A Novel Steganographic Method for Gray-Level Images
In this work we propose a novel Steganographic
method for hiding information within the spatial domain of the gray
scale image. The proposed approach works by dividing the cover into
blocks of equal sizes and then embeds the message in the edge of the
block depending on the number of ones in left four bits of the pixel.
The proposed approach is tested on a database consists of 100
different images. Experimental results, compared with other
methods, showed that the proposed approach hide more large
information and gave a good visual quality stego-image that can be
seen by human eyes.
[1] Pfitzmann, B, Information Hiding Terminology, Proceedings of the
First International Workshop on Information Hiding, Lecture Notes in
Computer Science, Springer-Verlag, Berlin, 1996, 174 (1), 347-356.
[2] Johnson, N., and Jajodia, S., Exploring Steganography: seeing the
unseen, IEEE Computer, 1998, 58(8), 26-34.
[3] Katzenbeisser, S., and Petitcolas, F., Information Hiding Techniques for
Steganography and Digital Watermarking, Boston: Artech
House.London, 2000.
[4] H. Noda, J. Spaulding, M. N. Shirazi, and E. Kawaguchi, Application
of bit-plane decomposition steganography to JPEG2000 encoded
images, IEEE Signal Processing Letters, 9(12), 410-413, Dec. 2002.
[5] D. C. Wu and W. H. Tsai, A steganographic method for images by
pixel-value differencing, Pattern Recognition Letters, 24(9-10),
pp.1613-1626, 2003.
[6] Xinpeng Zhang and Shuozhong Wang, Steganography Using Multiple-
Base Notational System and Human Vision Sensitivity, IEEE Signal
Processing Letters, 12(1), JANUARY 2005, 67.
[7] Ross, J., Fabien, A., on the limits of Steganography, IEEE Journal,
16(4): 474-481, 1998.
[8] S. Walton, "image authentication for a slippery new age," Dr. Dobb's
Journal, vol. 20, no. 4, pp. 18 26, 1995.
[9] Na-I, W. A, Study On Data Hiding For Gray-Level And Binary Images,
MSc Thesis, Graduate Institute of Networking and Computation
Engineering, Chaoyang University of Technology, Taiwan, May 2004.
[10] S Craver, On Public-key Steganography in the Presence of an Active
Warden, IBM Research Report RC 20931, 1997.
[11] E. Franz, A. Jerichow, S. Moller, A. Pftizmann, and I. Stierland,
Computer Based Steganography in Information Hiding, Lecture Notes
in Computer Science, Springer, 1996, Vol. 1174, 7-21.
[12] Alwan R. H., Kadhim F. J., and Al-Taani A. T., Data Embedding
Based on Better Use of Bits in Image Pixels. International Journal of
Signal Processing, 2 (1), 104-107, 2005.
[13] Potdar, V., and Chang, E., Gray Level Modification Steganography for
Secret Communication. IEEE International Conference on Industrial
Informatics, Berlin, Germany, 2004.
[1] Pfitzmann, B, Information Hiding Terminology, Proceedings of the
First International Workshop on Information Hiding, Lecture Notes in
Computer Science, Springer-Verlag, Berlin, 1996, 174 (1), 347-356.
[2] Johnson, N., and Jajodia, S., Exploring Steganography: seeing the
unseen, IEEE Computer, 1998, 58(8), 26-34.
[3] Katzenbeisser, S., and Petitcolas, F., Information Hiding Techniques for
Steganography and Digital Watermarking, Boston: Artech
House.London, 2000.
[4] H. Noda, J. Spaulding, M. N. Shirazi, and E. Kawaguchi, Application
of bit-plane decomposition steganography to JPEG2000 encoded
images, IEEE Signal Processing Letters, 9(12), 410-413, Dec. 2002.
[5] D. C. Wu and W. H. Tsai, A steganographic method for images by
pixel-value differencing, Pattern Recognition Letters, 24(9-10),
pp.1613-1626, 2003.
[6] Xinpeng Zhang and Shuozhong Wang, Steganography Using Multiple-
Base Notational System and Human Vision Sensitivity, IEEE Signal
Processing Letters, 12(1), JANUARY 2005, 67.
[7] Ross, J., Fabien, A., on the limits of Steganography, IEEE Journal,
16(4): 474-481, 1998.
[8] S. Walton, "image authentication for a slippery new age," Dr. Dobb's
Journal, vol. 20, no. 4, pp. 18 26, 1995.
[9] Na-I, W. A, Study On Data Hiding For Gray-Level And Binary Images,
MSc Thesis, Graduate Institute of Networking and Computation
Engineering, Chaoyang University of Technology, Taiwan, May 2004.
[10] S Craver, On Public-key Steganography in the Presence of an Active
Warden, IBM Research Report RC 20931, 1997.
[11] E. Franz, A. Jerichow, S. Moller, A. Pftizmann, and I. Stierland,
Computer Based Steganography in Information Hiding, Lecture Notes
in Computer Science, Springer, 1996, Vol. 1174, 7-21.
[12] Alwan R. H., Kadhim F. J., and Al-Taani A. T., Data Embedding
Based on Better Use of Bits in Image Pixels. International Journal of
Signal Processing, 2 (1), 104-107, 2005.
[13] Potdar, V., and Chang, E., Gray Level Modification Steganography for
Secret Communication. IEEE International Conference on Industrial
Informatics, Berlin, Germany, 2004.
@article{"International Journal of Information, Control and Computer Sciences:62702", author = "Ahmad T. Al-Taani and Abdullah M. AL-Issa", title = "A Novel Steganographic Method for Gray-Level Images", abstract = "In this work we propose a novel Steganographic
method for hiding information within the spatial domain of the gray
scale image. The proposed approach works by dividing the cover into
blocks of equal sizes and then embeds the message in the edge of the
block depending on the number of ones in left four bits of the pixel.
The proposed approach is tested on a database consists of 100
different images. Experimental results, compared with other
methods, showed that the proposed approach hide more large
information and gave a good visual quality stego-image that can be
seen by human eyes.", keywords = "Data Embedding, Cryptography, Watermarking,
Steganography, Least Significant Bit, Information Hiding.", volume = "3", number = "3", pages = "802-6", }