Research Article | Open Access | Download PDF
Volume 1 | Issue 2 | Year 2011 | Article Id. IJPTT-V1I2P411 | DOI : https://doi.org/10.14445/22492615/IJPTT-V1I2P411Analysis of Various Image Steganography Techniques Based Upon PSNR Metric
Rajkumar Yadav
Citation :
Rajkumar Yadav, "Analysis of Various Image Steganography Techniques Based Upon PSNR Metric," International Journal of P2P Network Trends and Technology (IJPTT), vol. 1, no. 2, pp. 30-33, 2011. Crossref, https://doi.org/10.14445/22492615/IJPTT-V1I2P411
Abstract
Every common person uses internet directly or
indirectly in some spheres of his life. They mainly use the internet for
information sharing. Also, information sharing has the primary importance in
the field of Military Services, Medical Services, Mobile Services, and
Investigation Agencies etc. The main hurdle in the path of information sharing
is the security of information. The information security can be achieved by
Cryptography and Steganography. But now days, Steganography is the most burnt
area. There are lot of research is going on steganography. In this paper, we
analyze various image steganography techniques by using peak signal to noise
ratio (PSNR) Metric. After analyzing the techniques, we found that 6th, 7th and
8th Bit Method provides highest PSNR values and LSB Method provides lowest PSNR
values.
Keywords
Steganography, Cryptography, LSB, GLM, Parity checker etc.
References
[1] Cox, Ingemar, Bloom, Jeffrey, Miller, Matthew, Digital Watermarking: Principles & Practice, 2001, Morgan Kauffman Publishers, ISBN 1-55860-714-5, ch. 1-2.
[2] Katzenbeisser, S., Petitcolas, F.A.P., Information hiding techniques for steganography and digital watermarking, Artech House Publishers, 2000.
[3] Feng, J. B., Wu, H. C, Tsai, C. S. and Chu, Y. P., “A new multi-secret images sharing scheme using largrange‟s interpolation,” Journal of Systems and Software, vol. 76, no. 3, pp. 327–339, June 2005.
[4] Chang, C.C, Lin, I.C, “Remarks on fingerprint- based remote user authentication scheme using smart cards,” ACM Operating Systems Review, vol. 38, no. 3, pp. 91–100, Oct. 2004.
[5] Dugelay, J.L., Roche, S., “A survey of current watermarking techniques,” in Information Hiding Techniques for Steganography and Digital Watermarking, S. Katzenbeisser and F. A. P. Petitcolas, Eds. Norwood, MA: Artech House, 1999, ch. 6.
[6] Shoemaker, C., “Hidden bits: A survey of techniques for digital watermarking”, Independent study, EER 290, spring 2002.
[7] Wang, Y., Doherty, J.F., and Van Dyck, R.E., “A watermarking algorithm for fingerprinting Intelligence images”, Conference on Information Science and Systems, The John Hopkins University, March 21-23, 2001.
[8] S. Moller, A Pfitzmann, and I. Stirand, “Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, At Best.”, in Information Hiding: First International Workshop Proceedings, vol. 1174 of Lecture Notes in Computer Science, pp. 7-21, Springer, 1996.
[9] W. Bender, D. Gruhl, and N. Morimoto, “Techniques for Data Hiding”, Proceedings of the SPIE 2420, Storage and Retrieval for Image and Video Databases III, pp. 164-173, 1995.
[10] A. Hanjalic, G.C. Langelaar, P.M.B. van Roosmalen, J. Biemond, and R.L. Lagendijk, Image and Video Databases: Restoration, Watermarking, and Retrieval, Elsevier, 2000.
[11] G. Depovere, T. Kalker, J.-P. Linnartz, “Improved watermark detection using filtering before correlation”, Proceedings of the 5th IEEE Conference on Image Processing, pp. 430-434, 1998.
[12] J.J.K. O Ruanaidh, S. Pereira, “A secure robust digital image watermark”, Electronic Imaging: Processing, Printing, and Publishing in Colour, SPIE Proceedings, May 1998.
[13] Neil F Johnson, Sushil Jajodia, “Exploring Stenography: Seeing the Unseen”, IEEE Computer, Feb 1998, pp 26-34.
[14] Batra Sudhir, Rishi Rahul, Yadav Rajkumar, “Insertion of message in 6th, 7th & 8th bit of pixel values and retrieval in case intruder changes the least significant bit of image pixels”, International Journal of Security and its Applications, Vol . 4, No. 3, July 2010.
[15] Yadav, Rajkumar, Rishi, Rahul, Batra, Sudhir, “A new Steganography Method for Gray Level Images using Parity Checker”, International Journal of Computer Applications (0975-8887) Volume 11-No. 11, December 2010.
[16] Potdar, V., and Chang, E., Gray Level Modification Steganography for Secret Communication. IEEE International Conference on Industrial Informatics, Berlin, Germany, 2004.
[17] Chandramouli, R., Memon, N.D., “Steganography capacity: A steganalysis perspective”, Proc. SPIE Security and Watermarking of Multimedia Contents, Special Session on Steganalysis, 2003.
[18] Pal, S.K., Saxena, P.K., Muttoo, S.K., “Image steganography for wireless networks using the handmaid transform”, International Conference on Signal Processing & Communications (SPCOM), 2004.
[19] Parvez M. T. and Gutub A., “RGB Intensity Based VariableBits Image Steganography”, APSCC 2008-Proceedings of 3rd IEEE Asia-Pacific Services Computing Conference, Yilan, Taiwan, 9-12 December 2008.
[20] Eugene T. Lin and Edward J. Delp, “A Review of Data Hiding in Digital Images”, Video and Image Processing Laboratory (VIPER), Indiana.