A Novel Steganographic Method for Gray-Level Images

In this work we propose a novel Steganographic method for hiding information within the spatial domain of the gray scale image. The proposed approach works by dividing the cover into blocks of equal sizes and then embeds the message in the edge of the block depending on the number of ones in left four bits of the pixel. The proposed approach is tested on a database consists of 100 different images. Experimental results, compared with other methods, showed that the proposed approach hide more large information and gave a good visual quality stego-image that can be seen by human eyes.




References:
[1] Pfitzmann, B, Information Hiding Terminology, Proceedings of the
First International Workshop on Information Hiding, Lecture Notes in
Computer Science, Springer-Verlag, Berlin, 1996, 174 (1), 347-356.
[2] Johnson, N., and Jajodia, S., Exploring Steganography: seeing the
unseen, IEEE Computer, 1998, 58(8), 26-34.
[3] Katzenbeisser, S., and Petitcolas, F., Information Hiding Techniques for
Steganography and Digital Watermarking, Boston: Artech
House.London, 2000.
[4] H. Noda, J. Spaulding, M. N. Shirazi, and E. Kawaguchi, Application
of bit-plane decomposition steganography to JPEG2000 encoded
images, IEEE Signal Processing Letters, 9(12), 410-413, Dec. 2002.
[5] D. C. Wu and W. H. Tsai, A steganographic method for images by
pixel-value differencing, Pattern Recognition Letters, 24(9-10),
pp.1613-1626, 2003.
[6] Xinpeng Zhang and Shuozhong Wang, Steganography Using Multiple-
Base Notational System and Human Vision Sensitivity, IEEE Signal
Processing Letters, 12(1), JANUARY 2005, 67.
[7] Ross, J., Fabien, A., on the limits of Steganography, IEEE Journal,
16(4): 474-481, 1998.
[8] S. Walton, "image authentication for a slippery new age," Dr. Dobb's
Journal, vol. 20, no. 4, pp. 18 26, 1995.
[9] Na-I, W. A, Study On Data Hiding For Gray-Level And Binary Images,
MSc Thesis, Graduate Institute of Networking and Computation
Engineering, Chaoyang University of Technology, Taiwan, May 2004.
[10] S Craver, On Public-key Steganography in the Presence of an Active
Warden, IBM Research Report RC 20931, 1997.
[11] E. Franz, A. Jerichow, S. Moller, A. Pftizmann, and I. Stierland,
Computer Based Steganography in Information Hiding, Lecture Notes
in Computer Science, Springer, 1996, Vol. 1174, 7-21.
[12] Alwan R. H., Kadhim F. J., and Al-Taani A. T., Data Embedding
Based on Better Use of Bits in Image Pixels. International Journal of
Signal Processing, 2 (1), 104-107, 2005.
[13] Potdar, V., and Chang, E., Gray Level Modification Steganography for
Secret Communication. IEEE International Conference on Industrial
Informatics, Berlin, Germany, 2004.