligence, medical, on-line banking, on-line transactions handling, for various financial and commercial applications, to stop music piracy etc. In this paper a modified interpolation based method is used with adaptable range table to embed in pixels of interpolated image with secret bits. Proposed method can be used for applications (like for defense, and medical purposes etc) where exact retrieval of cover object at receiver side is required, due to use of reversible embedding approach. From experimental results it is observed that proposed technique achieves higher embedding capacity, acceptable value for visual quality and robustness against statistical and visual attacks.

Key-Words / Index Term

Steganography, Data Security, Reversible Embedding, Interpolation

References

[1] R. J. Anderson and F. A. P. Petitcolas, "On the limits of steganography," in IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 474-481, May 1998.
[2] Kodge B. G., “Information Security: A Review on Steganography with Cryptography for Secured Data Transaction”, International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.6, pp.1-4, 2017.
[3] J. Fridrich, “Steganography in digital Media: Principles, Algorithms, and Applications”, Cambridge University Press, 2009.
[4] H. Wang & S. Wang, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, Vol. 47 No. 10, pp 76-82, 2004.
[5] T. M. Lehmann, C. Gonner and K. Spitzer, "Survey: interpolation methods in medical image processing," in IEEE Transactions on Medical Imaging, vol. 18, no. 11, pp. 1049-1075, Nov. 1999.
[6] Lei Zhang and Xiaolin Wu, "An edge-guided image interpolation algorithm via directional filtering and data fusion," in IEEE Transactions on Image Processing, vol. 15, no. 8, pp. 2226-2238, Aug. 2006.
[7] Ki-Hyun Jung, Kee-Young Yoo, “Data hiding method using image interpolation,” Computer Standards & Interfaces, Volume 31, Issue 2, Pages 465-470, 2009.
[8] L. Luo, Z. Chen, M. Chen, X. Zeng and Z. Xiong, "Reversible Image Watermarking Using Interpolation Technique," in IEEE Transactions on Information Forensics and Security, vol. 5, no. 1, pp. 187-193, March 2010.
[9] Wien Hong, Tung-Shou Chen "Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism," J ournal of Visual Communication and Image Representation, Volume 22, Issue 2, pp 131-140, 2011.
[10] Ya-Ting Chang, Cheng-Ta Huang, Chin-Feng Lee, Shiuh-Jeng Wang, "Image interpolating based data hiding in conjunction with pixel-shifting of histogram", The Journal of Supercomputing Volume 66, Number 2, pp 1093-1110. 2013.
[11] Lu, Tzu-Chuen, Chin-Chen Chang, and Ying-Hsuan Huang. "High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting", Multimedia Tools and Applications, volume 72, issue 1, pp 417–435, 2014.
[12] Yuan-Yu Tsai, Jian-Ting Chen, Yin-Chi Kuo, and Chi-Shiang Chan, "A generalized image interpolation-based reversible data hiding scheme with high embedding capacity and image quality", KSII Transactions on Internet and Information Systems (TIIS) VOL. 8, NO. 9, pp 3286-3301, Sep. 2014.
[13] Mingwei Tang, Shenke Zeng, Xiaoliang Chen, Jie Hu, Yajun Du, “An adaptive image steganography using AMBTC compression and interpolation technique,” Optik, Volume 127, Issue 1, pp 471-477, 2016.
[14] Tzu-Chuen Lu, “An interpolation-based lossless hiding scheme based on message recoding mechanism,” Optik, Volume 130, pp 1377-1396, 2017.
[15] Jun Tian, "Reversible data embedding using a difference expansion," in IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp 890-896, Aug. 2003.
[16] Chia-Chen Lin, Wei-Liang Tai, Chin-Chen Chang, “Multilevel reversible data hiding based on histogram modification of difference images,” Pattern Recognition, Volume 41, Issue 12, pp 3582-3591, 2008.