Vous êtes sur la page 1sur 5

Abstract - Pixel Value Differencing (PVD)

steganography method embeds secret data in images based


on spatial information. In Tri Pixel Value Differencing
(TPVD) steganography method the data is hidden in 2 X 2
Square block. In PVD and TPVD steganography histograms
generated are having steps at regular intervals. These steps
indicate that there is certain data hidden in the image. A
critical literature survey indicates that the PVD and TPVD
methods are very vulnerable to histogram based attacks. So
the idea is to have effective image steganography application
in terms of better security and better payload capacity. In
the proposed OCTA ( STAR )PVD method we modified the
existing TPVD method by considering 3 X 3 pixel pairs
instead of 2 X 2 pixel pairs. Due to this the number of
available pairs for data hiding is to 8 as compared to
TPVD's 3. So more data is hidden with better security.
Keywords
Steganography, PVD, TPVD, Steganalysis, Histogram.

I. INTRODUCTION
Due to rapid developments in Computers and
communication, message transmission is easy and very
important. It is convenient to deliver an electronic
message. Security during transmission is very important
and there are many ways to ensure. One of the methods of
secret communication is Cryptography. The message is
encrypted and decrypted with the help of some keys
which are known to sender and receiver. Only the person
having this key can read the secret information. But the
appearance of the message cannot be hidden which is a
risk in communication. It may attract hackers.
Steganography is another technique of invisible
communication and is done by hiding information in
some other information. Due to this one cannot detect the
secret communication and hence the risk of attracting
hackers is less as compare to cryptography. In image
steganography the cover media is called as stego image.
This image can be used to transmit secret data to the
desired destination.
Watermarking is another technique for secret
communication. It is used for copyright preservation.
Cryptography keeps the contents of a message secret,
steganography keeps the existence of a message secret.
Hence the application areas of these three secret
communication techniques are also dierent [1, 2, 3].
Research in the area of steganography is required because
cryptographic systems are not that much secure and are
have less strength. Due to policies of many government
organizations all over the world the strength of a
cryptographic systems have been limited. Due to this it is
essential to study other methods for secret
communication. People have started to believe and realize
the potential of steganography. Information hidden in a
company photograph is less suspicious than
communicating an encrypted le over the network.

II. RELATED WORK

A. Image Steganography
An image is a collection of numbers of dierent light
intensities. These numbers are stored in a grid and the
individual points are known as pixels. Today digital
images are most widely used for hiding of secret
messages. Image steganography technique exploits the
weakness of the human visual system (HVS). HVS cannot
detect the variation in luminance of color vectors at higher
frequency side of the visual spectrum [1, 2, 9]. Payload
capacity with good image quality of stego image is very
important aspect. In LSB method of image steganography
data is hidden in each pixel byte at the LSB. But some
pixels turns apparently dierent from their original
values. This eect is easily noticeable for human eyes.
PVD method is one method which was proposed for
hiding large amount of data without degrading the
performance of image. In this method the data is hidden in
dierence of two consecutive pixel values. In this method
only one direction edge is considered. But PVD
steganography can be detected by dierence histogram
analysis. In TPVD method 2 X 2 pixel blocks are used to
hide data. Though it improves the quantity of data to be
embedded, but data can be detected in histogram analysis
[3, 4, 5]. LSB steganography is very simple having low
complexity but embedding capacity is high.
In LSB a secret binary sequence is used to replace the
least signicant bits of the host medium. However many
steganalytic approaches proved that this is not a secure
method. One can easily detect the presence of hidden
data. Histograms of data samples or other derived
parameters in the suspected media can be analyzed to nd
clue of hidden information.
The PVD method hides secret data bits into 256 gray
valued images. It can Embedding capacity of PVD is
much higher without noticeable degradation of quality of
the image. It is better than LSB method as far as Visual
attacks are concerned. Human eyes can detect small
changes in smooth areas than larger changes at the edges
OCTA ( STAR ) PVD
A Different Approach of Image Steganopgraphy


Sachin .A. Thanekar
1
, Ms. Soudamini S. Pawar
2
1
M.E. Computer II Student , D Y Patil college of engineering, Akurdi, Pune 411044, India.
2
Assistant Professor, D Y Patil college of engineering, Akurdi, Pune 411044, India.
(sachin.thanekar@yahoo.co.in, psoudamini@yahoo.com)





978-1-4799-1595-8/13/$31.00 2013 IEEE

110

areas. PVD uses the dierence between two pixels for
data hiding [3, 4, 5].
In PVD method the secret data is assumed to be a long
bit stream and the cover image is a gray-level image. The
image is partitioned into blocks in such a way that no
blocks are overlapping and two consecutive pixels (pI,
and pi+1) are considered for the same. From each block
dierence d is calculated which is having range from 255
to 255. Therefore d ranges from 0 to 255. The block with
a small value d locates in the smooth area, whereas a
block with a large value d is considered as a block with
sharp edges. Human eye cannot observe more changes in
sharp edge blocks. That is more data can be hidden into
the edges than into smooth areas [3, 4, 5].
The embedding algorithm is explained as follows:
a) The dierence value di for each block is calculated
as follows, di = pi+1-pi.
b) Suitable Rk in designed range table is found using
this di as follows, j = min(ui - di) where uk = di for
all 1 = k = n. Located range Rj is found.
c) Using Rj the t i.e. the amount of data to be embedded
is found. The value t can be calculated as, t = [log2
wj ].
d) Read t bits data and transform it into a decimal value
b. For example, if bit sequence = 111, then the
converted value is b = 7. The new dierence value dI
can be calculated as, dI = lj + b, if di = 0 or dI = -(lj +
b), if di N 0. dI is used to replace the original
dierence di.
e) The values for pi and pi+1 can be modied as,
(pI,pi+1)= (pI U [m/2], pi+1 + [m/2]) where m = di-
di. Embedding into pixel pair (pI, pi+1) can be done
by changing values of pi and pi+1.
Steps 1 to 5 are to be repeated for all the secret bits to
be hidden. Thus we can obtain stego image.
For extracting the hidden secret information, the
original designed range table is required for calculations.
The stego image is partitioned into pixel pairs blocks. For
this stego image the dierence value di of two
consecutive pixels pi and pi+1 is calculated. Using this di
suitable Rj is obtained. The value for b can be calculated
by subtracting lj from di. If b is equal to b then we can
conclude that stego image is not altered and is safe. Then
this b which is in decimal value is transformed into a
binary sequence with t bits where t = [log2wj]. In TPVD
[3] method, the data hidden in each 2 x 2 block includes
four pixels of P(x,y), P(x+1,y), P(x,y+1), P(x+1,y+1)
where x and y are the pixel location in I Image. 3 pairs are
considered, P0 = (P(x,y), P(x+1,y)), P1 = P(x,y),
P(x,y+1)) and P2 = P(x,y), P(x+1,y+1)) respectively in
the algorithm for hiding data. Same method of PVD is
used for embedding and extracting data. Three pairs of
pixel for dierences are considered. Only the dierence is
the arrangement of the combination of dierence values.
If dierent reference points are selected then variable
distortion in stego image can be observed. If mi and di are
the dierence values before and after embedding
procedure. Then the rules for nding optimal reference
pair are as follows,
a) If mi is greater than 1 or mi is lesser than -1 then the
optimal pixel pair is I can be selected with the pair
with greatest m.
b) If all mi have the same sign and only one mi belongs
to 0, 1, 1 then the optimal pixel pair i can be selected
from smallest m.
c) If only one mi has a dierent sign from the other two
pairs, the optimal pixel pair i can be selected with the
smallest m.
d) If only one mi= 0, 1, 1 and the other two mi has
dierent signs, then the optimal pixel pair i can be
selected with the pair with 0,1, 1.
By using above rules we can bypass the calculation
steps of MSE estimation for nding optimal pair. Then by
using optimal pair, the new values of all three pixels in
the block can be calculated.

B. Image Steganalysis
Steganalysis is the art and science of detecting the
hidden data into the image. This can be done with or
without the knowledge of the steganographic algorithm
used at the time of embedding the secret information.
Many steganalysis methods are proposed by dierent
researchers in the literature. There are two steganalysis
categories. The method specic approach targets a
specic steganographic approach and attempts to attack it.
The universal methods or blind methods are more general
and can be used for one or more steganographic
approaches. Common features for all stegnographic
methods are extracted and a classication model is built.
This classier is used for steganalysis [7,8,9,10].

Histogram Attacks:
Histogram can be generated for the stego image. It is a
graphical representation of the distribution of color values
in an image. Human eyes cannot detect any change in the
image after embedding. But histogram can provide that
change information. If the histogram is showing steps in
the graph at regular intervals it indicates that some
algorithm is there to hide the data and using that
algorithm data is hidden in that image [10,11].
Universal Detectors:
There are two main phases for this method. In the rst
phase, a set of discriminating features are extracted. These
extracted features are then used as inputs to a suitable
classier which may have a single output to indicate
whether the image contains embedded data or not. This
can be be a single binary value or a real value which can
approximately tells the result. In second phase the
threshold value is used to binarize the output. This
threshold value can be used to check whether data is
hidden or not. Universal detectors can detect dierent
kinds of steganographic methods [10,11].
Chi-Square Attacks:
The chi-square test can be used to determine whether
the statistical properties of an image are changed or
2013 IEEE International Conference on Computational Intelligence and Computing Research
111

unchanged. The embedding data aects the histogram of
grayscale frequencies [10,11].

III. PROPOSED WORK

In PVD and TPVD steganography histograms
generated are having steps at regular intervals. These
steps indicates that there is certain data hidden in the
image. A critical look at the available literature indicates
that the PVD and TPVD method are very vulnerable to
histogram based attacks [3, 4, 5]. So the idea is to have
eective image steganography application in terms of
better security and better payload capacity.
In the proposed OCTA ( STAR )PVD method we are
modifying the TPVD method by considering 3 X 3 pixel
pairs instead of 2 X 2 pixel pairs. Due to this the number
of available pairs will be 8 as compared to TPVDs 3. So
more data can be hidden. We are also embedding security
algorithm at the same time for better security.


Fig. 1. OCTA ( STAR ) PVD Embedding
A. Embedding Algorithm

The proposed embedding algorithm the image is divided
into non-overlapping 3 3 pixel blocks.
1. The dierence value di for each block is to be
calculated same as existing algorithm.
2. Suitable Rk in designed range table is found using
this di.
3. Located range Rj is found.
4. Using Rj the t i.e. the amount of data to be embedded
is found. The value t can be calculated as t=[log2wj].
5. Read t bits data and transform it into decimal value b.
6. The values for pi, pi+1, pi-1 can be modied as, (pI,
pi+1)= (pI U [m/2], pi+1 + [m/2]), (pI, pi-1)= (pI U
[m/2], pi-1 + [m/2]) where m = di -di.
7. Embedding into pixel pair (pI, pi+1, pi-1) can be done
by changing values of pi, pi+1 and pi-1.
8. Steps 1 to 5 are to be repeated for all the secret bits to
be hidden. Thus we can obtain stego image.
For extracting the hidden secret information, the
original designed range table is required for calculations.
The stego image is partitioned into pixel pairs blocks. For
this stego image the dierence value di of two
consecutive pixels pi and pi+1 is calculated. Using this di
suitable Rj is obtained. The value for b can be calculated
by subtracting lj from di. If b is equal to b then we can
conclude that stego image is not altered and is safe. Then
this b which is in decimal value is transformed into a
binary sequence with t bits where t = [log2wj]. In the
proposed OCTA (STAR) PVD method, the data is to be
hidden in each 3 x 3 pixel blocks includes eight pixels
where x and y are the pixel location in I Image. 8 pairs are
to be considered,

x-1, y+1 x, y+1 x+1, y+1
x-1, y x, y x+1, y
x-1, y-1 x, y-1 x+1, y-1

Fig. 2. OCTA ( STAR ) PVD pixel positions

P0 = (P(x,y), P(x+1,y), P1 = P(x,y),P(x-1,y),
P2 = P(x,y), P(x-1,y-1), P3 = P(x,y), P(x,y-1),
P4 = P(x,y), P(x+1,y-1), P5 = P(x,y), P(x+1,y+1),
P6 = P(x,y), P(x,y+1), P7 = P(x,y), P(x-1,y+1)
respectively in the algorithm for hiding data. Same
method of OCTA (STAR) PVD is to be used for
embedding and extracting data. Three pairs of pixel for
dierences are considered. Only the dierence is the
arrangement of the combination of dierence values. If
dierent reference points are selected then variable
distortion in stego image can be observed. If mi and di are
the dierence values before and after embedding
procedure. Then the rules for nding optimal reference
pair are as follows,
1. If mi is greater than 1 or mi is lesser than -1 then the
optimal pixel pair is I can be selected with the pair
with greatest m.
2. If all mi have the same sign and only one mi belongs
to 0, 1, 1 then the optimal pixel pair i can be selected
from smallest m.
3. If only one mi has a dierent sign from the other two
pairs, the optimal pixel pair i can be selected with the
smallest m.
4. If only one mi= 0, 1, 1 and the other two mi has
dierent signs, then the optimal pixel pair i can be
selected with the pair with 0,1, 1.
By using above rules we can bypass the calculation
steps of MSE estimation for nding optimal pair. Then by
using optimal pair, the new values of all three pixels in
the block can be calculated.
B. Security Algorithm
For getting rid of distortion following rules are used,
Embedding bit (P0) 5 and Embedding bit (P1) 4
Embedding bit (P0) < 5 and Embedding bit (P2) 6
In existing TPVD the embedding capacity is high and
can be detected easily [4]. In order to provide better
security certain modification is made that, for the
difference d Ri , the maximum number of secrete bits
are selected to new difference in which d is less than new
difference value. And other modification is overlaps
between the boundaries of ranges are made.
2013 IEEE International Conference on Computational Intelligence and Computing Research
112


Fig. 3. OCTA ( STAR ) PVD Extraction


Fig. 4. a) Existing TPVD b) Proposed OCTA ( STAR ) PVD

C. Extraction Algorithm

1. Partition the stego-image into 33 pixel blocks, and
the partition order is the same as that in the
embedding stage.
2. Calculate the difference values di(xy) separately for
each block.
3. |di(xy)| is used to locate the suitable Rki. At the same
time, the amount of embedding bits ti where ti =
log2wji is obtained.
4. After Rki is located , lji is subtracted from the
selected |di(xy)| and bi is obtained. If image is to not
altered bi is equal to bi. finally, bi is converted from
a decimal value into a binary sequence with ti bits
where ti = log2wji.

IV. MATHEMATICAL MODEL

1. R: Let R be the set of original images.
R = (r1,r2,r3,r4)
2. P: Let P be the set of stego images.
P = (p1,p2,p3,p4)
R U P = (r1,r2,r3,r4,p1,p2,p3,p4)
R Intersection P = (r1,p1)
let r1 = original image.
let p1 = stego image.
3. S: Let S be the original image size in bytes.
S = (s1,s2,s3,s4)
4. D: Let D be the stego image size in bytes.
D = (d1,d2,d3,d4)
SD = (s1,d1)
Let p1= size s1
Let d1= size d1
5. C: Let C be the set of original images histograms.
C = (c1,c2,c3,c4)
6. X: Let X be the set of stego image histograms.
X = (x1,x2,x3,x4)
7. If C = X then no steps are generated in the
histogram after embedding.

V. RESULTS AND DISCUSSION

The TPVD Steganography method is extremely
sensitive to the Steganalysis attack of the TPVD
histogram [6, 7, 10]. The implementation results of
existing TPVD steganography are shown in table II. There
is not much visual distortion in the image before
embedding and after embedding. But there are steps
generated after embedding the data in the same image as
shown in figure 6. This is the major issue of concern and
hence it is vulnerable to histogram based attacks. These
steps should be minimized to have better application. The
embedding capacity and PSNR ratios are also shown
which shows that there is a scope for improvement.


Fig. 5. Lena Image before and after embedding


Fig. 6. Histogram without and with embedding

TABLE I
COMPARATIVE RESULTS

Cover
Image
512x512
TPVD OCTA(STAR)PVD
Capacity
(bytes)
PSNR
(dB)
Capacity
(bytes)
PSNR
(dB)
Lena 50960 41.79

52430


41.53

Baboon 56291 37.90 52430 39.49






2013 IEEE International Conference on Computational Intelligence and Computing Research
113


TABLE II
RS STEGANALYSIS RESULTS

Image Name Cover Image Stego Image
Lena 0.0105

0.0313

Baboon 0.0124 0.0217



VI. CONCLUSION AND FUTURE SCOPE

TPVD Steganography method is a new modied
version of the PVD steganography technique and results
in unchanged visual characteristics of the resulted stego
images. However, it is seen that drastic changes are there
in the probabilistic distribution of pixel pair difference
values. Pixels value alters through embedding procedure.
It hazards the security of TPVD signicantly. PVD and
TPVD can be further improved for payload capacity and
security. Modications can be done in the techniques by
increasing the embedding capability and quality of image.
The proposed OCTA (STAR) PVD method uses 3 X 3
pixel pairs hence hides more data than the original TPVD.
Also security algorithm embedded provides better
security. So the OCTA (STAR) PVD is better in terms of
hiding capacity as well as security.

REFERENCES

[1] R. Amritharajan, R. Akila, P. Deepika, A comparative analysis of
image steganography, IJCA, 2010.
[2] AnHai Doan, Jeffrey F. Naughton, Abbas Cheddad, Joan Condell,
Kevin Curran, Paul McKevitt, Digital image steganography :
Survey and analysis of current methods, Science direct, 2010.
[3] Han-ling, ZHANG, Guang-zhi GENG, Cai-qiong Xiong,
Image Steganography using Pixel-Value Differencing, Second
International Symposium on Electronic Commerce and Security,
2009.
[4] Nazanin Zaker, Shadrokh Samavi, Improving security of pixel
value dierencing stegnaographic method, IEEE, 2009.
[5] Nazanin Zaker, Shadrokh Samavi, A novel steganalysis for TPVD
steganographic method based on differences of pixel dierence
histogram, Springer Science + Business Media, LLC 2011.
[6] R. R. Ahirwal, Deepchand Ahirwal,Yogendra Kumar Jain, A
High Capacitive and Condentiality Based Image Steganography
using Private stego-key, Proceedings of the Int. Conf. on
Information Science and Applications ICISA , Chennai, India,
2010.
[7] Swagota Bera, A steganalysis of real time image by stastical
attacks, International Journal of Engineering Science and
Technology Vol. 2(9), 2010, pp. 4396-4405.
[8] Soumyendu Das, Steganography and Steganalysis: Dierent
Approaches, International Journal of Engineering Science and
Technology Vol. 2(9), 2010.
[9] Pallavi Khare,Jaikaran Singh, Mukesh Tiwari, Digital Image
Steganography, JERS/Vol.II/IssueIII/July-September,2011/101-
104.
[10] Yogendra Kumar Jain, R. R. Ahirwal, A Novel Image
Steganography Method With Adaptive Number of Least
Signicant Bits Modication Based on Private Stego-Keys,
International Journal of Computer Science and Security vol. (4),
issue (1).
[11] El-Sayed M. El-Alfy, Azzat A. Al-Sadi, Pixel-Value Differencing
Steganography: Attacks and Improvements , ICCIT, 2012.
2013 IEEE International Conference on Computational Intelligence and Computing Research
114

Vous aimerez peut-être aussi