International Journal of Computer
& Organization Trends

Research Article | Open Access | Download PDF

Volume 1 | Issue 2 | Year 2011 | Article Id. IJCOT-V1I2P301 | DOI : https://doi.org/10.14445/22492593/IJCOT-V1I2P301

A New Steganography Technique Based on Layers of Image and Sensitivity Vectors A cquiring HVS


Jagvinder Kaur

Citation :

Jagvinder Kaur, "A New Steganography Technique Based on Layers of Image and Sensitivity Vectors A cquiring HVS," International Journal of Computer & Organization Trends (IJCOT), vol. 1, no. 2, pp. 1-6, 2011. Crossref, https://doi.org/10.14445/22492593/IJCOT-V1I2P301

Abstract

Steganography is the art and science of hiding the existence of information . To provide an imperceptible stego - image quality and to improve the capacity of the hidden secret data, a steganography techn ique based on layers of i mage and sensitivity v ectors is proposed in this paper . In this technique , firstly the whole host image is divided into 8x8 blocks and each block is further sub - divided into the 8x8 sub block which is formed by t he binary representation of pixel values of the image. The SVBA algorithm then analyzes the mean value of gray block by block, and sets a sensitivity vector for each block with considering HVS features. It adjusts the embedding of secret message for steganography schema dynamically according to the block sensitivity vectors. The s imulation experiment results on Matlab7.10 show this algorithm has a balanced performance on efficiency, capacity, imperceptibility and robustness.

Keywords

Steganography, Peak Signal - to - Noise Rate (PSNR), Mean Square Error (MSE), Manhattan distance (M dist); HVS features; Block sensitivity vector .

References

1] Juan Jose Roque, Jesus Maria Minguet, “ SLSB: Improving the Steganographic Algorithm LSB ”.
[2] Simmons. The prisoners’ problem and the subliminal channel proceedings of cryptology’ 83. Plenum Press, 1984, pp.51 – 67.
[3] B.M.Macq, Jean Jacques Quisquater. Cryptology for digital T V broadcasting. Proceedings of the IEEE. June 1995, 83(6), pp.944 – 957
[4] Omer Kurtuldu, Nafiz Arica, “ A New Steganography Method Using Image Layers”, IEEE, 2008
[5] Yi - zhen Chen, Zhi Han, Shu - ping Li, Chun - hui Lu and Xiao - Hui Yao, “An Adaptive Steganography Algo rithm Based On Block Sensitivity Vectors Using HVS Features”, CISP, IEEE, 2010
[6] http://www.mathworks.com
[7] J.Fridrich, M.Goljan, R.Du. Detecting lsb steganography in color and gray - scale images. IEEE Multimedia, 8(4), pp.22 – 28, 2001
[8] M.A.Khan, V.Potdar, E.Chang, “An Architecture Platform for Grey Level Modification Steganography”, Industrial Electronics Society, 2004. IECON’04. 30 th Annual Conf. of IEEE, Vol. 1, pp. 463 - 471
[9]T.Morkel,J.H.P.Eloff,M.S.Olivier,“An Overview Of Image Steganography”http://mo.co.za/open/stegoverview.pdf.pp.2.5
[10] Jiwu Huang, YunQ Shi, Ruohe Yao. Adaptive Image Watermarking Based on Block Classification [J]. Journal of I mage and Graph ics.1999,4(8), pp. 640 – 643.
[11] Rafael C. Gonzalez, Richard E. Woods and Ste ven L. Eddins, “Digital Image Processing Using Matlab” Prentics Hall, 2003
[12] Anil K Jain , “Fundamentals of Digital Image Processing”, University of California - Davis , Prentice Hall,1988
[13] Eric Cole ,"Hiding in Plain Sight: Steganography and the Art of Covert Communication" [14] Johnson, N.F. & Jajodia, S., “Exploring Steganography: Seeing the Unseen”, Computer Journal , February 1998
[15] Lee, Y.K. & Chen, L.H., “High capacity image steganographic model”, Visual Image Signal Processing , 147:03, June 2000
[16] N.F. Jo hnson, S. Jajodia, “Steganalysis: The Investigation of Hiding Information”, IEEE , 1998