Open Access   Article Go Back

Lossless Data Hiding Based on Adjacency Pixel Differences

S. Lakshmanan1 , M. Mary Shanthi Rani2

Section:Research Paper, Product Type: Journal Paper
Volume-06 , Issue-04 , Page no. 308-312, May-2018

Online published on May 31, 2018

Copyright © S. Lakshmanan, M. Mary Shanthi Rani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Lakshmanan, M. Mary Shanthi Rani, “Lossless Data Hiding Based on Adjacency Pixel Differences,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.04, pp.308-312, 2018.

MLA Style Citation: S. Lakshmanan, M. Mary Shanthi Rani "Lossless Data Hiding Based on Adjacency Pixel Differences." International Journal of Computer Sciences and Engineering 06.04 (2018): 308-312.

APA Style Citation: S. Lakshmanan, M. Mary Shanthi Rani, (2018). Lossless Data Hiding Based on Adjacency Pixel Differences. International Journal of Computer Sciences and Engineering, 06(04), 308-312.

BibTex Style Citation:
@article{Lakshmanan_2018,
author = {S. Lakshmanan, M. Mary Shanthi Rani},
title = {Lossless Data Hiding Based on Adjacency Pixel Differences},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {06},
Issue = {04},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {308-312},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=402},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=402
TI - Lossless Data Hiding Based on Adjacency Pixel Differences
T2 - International Journal of Computer Sciences and Engineering
AU - S. Lakshmanan, M. Mary Shanthi Rani
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 308-312
IS - 04
VL - 06
SN - 2347-2693
ER -

           

Abstract

Image steganography has become a vibrant research area due to increase in digital image transmission over untrusted network. Generally, after recovering the hidden data from a stego image, the host image data cannot be reconstructed perfectly. This is a main challenge for applications demanding lossless host image recovery. In this paper, a new lossless reversible data hiding technique is proposed based on differences of adjacent pixels for embedding data and has more hiding capacity compared to existing methods. The number of hiding bits that can be embedded into an image equals the number of pixels related with the peak point. The performance of the algorithm has been evaluated with hiding capacity and peak signal to noise ratio (dB). The experimental results show that the host image and hidden information can be exactly retrieved from the stego image.

Key-Words / Index Term

Reversible data hiding, Lossless reconstruction, Information security

References

[1] I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” in IEEE Trans. on Image Processing, vol. 6. No. 12, pp. 1673-1687, Dec. 1997.
[2] J. Huang and Y. Q. Shi, "An adaptive image watermarking scheme based on visual masking," IEE Electronic Letters, vol. 34, no. 8, pp. 748-750, April 1998.
[3] C. W. Honsinger, P. Jones, M. Rabbani, and J. C. Stoffel, “Lossless recovery of an original image containing embedded data,” US Patent: 6,278,791, 2001.
[4] M. Goljan, J. Fridrich, and R. Du, “Distortion-free data embedding,” Proceedings of 4th Information Hiding Workshop, pp. 27-41, Pittsburgh, PA, April, 2001.
[5] Jun Tian, "Reversible data embedding using a difference expansion," in IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890-896, Aug. 2003.
[6] M.MaryShanthi Rani and K.Rosemary Euphrasia, ”Data Security Through QR Code Encryption and Steganography”, Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2,pp.1-7 March 2016.
[7] M. Mary Shanthi Rani and K.Rosemary Euphrasi, ”A Comparative Study On Video Steganography in Spatial and IWT Domain”, International Conference on Advances in Computer Applications,2016
[8] K. A. Navas, S. Archana Thampy, and M. Sasikumar “EPR Hiding In Medical Images for Telemedicine” International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering Vol: 2, No: 2, 2008.
[9] M.Maryshanthi Rani, S.Lakshmanan, “An Integrated Method of Data Hiding and Compression of Medical Images” International Journal of Advanced Information Technology (IJAIT) Vol. 6, No. 1, February 2016
[10] M.MaryShanthi Rani and S.Lakshmanan, ”Region Based Data Hiding in Medical Images”,International Journal of Advanced Research in Computer Science,vol.8 ,No.3 March – April 2017
[11] M.MaryShanthi Rani, G.Germine Mary and K.RosemaryEuphrasia “Multilevel multimedia security by Integrating Visual Cryptography and Stegnography Techniques”, Computational intelligence, Cyber Security and Computational Models. Advances in Intelligent Systems and Computing, vol.412, pp.403-412, December, 2015.
[12] C Nagaraju and S S ParthaSarath, “Embedding ECG and patient information in medical images” IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), May 09-11, 2014, Jaipur, India.
[13] Mohit Gupta, Praveen, Kr. Tripathi, “Data Hiding Using Blind Algorithm of Steganography”, International Journal for Research in Applied Science & Engineering Technology, Vol. 4, Issue IX, Sep 2016.
[14] M.MaryShanthi Rani and G.Germine Mary, “Compression of VC Shares”, International Journal of Computational Science and Information Technology (IJCSITY), Vol.4, Issue.1, pp.57-65, February 2016.
[15] Mary Shanthi Rani, M. Germine Mary, G. and Rosemary Euphrasia,K. “High level Multimedia Security by incorporating Steganography and Visual Cryptography” International Journal of Innovations &Advancement in Computer Science IJIACS - ISSN 2347 – 8616 Volume 4, Special Issue September 2015.
[16] Anupriya Sohaland Dr.Lalita Bhutani, ‘Unique Steganography Technique Using Wavelet Transform and Neural Network”, International Journal of Latest Trends in Engineering and Technology, vol .5,Issue 1,jan 2015.
[17] E Divya and P Raj Kumar, "Steganographic Data Hiding using Modified APSO", International Journal of Intelligent Systems and Applications (IJISA), Vol.8, Issue.7, pp.37-45, 2016.
[18] M. Mary Shanthi Rani and K.Rosemary Euphrasia, “Dynamic Hiding of message in RGB Domain based on Random Channel Indicator”, International Journal of Applied Engineering Research, Vol.10, Issue.76, pp.478-483, 2015.
[19] P.Thiyagarajan, V. Natarajan, G. Aghila, V. PrasannaVenkatesan and R. Anitha, “Pattern Based 3D Image Steganography”, 3D Research, Springer, Vol.4, Issue.1, pp.1-8, 2013
[20] M.Mary Shanthi Rani, S.Lakshmanan and P.Saranya, “Video Steganography using Mid-Prime and Discrete Wavelet Technique”, International Journal of Computer Engineering and Applications, Vol. 11, Issue 8, pp.180-190, August 17.
[21] M.Mary Shanthi Rani, S.Lakshmanan and G.Deepalakshmi, “Video Steganography using Mid-Point Circle Algorithm and Spatial Domain Technique”, International Journal of Engineering and Techniques, Vol. 4 Issue. 1, Jan – Feb 2018.
[22] Z.Ni, Y.-Q.Shi, N. Ansari, W. Su, “Reversible data hiding”, IEEE Trans. Circuits Syst. Video Technol. 16 (2006) 354–362.
[23] Rajkumar Ramaswamy and Vasuki Arumugam, “Lossless Data Hiding Based on Histogram Modification”, Int. Arab J. Inf. Technol. 9 (2012) 445–451.
[24] M.Mary Shanthi Rani and S.Lakshmanan, “Combination of Reversible Data Hiding and Medical Image Compression”, Journal of Global Research in Computer Science, Vol. 9 Issue. 2, Feb 2018.
[25] R.Anushia devi, Padmapriya Praveenkumar, John bosco Balaguru Rayappan and Rengarajan amirtharajan, ‘Reversible Secret Data Hiding Based on Adjacency Pixel Difference, Journal if artificial Intelligence, Vol.10 Issue. 1 pp.22-31, 2017.