Skip to main content

Pixel Value Differencing of Image Steganography in Substitution Technique: A Survey

  • Conference paper
  • First Online:
Data Driven Approach Towards Disruptive Technologies

Abstract

The main concern is security for everyone in today’s world. Data are embedded in digital media for hiding. Cryptography and steganography are mostly used for security of data. By seeing an image, one cannot come to know about hidden data inside. This process of hiding data in digital media for security is called image steganography. Many algorithms are available in spatial domain of image steganography for embedding data in cover image. Many criteria are there for evaluating security against detection of particular algorithm. Criteria are like capacity, quality, detection, etc. Pixel value differencing algorithm is well known for its payload capacity, detection and quality. Here different PVD methods and its comparisons are given.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Salunkhe, J., & Sirsikar, S. (2013). Pixel Value Differencing a Steganographic method : As survey. International Conference on Recent Trends Engineering Technology, ICRTET, 201, 1–6.

    Google Scholar 

  2. Sahu, A. K., & Swain, G. (2016). A review on LSB substitution and PVD based image steganography techniques. Indonesia Journal Electrical Engineering Computer Science, 2(3), 712–719. https://doi.org/10.11591/ijeecs.v2.i3.pp712-719.

    Article  Google Scholar 

  3. Asok, A., Mohan, P. (2019). Implementation and comparison of different data hiding techniques in image steganography. In Proceedings of international conference on trends electronics informatics, ICOEI 2019. ICOEI, pp. 1180–1183. https://doi.org/10.1109/ICOEI.2019.8862750.

  4. Hussain, M., Wahab, A. W. A., Bin Idris, Y. I., Ho, A. T. S., & Jung, K. H. (2018). Image steganography in spatial domain: A survey. Signal Processing Image Communications,65, 46–66. https://doi.org/10.1016/j.image.2018.03.012.

  5. Jain, R., & Boaddh, J. (2016) Advances in digital image steganography. In 2016 1st int. conference on innovation challenges cyber security ICICCS 2016. ICICCS, pp. 163–171. https://doi.org/10.1109/ICICCS.2016.7542298.

  6. Swain, G. (2016). A steganographic method combining LSB substitution and PVD in a block. Procedia Computer Science, 85, 39–44. https://doi.org/10.1016/j.procs.2016.05.174.

  7. Sahu, A. K., & Sahu, M. (2016). Digital image steganography techniques in spatial domain: A study. International Journal Pharmacy Technology, 8(4), 5205–5217.

    Google Scholar 

  8. Swain, G. (2016). Adaptive pixel value differencing steganography using both vertical and horizontal edges. Multimedia Tools Application, 75(21), 13541–13556. https://doi.org/10.1007/s11042-015-2937-2.

    Article  Google Scholar 

  9. Shen, S. Y., & Huang, L. H. (2015). A data hiding scheme using pixel value differencing and improving exploiting modification directions. Computers and Security, 48, 131–141. https://doi.org/10.1016/j.cose.2014.07.008.

    Article  Google Scholar 

  10. Subhedar, M. S., & Mankar, V. H. (2014). Current status and key issues in image steganography: A survey. Computer Science Review, 13–14(C), 95–113. https://doi.org/10.1016/j.cosrev.2014.09.001.

  11. Shen, S., Huang, L., & Tian, Q. (2014). A novel data hiding for color images based on pixel value difference and modulus function. Multimedia Tools Applications, 74(3), 707–728. https://doi.org/10.1007/s11042-014-2016-0.

    Article  Google Scholar 

  12. Swain, G. (2014). Digital image steganography using nine-pixel differencing and modified LSB substitution. Indian Journal of Science Technology, 7(9), 1444–1450.

    Article  Google Scholar 

  13. Swain, G., & Lenka, S. K. (2014). Classification of Image Steganography techniques in spatial domain: A Study. International Journal of Computer Science Engineering Technology, 5(03), 219–232.

    Google Scholar 

  14. Tseng, H. W., Leng, H. S.: A steganographic method based on pixel-value differencing and the perfect square number. Journal of Applied Mathematics. https://doi.org/10.1155/2013/189706.

  15. Swain, G., & Lenka, S. K. (2013). Steganography using two sided, three sided, and four sided side match methods. CSI Transactions on ICT, 1(2), 127–133. https://doi.org/10.1007/s40012-013-0015-3.

    Article  Google Scholar 

  16. Lee, Y. P., Lee, J. C., Chen, W. K., Chang, K. C., Su, I. J., & Chang, C. P. (2012). High-payload image hiding with quality recovery using tri-way pixel-value differencing. Information Science (Ny), 191, 214–225. https://doi.org/10.1016/j.ins.2012.01.002.

    Article  Google Scholar 

  17. Mandal, J. K. (2012). Steganography using adaptive pixel value differencing (APVD) of gray images through exclusion of overflow/underflow, pp. 93–102. https://doi.org/10.5121/csit.2012.2211.

  18. Mandal, J. (2012). Colour image steganography based on pixel value differencing in spatial domain. International Journal of Information Science Technology, 2(4), 83–93. https://doi.org/10.5121/ijist.2012.2408.

    Article  Google Scholar 

  19. Pradhan, A. (2012). Variable rate steganography in digital images using two, three and four neighbor pixels, 3(3), 457–463.

    Google Scholar 

  20. Liao, X., Wen, Q. Y., & Zhang, J. (2011). A steganographic method for digital images with four-pixel differencing and modified LSB substitution. Journal of Visual Communication and Image Representation, 22(1), 1–8. https://doi.org/10.1016/j.jvcir.2010.08.007.

    Article  Google Scholar 

  21. Voeller, J. G., Johnson, N. F., & Sallee, P. A. (2009). Detection of hidden information, covert channels and information flows. Wiley Handbook Science Technology for Homeland Security. https://doi.org/10.1002/9780470087923.hhs427.

    Article  Google Scholar 

  22. Chan, C. K., & Cheng, L. M. (2004). Hiding data in images by simple LSB substitution. Pattern Recognition, 37(3), 469–474. https://doi.org/10.1016/j.patcog.2003.08.007.

    Article  MATH  Google Scholar 

  23. Balasubramanian, C., Selvakumar, S., & Geetha, S. (2014). High payload image steganography with reduced distortion using octonary pixel pairing scheme. Multimedia Tools Applications, 73(3), 2223–2245. https://doi.org/10.1007/s11042-013-1640-4.

    Article  Google Scholar 

  24. Carrasco-Ochoa, J. A., Martínez-Trinidad, J. F., Sossa-Azuela, J. H., Olvera López, J. A., & Famili, F. (2015). Pattern recognition: 7th Mexican conference, MCPR 2015 Mexico City, Mexico, June 24–27, 2015 proceedings. In Lecture notes computer science (including subseries lecture notes artificial intelligence lecture notes bioinformatics) (Vol. 9116, no. 3, pp. 74–83). https://doi.org/10.1007/978-3-319-19264-2.

  25. Khodaei, M., Sadeghi Bigham, B., & Faez, K. (2016). Adaptive data hiding, using pixel-value-differencing and LSB substitution. Cybernetics Systems,47(8), 617–628. https://doi.org/10.1080/01969722.2016.1214459.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vaidya Krishna .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Krishna, V., Afsana, K., Kumbharana, C.K. (2021). Pixel Value Differencing of Image Steganography in Substitution Technique: A Survey. In: Singh, T.P., Tomar, R., Choudhury, T., Perumal, T., Mahdi, H.F. (eds) Data Driven Approach Towards Disruptive Technologies. Studies in Autonomic, Data-driven and Industrial Computing. Springer, Singapore. https://doi.org/10.1007/978-981-15-9873-9_2

Download citation

Publish with us

Policies and ethics