International Journal of Image, Graphics and Signal Processing(IJIGSP)

ISSN: 2074-9074 (Print), ISSN: 2074-9082 (Online)

Published By: MECS Press

IJIGSP Vol.7, No.5, Apr. 2015

A High Capacity Secured Image Steganography Method with Five Pixel Pair Differencing and LSB Substitution

Full Text (PDF, 456KB), PP.66-74

Views:26   Downloads:2


Avinash K. Gulve, Madhuri S. Joshi

Index Terms

Information security;LSB substitution;Pixel value differencing;PSNR


Most of the steganography techniques, based on pixel value difference, use the difference between the pixel values to hide the information. In this paper, an algorithm is proposed which combines the LSB and PVD steganography techniques to provide high data hiding capacity with acceptable stego image quality. Instead of using the original difference to hide the information, the difference is revised before it is used for hiding the information. This introduces an additional layer of security for the secret information. The algorithm divides the cover image in the blocks of 2x3 pixels. One of the pixels in the block is used as common pixel, which forms five pixel pairs with remaining five pixels in the block. The algorithm hides three secret bits in the common pixel using the LSB substitution method and then use the PVD based approach to hide data in five pixel pairs in each block. The algorithm determines the average (N) of the number of bits that can be hidden in the block. If the difference value allows M-bits to be hidden in the pair, then bits ≤ N are hidden in that pair. The result shows that the algorithm provides higher hiding capacity with better PSNR values as compared to other methods investigated in this study.

Cite This Paper

Avinash K. Gulve, Madhuri S. Joshi,"A High Capacity Secured Image Steganography Method with Five Pixel Pair Differencing and LSB Substitution", IJIGSP, vol.7, no.5, pp. 66-74, 2015.DOI: 10.5815/ijigsp.2015.05.08


[1]D.C Wu and W.H. Tsai, "A Steganographic Method for Images by Pixel-Value Differencing", Pattern Recognition Letters, Vol. 24, pp. 1613–1626, 2003.

[2]Zaker, Hamzeh, Katebi and Samavi,"Improving Security of Pixel Value Differencing Steganographic Method" , 3rd IEEE International conference on New Technologies, Mobility and Security (NTMS), pp. 1-4 , Cairo, 2009.

[3]H.C. Wu, N.I. Wu, C.S. Tsai and M.S. Hwang, "Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods", IEE Proceedings on Vision, Image and Signal Processing, Vol. 152, No. 5, pp. 611-615, 2005.

[4]Ko-Chin Chang, Huang, Tu and Chien-Ping Chang, "Adaptive Image Steganographic Scheme Based on Tri-way Pixel-Value Differencing", IEEE International conference on Systems, Man and Cybernetics, pp. 1165-1170, Montreal, 2007.

[5]Ko-Chin Chang, Chien-Ping Chang and Huang Tu,"A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing", Journal Of Multimedia, Vol. 3, No. 2, pp. 37-44, 2008.

[6]Asmari and Ghamdi,"High Capacity Data Hiding Using Semi-Hexagonal Pixels Value Difference ", International Conference on High Performance Computing, Networking and Communication Systems (HPCNCS-09), pp. 14-17, Orlando, Florida, USA, 2009.

[7]J. K. Mandal and Debashis Das, "Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Through Exclusion of Overflow/Underflow", Second International Conference on Computer Science, Engineering and Applications (CCSEA-2012), pp. 93-102, Delhi, 2012.

[8]Xin Liao, Qiao-yan Wen and Jie Zhang,"A Steganographic Method for Digital Images with Four-Pixel Differencing and Modified LSB Substitution", Journal of Visual Communication and Image Representation, Volume 22, Issue 1, pp.1-8, 2011.

[9]M. Khodaei1 and K. Faez, "New Adaptive Steganographic Method using Least Significant Bit Substitution and Pixel-Value Differencing", IET Image Process., Vol. 6, Iss. 6, pp. 677–686, 2012.

[10]Gulve A.K.and Joshi M.S.," An Image Steganography Algorithm with Five Pixel Pair Differencing and Grey Code Conversion", International Journal of Image, Graphics and Signal Processing, Vol-6, No-3, PP. 12-20, 2014.

[11]Xinpeng Zhang and Shuozhong Wang, "Efficient Data Hiding with Histogram-Preserving Property", Telecommunication Systems, Volume 49- 2, p.p.179-185, 2012.

[12]J. Fridrich, M. Goljan, and R. Du, "Detecting LSB Steganography in Color, and Gray-Scale Images", IEEE Multimedia Magazine, vol. 8, no. 4, pp. 22–28, 2001.

[13]Z. Wang, A. C. Bovik, H.R. Sheikh and E.P. Simoncelli, "Image Quality Assessment: From Error Visibility to Structural Similarity", IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600-612, 2004.

[14]N.I. Wu and C.S. Hwang, "Data Hiding: Current Status and Key Issues", International Journal of Network Security, vol. 4, no. 1, pp. 1-9, 2007.

[15]Z. Wang and A.C. Bovik," Universal Image Quality Index", IEEE SP letters, vol. 9, pp. 81-84, 2002 .

[16]Seyyed A Seyyedi and Nick Ivanov,"Statistical Image Classification for Image Steganographic Techniques", International Journal of Image, Graphics and Signal Processing, Vol. 6, No. 8, pp. 19-24, 2014.