A Novel Steganographic Method for Gray-Level Images
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33087
A Novel Steganographic Method for Gray-Level Images

Authors: Ahmad T. Al-Taani, Abdullah M. AL-Issa

Abstract:

In this work we propose a novel Steganographic method for hiding information within the spatial domain of the gray scale image. The proposed approach works by dividing the cover into blocks of equal sizes and then embeds the message in the edge of the block depending on the number of ones in left four bits of the pixel. The proposed approach is tested on a database consists of 100 different images. Experimental results, compared with other methods, showed that the proposed approach hide more large information and gave a good visual quality stego-image that can be seen by human eyes.

Keywords: Data Embedding, Cryptography, Watermarking, Steganography, Least Significant Bit, Information Hiding.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1081595

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2265

References:


[1] Pfitzmann, B, Information Hiding Terminology, Proceedings of the First International Workshop on Information Hiding, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1996, 174 (1), 347-356.
[2] Johnson, N., and Jajodia, S., Exploring Steganography: seeing the unseen, IEEE Computer, 1998, 58(8), 26-34.
[3] Katzenbeisser, S., and Petitcolas, F., Information Hiding Techniques for Steganography and Digital Watermarking, Boston: Artech House.London, 2000.
[4] H. Noda, J. Spaulding, M. N. Shirazi, and E. Kawaguchi, Application of bit-plane decomposition steganography to JPEG2000 encoded images, IEEE Signal Processing Letters, 9(12), 410-413, Dec. 2002.
[5] D. C. Wu and W. H. Tsai, A steganographic method for images by pixel-value differencing, Pattern Recognition Letters, 24(9-10), pp.1613-1626, 2003.
[6] Xinpeng Zhang and Shuozhong Wang, Steganography Using Multiple- Base Notational System and Human Vision Sensitivity, IEEE Signal Processing Letters, 12(1), JANUARY 2005, 67.
[7] Ross, J., Fabien, A., on the limits of Steganography, IEEE Journal, 16(4): 474-481, 1998.
[8] S. Walton, "image authentication for a slippery new age," Dr. Dobb's Journal, vol. 20, no. 4, pp. 18 26, 1995.
[9] Na-I, W. A, Study On Data Hiding For Gray-Level And Binary Images, MSc Thesis, Graduate Institute of Networking and Computation Engineering, Chaoyang University of Technology, Taiwan, May 2004.
[10] S Craver, On Public-key Steganography in the Presence of an Active Warden, IBM Research Report RC 20931, 1997.
[11] E. Franz, A. Jerichow, S. Moller, A. Pftizmann, and I. Stierland, Computer Based Steganography in Information Hiding, Lecture Notes in Computer Science, Springer, 1996, Vol. 1174, 7-21.
[12] Alwan R. H., Kadhim F. J., and Al-Taani A. T., Data Embedding Based on Better Use of Bits in Image Pixels. International Journal of Signal Processing, 2 (1), 104-107, 2005.
[13] Potdar, V., and Chang, E., Gray Level Modification Steganography for Secret Communication. IEEE International Conference on Industrial Informatics, Berlin, Germany, 2004.