International Journal of Innovative Technology and Exploring Engineering (IJITEE)
ISSN: 2278-3075, Volume-8 Issue-12, October 2019
1800
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication
Retrieval Number: L28391081219/2019©BEIESP
DOI: 10.35940/ijitee.L2839.1081219
High Capacity Image Steganography using Pixel
Value Differencing Method with Data Compression
using Neural Network
Jayeeta Majumder, Chittaranjan Pradhan
Abstract: The Digital Market Is Rapidly Growing Day By Day.
So, Data Hiding Is Going To Increase Its Importance.
Information Can Be Hidden In Different Embedding Mediums,
Known As Carriers By Using Steganography Techniques. The
Carriers Are Different Multimedia Medium Such As Images,
Audio Files, Video Files, And Text Files .There Are Several
Techniques Present To Achieve Data Hiding Like Least
Significant Bit Insertion Method And Transform Domain
Technique. The Data Hidden Capacity Inside The Cover Image
Totally Depends On The Properties Of The Image Like Number
Of Noisy Pixels. Data Compression Provides To Hide Large
Amount Of Secret Data To Increase The Capacity And The
Image Steganography Based On Any Neural Network Provides
That The Size And Quality Of The Stego-Image Remains
Unaltered After Data Embedding. In This Paper We Propose A
New Method Combined With Data Compression Along With
Data Embedding Technique And After Embedding To Maintain
The Quality The Communication Channel Use The Neural
Network. The Compression Technique Increase The Data Hiding
Capacity And The Use Of Neural Network Maintain The Flow Of
Data Processing Signal
Keywords: Image steganography, Data Compression, Arithmetic
coding, Pixel value differencing, Neural Network
I. INTRODUCTION
Communication using Internet is increasing rapidly in
modern days. To secure our confidential data during data
transmission through a public channel is a major issue in all
aspect. The confidential data needs security from an
unauthorized access. In digital communication secure data
transfer session is very much essential. The performance of
network is the major issue for secure data transmission. To
maintain confidentiality and integrity of data is required for
data transmission. Cryptography gives us some popular
techniques [1] to protect the data from eavesdroppers and
also secured communication over the channel.
Steganography techniques [2] also protect the data along
with no alteration.
Revised Manuscript Received on October 05, 2019.
Jayeeta Majumder, Computer Science & Engineering, Haldia Institute
of Technology, Haldia, West Bengal, Email:
jem2003_kolkata@yahoo.co.in
Chittaranjan Pradhan, Computer Science & Engineering, KIIT
University, Bhubaneswar, Odissa,
In Steganography, the cover image is any one of the
multimedia data like image, audio, video where the original
secret message are embedded. After embedding of data into
the cover media is known as the stego data. The human eye
cannot distinguish the original cover data with stego data. In
steganographic technique the unauthorized receiver cannot
identify the secret data which are being transferred through
the public channel. Various application like military
communication, Internet of Things and multimedia [3-5]
where steganography based security system is applied. In
literature survey we find several numbers of combined
cryptography and steganography schemes [5-6]. In the field
of information security, both cryptography and
steganography techniques are used. In general, image data
taken as the cover media in different application.
II. RELATED WORK
Through literature survey, we found a number of image
based steganographic schemes. The LSB (east Significant
Bit) is the widely used methods for high data hiding
capacity. The basic LSB method only consider three LSB
bits replacements. In this method, after replacement the
stego- image is visually good and also increase embedding
capacity. By using optimal pixel adjustment process the
visual quality can be improved.
In Yang [5] scheme, cover pixel are not directly modified.
The secret message bits are toggled and the new toggled
patterns are recorded for extracting the secret message.
Later Chen [7] proposed a modified scheme, where
modulus function is used with LSB substitution which
improves the visual quality for the stego-image. To
minimize the distortion in the stego-image the repetition of
the secret message is considered.
Then, Xu, et al. [6] proposed a steganographic scheme with
fixed payload. Some researchers [7-9] designed edge-based
steganographic schemes.
In paper [10], the authors classified the pixels into two
categories, Edge-pixels and non-edge pixels and apply Data
embedding concept.
Islam et.al [11] proposes a method which increase the high
visual quality of the stego-image. The process enhances the
security level.
Wu & Tsai [12] introduces Pixel Value Differencing [PVD]
method.