An Image Steganography Algorithm with Five Pixel Pair Differencing and Gray Code Conversion

Full Text (PDF, 531KB), PP.12-20

Views: 0 Downloads: 0


Gulve Avinash K 1,* Joshi Madhuri S 2

1. MCA Government College of Engineering, Aurangabad, Maharashtra, India. 431 005

2. Computer Technology Jawaharlal Nehru Engineering College, Aurangabad, Maharashtra, India. 431 005

* Corresponding author.


Received: 4 Nov. 2013 / Revised: 30 Nov. 2013 / Accepted: 7 Jan. 2014 / Published: 8 Feb. 2014

Index Terms

Data hiding, Steganography, Average, Gray code, Pixel value difference (PVD), PSNR


Steganography involves hiding information in another media. PVD based steganography techniques uses the difference between the pixel values of a pair directly to hide the information. The proposed steganography system modifies the difference value before being used for hiding the information. This makes extraction of hidden data harder in case the steganography system fails. The algorithm divides the cover image in the block of 2 x 3 pixels and calculates average (N) of the bits that can be hidden in five pairs of that block. Thus if the difference value allows M-bits to be hidden in the pair, then only N-bits are hidden in that pair when M >N otherwise M (if M≤N) bits are hidden in that pair. Second level of security is added by converting the secret information into gray code before embedding it in the cover image. The algorithm provides good hiding capacity and improved quality of stego image with two levels of security for the secret information.

Cite This Paper

Gulve Avinash K, Joshi Madhuri S,"An Image Steganography Algorithm with Five Pixel Pair Differencing and Gray Code Conversion", IJIGSP, vol.6, no.3, pp.12-20, 2014. DOI: 10.5815/ijigsp.2014.03.02


[1]W Bender, D Gruhl, N Morimoto, A Lu. Techniques for data hiding. IBM Systems Journal, 1996, 35 (3–4), 313–336.

[2]Bhattacharyya, Das, Bandyopadhyay, and Kim. Text Steganography: A Novel Approach. International Journal of Advanced Science and Technology, 2009, 3, 79-86.

[3]Sutaone, Khandare. Image based steganography using LSB insertion technique. IET international conference on Wireless, Mobile and Multimedia Networks. 2008, 146-151.

[4]Tiwari, Shandilya. Evaluation of Various LSB based Methods of Image Steganography on GIF File Format. International Journal of Computer Applications, 2010, 6(2), 1-4.

[5]Lee, Chen. High Capacity Image Steganographic Model. IEE proceeings, Vision, Image Signal Processing, 2000, 147(3), 288-294.

[6]D C Wu, Wen-Hsiang Tsai. A steganographic method for images by pixel-value differencing. Pattern Recognition Letters, 2003, 24, 1613–1626. 

[7]Nazanin Zaker, Ali Hamzeh, Seraj Dean Katebi, Shadrokh Samavi. Improving Security of Pixel Value Differencing Steganographic Method. IEEE international conference on New Technologies, Mobilty and Security (NTMS), Cairo, December 20-23, 2009, 1-4.

[8]H C Wu, N I Wu, Tsai, Hwang. Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proceedings on Vision, Image and Signal Processing, 2005, 152(5), 611-615.

[9]Ko Chin Chang, Ping S Huang, T M Tu, Chien Ping Chang. Image Steganographic Scheme Using Tri-way Pixel-Value Differencing and Adaptive Rules. IEEE international conference on Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, Taiwan, December 26-28, 2007, 449-452.

[10]Ko Chin Chang, Chien Ping Chang, Huang, Tu. A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing. Journal of Multimedia, 2008, 3(2), 37-44.

[11]Asmari, Ghamdi. High Capacity Data Hiding Using Semi-Hexagonal Pixels Value Difference. International Conference on High Performance Computing, Networking and Communication Systems (HPCNCS-09), Orlando, Florida, USA, 2009, 14-17.

[12]V S Phad, R S Bhosale, A R Panhalkar. A Novel Security Scheme for Secret Data using Cryptography and Steganography. International Journal of Computer Network and Information Security, 2012, 2, 36-42.

[13]Khalil Challita, Hikmat Farhat. Combining Steganography and Cryptography: New Directions. International Journal on New Computer Architectures and Their Applications (IJNCAA), 2011, 1, 199-208.

[14]Dipti Kapoor Sarmah, Neha Bajpai. Proposed System for Data Hiding Using Cryptography and Steganography. International Journal of Computer Applications, 2010, 8(9), 7-10.

[15]Xin peng Zhang, Shuozhong Wang. Efficient data hiding with histogram-preserving property. Telecommunication Systems, 2012, 49(2), 179-185.

[16]J Fridrich, M Goljan, R Du. Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia Magazine, 2001, 8(4), 22–28.

[17]Wang, Bovik, Sheikh, Simoncelli. Image quality assessment: From error visibility to structural similarity. IEEE Transactios on Image Processing, 2004, 13(4), 600-612.

[18]Wu, Hwang. Data Hiding: Current Status and Key Issues. International Journal of Network Security, 2007, 4(1), 1-9.

[19]Z Wang, A C Bovik. Universal Image Quality Index. IEEE Signal Processing letters, 2002, 9(3), 81-84.