Professional Documents
Culture Documents
Abstract—The traditional steganography methods with Pixel ˈwith |d| ę [0, 255]. This range is divided into r sub-
Value Differencing (PVD) usually only deal with the PVD in regions Rk (k=1,2,Ă,r), the width of each sub-region are
the horizontal direction but ignore the vertical one. In this power of 2. The number of bits embedding in the region of
paper, the cover image is divided into 2×2 nonoverlapping
Rk is n = log 2 ( wk ) , where wk is the width of the k-th sub-
blocks, then the modulus function method is used in horizontal
direction and the simple PVD method is used in vertical region.
direction for steganography. In addition, the falling-off-
B. A method of PVD based on modulus function
boundary problem is solved. Experimental results show that
the proposed approach provides higher stego-image quality, Like the same as literature [1], in paper [2], the cover
larger embedding capacity, and can against common attacks. image is divided into non-overlapping blocks, b is the
decimal value of secret information, calculate:
Keywords- Pixel Value Differencing(PVD); steganography; Frem = ( pi + p j ) mod(2n ) (1)
modulus function;Embedding capacity
Specific embedding algorithm was described in paper
[2]. When extract the secret information, first of all ,
I. INTRODUCTION calculate the number of bits each pixel can be embedded
In recent years, with the great development of Internet, n = log 2 ( wk ) , then using equation (1) to calculate the decimal
information security issues become more and more value of the embedded information, and finally change the
important. Steganography technology as an emerging decimal value Frem to n bits secret message.
technology has become an important field of information
security Components. Currently, there are many image III. STEGANOGRAPHY METHOD BASED ON PVD AND
steganography method such as: paper[1] proposed a method MODULUS FUNCTION
based on PVD (Pixel Value Differencing), which using the
difference value of two adjacent pixels of cover image to The basic processing unit of this paper’s method is 2 × 2
determine the number of bits that could embed into the pixel blocks, two pairs of horizontal direction’s pixels and a
cover image, unfortunately, this method has low embedding pair of vertical direction’s pixels are using the method in
capacity, poor stego image quality and also low security; paper [2] and [1] to embed message respectively. In order to
paper [2] proposed a kind of program based on modulus extract the secret information correctly, a modification to
function, which can significantly improve the quality of another pair of vertical direction’s pixels is needed; if there
stego image and resistant to the attacks of literature [3], but has falling-oơ-boundary problems, the value of pixels will
the embedding capacity is limited; paper [4] proposed a have to be adjusted; if the above operation doesn’t work, this
method that embedding secret message both in the block of pixels is not used to embed in the vertical direction.
horizontal and vertical direction, which is also has poor A. Embedding process
performance in embedding capacity, security and the stego Embedding process steps are as follows:
image quality because it embedding message apply simple (1). Let the original cover image from left to right, from
PVD method[1]. Make use of good features in literature [1, top to bottom into non-overlapping blocks with 2 × 2
2, 4], this paper presents a steganography method based on pixels. For an image with M×N (length and width), we can
pixel value difference and modulus function.
get nblocks = M / 2 × N / 2 blocks. The position and value of
II. RELATIVE ALGORITHMS 4 pixels in a block are as figure 1:
A B
A. Original method of PVD C D
In PVD scheme, the cover image is divided into non-
overlapping blocks, where each block consists of two Figure 1. A example of 2 × 2 block
consecutive pixels. The data hiding procedure is
independent in each block. Denote the pixel pair in some (2). Calculate d1= |B−A| , which belongs to the region of
block as Pi and Pjˈthe difference d is calculated as d=Pj−Pi Rd1, the number of embedding bits is n1; calculate
283
Number of pixels Original image Number of pixels Method in [1] Figure 4 is a security experiment over the proposed
15000 15000 method with the steganalysis method RS [7]. We can see
10000 10000 from the figure that Rm ≅ R− m , Sm ≅ S− m ˈit means the RS
method failed to detect the stego image, so that our method is
5000 5000
security against RS.
0 0
-100 -50 0 50 100 -100 -50 0 50 100 Value
15000
This paper presents an image steganography method
10000 which utilize horizontal pixels and vertical pixel difference,
10000
in the horizontal direction we use high-quality model
5000 5000 function method for two pairs of pixels to embed message
0 0 and in the vertical direction we selective one pair of pixels to
-100 -50 0 50 100 -100 -50 0 50 100 Value
embed message with the common PVD methods.
Figure 2. Pixel difference histogram analysis Experiments show that this scheme has not only improved
the embedding capacity, stego image quality, but also
achieved high security such as resistance to common attacks
and RS histogram attack.
ACKNOWLEDGMENT
This paper was supported by the National High
Technology Research and Development Program of China
(a) Cover Image (b)Stego Image (863 Program) No. 2007AA01Z429; Natural Science
Figure 3. Visual comparison of cover image and stego image Foundation funding issues of Shaanxi Province No.
2010JM8034˗Foundation funding research project of the
Engineering College of Chinese Armed Police Force No.
Also we can see from Figure 2, the steganalysis method wjy201027.
shown in [3] can detect [1] and [4] easily because their
histograms have obvious steps, on the other hand, our REFERENCES
method’s histogram is the same as the histogram of original [1] Wu Da-chun, Tsai Wen-Hsiang. “A Steganographic Method for
cover image. Figure 3 is the comparison of image lena that Images by Pixel Value Differencing,” Pattern Recognition Letters,
2003, 24(9): 1613-1626.
before and after embedding message. Human eyes can’t
[2] Wang Chung-Ming, Wu Nan-i, Tsai Chwei-shyong, et al. “A High
distinguish it, it means that the stego image has good visual Quality Steganographic Method with Pixel Value Differencing and
quality. Modulus Function,” Journal of Systems and Software, 2008, 81(1):
150-158.
[3] Zhang Xinpeng, Wang Shuozhong. “Vulnerability of Pixel Value
Differencing Steganography to Histogram Analysis and Modification
for Enhanced Security,” Pattern Recognition Letters, 2004, 25(3):
331-339.
[4] BU Long, HU Bo. “An improved steganographic method by pixel-
value differencing,” Journal of circuits and systems, 2006, 11(3): 9-
13.
[5] Chan Chi-Kwong, Chen Lee-ming. “Hiding Data in Images by
Simple LSB Substitution,” Pattern Recognition, 2004, 37(3): 469-
474.
[6] Zheng jiangyun, Jiang julang. “Image quality assessment algorithm
based on sense capacity,” Computer engineering, , 2010, 36(8): 222-
223.
[7] Fridrich J, Goljan M, Du R. “Reliable Detection of LSB
Steganography in grayscale and color image,” Proc. ACM Workshop
Figure 4. RS steganalysis over the proposed method on Multimedia and security, 2001. 27-30.
284