Abstract
The main concern is security for everyone in today’s world. Data are embedded in digital media for hiding. Cryptography and steganography are mostly used for security of data. By seeing an image, one cannot come to know about hidden data inside. This process of hiding data in digital media for security is called image steganography. Many algorithms are available in spatial domain of image steganography for embedding data in cover image. Many criteria are there for evaluating security against detection of particular algorithm. Criteria are like capacity, quality, detection, etc. Pixel value differencing algorithm is well known for its payload capacity, detection and quality. Here different PVD methods and its comparisons are given.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Salunkhe, J., & Sirsikar, S. (2013). Pixel Value Differencing a Steganographic method : As survey. International Conference on Recent Trends Engineering Technology, ICRTET, 201, 1–6.
Sahu, A. K., & Swain, G. (2016). A review on LSB substitution and PVD based image steganography techniques. Indonesia Journal Electrical Engineering Computer Science, 2(3), 712–719. https://doi.org/10.11591/ijeecs.v2.i3.pp712-719.
Asok, A., Mohan, P. (2019). Implementation and comparison of different data hiding techniques in image steganography. In Proceedings of international conference on trends electronics informatics, ICOEI 2019. ICOEI, pp. 1180–1183. https://doi.org/10.1109/ICOEI.2019.8862750.
Hussain, M., Wahab, A. W. A., Bin Idris, Y. I., Ho, A. T. S., & Jung, K. H. (2018). Image steganography in spatial domain: A survey. Signal Processing Image Communications,65, 46–66. https://doi.org/10.1016/j.image.2018.03.012.
Jain, R., & Boaddh, J. (2016) Advances in digital image steganography. In 2016 1st int. conference on innovation challenges cyber security ICICCS 2016. ICICCS, pp. 163–171. https://doi.org/10.1109/ICICCS.2016.7542298.
Swain, G. (2016). A steganographic method combining LSB substitution and PVD in a block. Procedia Computer Science, 85, 39–44. https://doi.org/10.1016/j.procs.2016.05.174.
Sahu, A. K., & Sahu, M. (2016). Digital image steganography techniques in spatial domain: A study. International Journal Pharmacy Technology, 8(4), 5205–5217.
Swain, G. (2016). Adaptive pixel value differencing steganography using both vertical and horizontal edges. Multimedia Tools Application, 75(21), 13541–13556. https://doi.org/10.1007/s11042-015-2937-2.
Shen, S. Y., & Huang, L. H. (2015). A data hiding scheme using pixel value differencing and improving exploiting modification directions. Computers and Security, 48, 131–141. https://doi.org/10.1016/j.cose.2014.07.008.
Subhedar, M. S., & Mankar, V. H. (2014). Current status and key issues in image steganography: A survey. Computer Science Review, 13–14(C), 95–113. https://doi.org/10.1016/j.cosrev.2014.09.001.
Shen, S., Huang, L., & Tian, Q. (2014). A novel data hiding for color images based on pixel value difference and modulus function. Multimedia Tools Applications, 74(3), 707–728. https://doi.org/10.1007/s11042-014-2016-0.
Swain, G. (2014). Digital image steganography using nine-pixel differencing and modified LSB substitution. Indian Journal of Science Technology, 7(9), 1444–1450.
Swain, G., & Lenka, S. K. (2014). Classification of Image Steganography techniques in spatial domain: A Study. International Journal of Computer Science Engineering Technology, 5(03), 219–232.
Tseng, H. W., Leng, H. S.: A steganographic method based on pixel-value differencing and the perfect square number. Journal of Applied Mathematics. https://doi.org/10.1155/2013/189706.
Swain, G., & Lenka, S. K. (2013). Steganography using two sided, three sided, and four sided side match methods. CSI Transactions on ICT, 1(2), 127–133. https://doi.org/10.1007/s40012-013-0015-3.
Lee, Y. P., Lee, J. C., Chen, W. K., Chang, K. C., Su, I. J., & Chang, C. P. (2012). High-payload image hiding with quality recovery using tri-way pixel-value differencing. Information Science (Ny), 191, 214–225. https://doi.org/10.1016/j.ins.2012.01.002.
Mandal, J. K. (2012). Steganography using adaptive pixel value differencing (APVD) of gray images through exclusion of overflow/underflow, pp. 93–102. https://doi.org/10.5121/csit.2012.2211.
Mandal, J. (2012). Colour image steganography based on pixel value differencing in spatial domain. International Journal of Information Science Technology, 2(4), 83–93. https://doi.org/10.5121/ijist.2012.2408.
Pradhan, A. (2012). Variable rate steganography in digital images using two, three and four neighbor pixels, 3(3), 457–463.
Liao, X., Wen, Q. Y., & Zhang, J. (2011). A steganographic method for digital images with four-pixel differencing and modified LSB substitution. Journal of Visual Communication and Image Representation, 22(1), 1–8. https://doi.org/10.1016/j.jvcir.2010.08.007.
Voeller, J. G., Johnson, N. F., & Sallee, P. A. (2009). Detection of hidden information, covert channels and information flows. Wiley Handbook Science Technology for Homeland Security. https://doi.org/10.1002/9780470087923.hhs427.
Chan, C. K., & Cheng, L. M. (2004). Hiding data in images by simple LSB substitution. Pattern Recognition, 37(3), 469–474. https://doi.org/10.1016/j.patcog.2003.08.007.
Balasubramanian, C., Selvakumar, S., & Geetha, S. (2014). High payload image steganography with reduced distortion using octonary pixel pairing scheme. Multimedia Tools Applications, 73(3), 2223–2245. https://doi.org/10.1007/s11042-013-1640-4.
Carrasco-Ochoa, J. A., Martínez-Trinidad, J. F., Sossa-Azuela, J. H., Olvera López, J. A., & Famili, F. (2015). Pattern recognition: 7th Mexican conference, MCPR 2015 Mexico City, Mexico, June 24–27, 2015 proceedings. In Lecture notes computer science (including subseries lecture notes artificial intelligence lecture notes bioinformatics) (Vol. 9116, no. 3, pp. 74–83). https://doi.org/10.1007/978-3-319-19264-2.
Khodaei, M., Sadeghi Bigham, B., & Faez, K. (2016). Adaptive data hiding, using pixel-value-differencing and LSB substitution. Cybernetics Systems,47(8), 617–628. https://doi.org/10.1080/01969722.2016.1214459.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Krishna, V., Afsana, K., Kumbharana, C.K. (2021). Pixel Value Differencing of Image Steganography in Substitution Technique: A Survey. In: Singh, T.P., Tomar, R., Choudhury, T., Perumal, T., Mahdi, H.F. (eds) Data Driven Approach Towards Disruptive Technologies. Studies in Autonomic, Data-driven and Industrial Computing. Springer, Singapore. https://doi.org/10.1007/978-981-15-9873-9_2
Download citation
DOI: https://doi.org/10.1007/978-981-15-9873-9_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9872-2
Online ISBN: 978-981-15-9873-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)