Open Access
ARTICLE
Image Steganography by Pixel-Value Differencing Using General Quantization Ranges
Department of Computer and Communication Engineering, National Kaohsiung University of Science and Technology, Kaohsiung, 824005, Taiwan
* Corresponding Author: Da-Chun Wu. Email:
(This article belongs to the Special Issue: Information Security and Trust Issues in the Digital World)
Computer Modeling in Engineering & Sciences 2024, 141(1), 353-383. https://doi.org/10.32604/cmes.2024.050813
Received 19 February 2024; Accepted 02 July 2024; Issue published 20 August 2024
Abstract
A new steganographic method by pixel-value differencing (PVD) using general quantization ranges of pixel pairs’ difference values is proposed. The objective of this method is to provide a data embedding technique with a range table with range widths not limited to powers of 2, extending PVD-based methods to enhance their flexibility and data-embedding rates without changing their capabilities to resist security attacks. Specifically, the conventional PVD technique partitions a grayscale image into 1 × 2 non-overlapping blocks. The entire range [0, 255] of all possible absolute values of the pixel pairs’ grayscale differences in the blocks is divided into multiple quantization ranges. The width of each quantization range is a power of two to facilitate the direct embedding of the bit information with high embedding rates. Without using power-of-two range widths, the embedding rates can drop using conventional embedding techniques. In contrast, the proposed method uses general quantization range widths, and a multiple-based number conversion mechanism is employed skillfully to implement the use of non-power-of-two range widths, with each pixel pair being employed to embed a digit in the multiple-based number. All the message bits are converted into a big multiple-based number whose digits can be embedded into the pixel pairs with a higher embedding rate. Good experimental results showed the feasibility of the proposed method and its resistance to security attacks. In addition, implementation examples are provided, where the proposed method adopts non-power-of-two range widths and employs multiple-based number conversion to expand the data-hiding and steganalysis-resisting capabilities of other PVD methods.Keywords
The pixel-value differencing (PVD) method, proposed by Wu et al. [1], is well-known in the field of steganography [2–5] for embedding messages into the spatial domain of images. Images are partitioned by the method into non-overlapping two-pixel blocks, and human vision’s sensitivity to variations in gray values is employed to embed less bit information in smooth image blocks and more in edge blocks to maximize the data-hiding effect. The method usually yields a better image quality than the least-significant-bit (LSB) replacement method [6]. However, many methods have been proposed to improve Wu and Tsai’s original PVD method [1]. Some of these methods are surveyed in this study in a classified manner as follows:
(1) PVD involving the use of LSB replacement
Wu et al. [7] proposed a method that enhances the embedding capacity of secret messages by combining the PVD and LSB replacement methods. The LSB replacement technique is used in the smooth image area, while the PVD method is applied to the contrast area. Chang et al. [8] employed the concept of overlapping pixel-pair to produce more difference values from the cover image, which can improve the hiding capacity of the PVD method [1]. The secret bits are hidden in the second pixel of a pixel pair using LSB replacement. Khodaei et al. [9] partitioned the cover image into image blocks with three consecutive pixels. Two pixel-pairs are formed in each image block, overlapping at the central pixel in the block. Secret bits are embedded into the central pixel using LSB replacement, and the PVD technique is applied to the two pixel-pairs. Swain [10] extended the method proposed by Khodaei et al. [9] by modifying the PVD and LSB replacement techniques used in [9]. Shukla et al. [11] proposed a data-hiding method that incorporates a modified version of [9] and arithmetic coding to increase the embedding capacity. Hameed et al. [12] proposed a steganographic method for images in which the pixel pair on the dominant gradient in each 2 × 2 image block is used for data embedding by the PVD technique, and the other two pixels in the block are utilized for embedding message bits by the LSB replacement technique.
(2) Multi-directional PVD
The pixel value difference proposed by Wu et al. [1] originally is a single edge in a pixel pair. This concept was generalized afterward to the directional edges in larger blocks such as 1 × 3 blocks in [9,13], 2 × 2 blocks in [11,13–15], 2 × 3 blocks in [10,13,16], and 3 × 3 blocks in [10–11,13,16]. More specifically, the PVD method proposed by Khodaei et al. [9], mentioned previously, used the bi-directional edges in each 1 × 3 image block to embed secret data. Chang et al. [14] used the three directional edges in each 2 × 2 image block to design a tri-way PVD scheme to increase the hiding capacity. Sahu et al. [15] also used 2 × 2 blocks, each with two directional edges for data embedding, which are selected as horizontal, vertical, or diagonal. Also, the previously-mentioned Swain [10] and Shukla et al. [11] extended Khodaei et al. [9] to generate more directional edges and so increase the embedding capacity, with the former using 2 × 3 and 3 × 3 blocks and the latter using 3 × 3 and 2 × 2 ones. Recently, Wu et al. [13] partitioned a cover image into 1 × 3, 2 × 2, 2 × 3, or 3 × 3 blocks, which can be employed to embed message bits, regardless of whether they are complete or partial. Partial blocks are handled by assigning the missing pixels the values of the existing neighboring pixels. Sahu et al. [16] also utilized 3 × 3 blocks and exploited the use of all the edges in the horizontal, vertical, and diagonal directions by the multi-directional PVD technique.
(3) Staganalysis resistant PVD
It is well known that the RS (Regular and Singular) analysis proposed by Fridrich et al. [17] can be employed to attack many data-hiding methods, particularly those based on LSB replacement. However, Wu et al. [1] demonstrated that the original PVD method can resist the RS analysis. Subsequently-proposed PVD-based methods [9,11,13–14] have also shown experimentally their abilities to resist the RS analysis. However, Zhang et al. [18] detected the presence of secret data embedded by the PVD method [1] by finding obvious unusual steps in the shape of the pixel difference histogram (PDH). In order to eliminate this phenomenon, Zhang et al. [18] randomly adjusted the bounds of each range in the quantization range table for different blocks, preventing the creation of irregularities in the resulting PDH. In addition, as mentioned previously, the method proposed by Swain [10] combined the use of the PVD and LSB replacement techniques to give higher capacity, which can resist both the PDH and RS analyses. The resistance to the PDH and RS analyses was also demonstrated in Hameed et al. [12], Sahu et al. [15], and Sahu et al. [16]. The steganalysis-resisting capability found in the four methods of [10,12,15,16] is due to the utilization of the multi-directional edges in image blocks.
(4) PVD techniques solving the fall-off-boundary problem
The fall-off-boundary problem in the original PVD method [1] occurs when the new values of the stego-image pixels, which are computed from the pixel-value difference values, fall off the normal range of 0–255, as mentioned and solved by Wu et al. [1] utilizing a checking process to skip pixel pairs that can yield this problem to maintain the resulting image quality. Swain [10] solved the falling-off-boundary problem to obtain more data embedding space by providing two candidate values for each new pixel value in the stego-image and selecting the one causing less distortion without falling off the range boundary. Alternatively, Sahu et al. [19] solved the problem by shifting the values of the falling-off-boundary pixel pair into the normal range, where the shifting value was 2n, with n being the number of embeddable bits in the pixel pair. This solution was followed by Sahu et al. [15] mentioned above. Finally, Sahu et al. [16] and Sahu et al. [20] solved the problem similarly by simply shifting the falling-off-boundary pixel pair values to the closer boundary at 0 or 255.
Regarding the message data to be embedded into the cover image, three approaches have been taken to deal with the form of the message data before they are embedded: data encryption, data encoding, and data transformation. These approaches are detailed with examples of existing methods introduced in the following, emphasizing the third approach, which is the primary concern in this study.
(1) Encryption of the message data
It is common for a message to be encrypted before being embedded into the cover image to enhance the security of the embedded message. Examples of PVD-based methods that took this approach include Roselinkiruba et al. [21], Shukla et al. [11], Phad et al. [22], and others.
(2) Encoding of the message data
Encoding the message data is also a feasible approach to increase the security of the messages after they are embedded. Examples adopting this approach include Filler et al. [23] and Li et al. [24]. Specifically, the method [23] deals with the message data using syndrome-trellis coding (STC) based on convolution codes before data embedding. The method can minimize additive distortion for a given payload, enable the transmission of the largest payloads for a given embedding distortion rate, and enhance security by minimizing statistical detectability. Li et al. [24] proposed a near-optimal steganographic coding method based on steganographic polar codes (SPC) to minimize arbitrary additive distortion with low embedding complexity, which outperforms traditional STC methods. The method by Shukla et al. [11] also belongs to this class.
(3) Transformation of message data
Message data forms can be changed before being embedded to enhance the flexibility of data usage or/and the rate of data embedding. Wu et al. [25] proposed a multiple-based number system that converts the bitstream of a secret message into a set of digits in a multiple-based number and embeds the digits in a group of pixels. Wu et al. [26] also combined the multiple-based number conversion mechanism proposed in [25] with a human visual model to imperceptibly embed secret messages in the central pixels of 3 × 3 image blocks. Zhang et al. [27] proposed a scheme that uses a multiple-based notational system and employs human vision sensitivity, where the amount of information that can be embedded in a pixel is determined by the degree of local gray-value variation of the pixel. Geetha et al. [28] proposed an adaptive steganographic scheme for embedding messages in pixels; the scheme utilizes a varying radix numeral system and the variance of the eight pixels surrounding the data-embedded pixel. Tang et al. [29] proposed a hiding method for improving that was proposed by [28], achieving enhanced image quality and embedding capacity performance. Chen et al. [30] proposed a general multiple-based data embedding scheme in which an optimal base vector is adopted for embedding secret messages in images with minimal distortion. Wu et al. [13] combined the concepts of general quantization ranges and multiple-based number conversion [31], which is the basic idea of the proposed method in this study, with a modified multiway PVD mechanism to improve the data embedding rates yielded by [9,10].
Recently, more steganographic techniques were proposed, with some novel and worth mentioning in this study, as described in the following:
With the advancement of deep learning, the convolutional neural network (CNN) can be used to enhance steganalysis or misleading steganalyzers. Boroumand et al. [4] proposed a deep residual network architecture called SRNet (Steganalysis Residual Network) for steganalysis of digital images, which can minimize the use of externally enforced constraints or heuristics and provide detection accuracy for both spatial-domain and JPEG (Joint Photographic Experts Group) steganography with very low false-alarm rates. Ma et al. [32] proposed a method based on the use of multiple adversarial networks and channel attention modules, which yields high-quality adversarial images with an anti-steganalysis capability to enhance steganography security, i.e., the method can be employed to create images that mislead steganalyzers.
Furthermore, Sahu et al. [33] proposed a data-hiding method based on a modified LSB matching scheme and uses multiple stego-images to increase data embedding rates. Each pixel in a cover image generates four new ones for data embedding, resulting in four distinct stego-images with reasonable PSNRs. The method was shown to resist RS attacks.
In the method proposed in this study, quantization ranges with non-power-of-two widths are employed to derive the base value for use in the multiple-based number conversion procedure. This concept of using non-power-of-two range widths in the quantization table was also adopted by Tseng et al. [34], but some range widths used by them are still limited to power-of-two. Specifically, their method divides non-power-of-two ranges into subranges for embedding more secret bits, but with specific subrange widths being power-of-two. This phenomenon is owing to their use of a perfect-square number to design the quantization range table. In addition, the non-power-of-two range widths they used were not utilized to derive the base value as in the proposed method of this study. In contrast, the proposed method is applicable for selecting arbitrarily more general non-power-of-two range tables for more flexible applications, showing the novelty of the proposed method.
The novelties of the proposed method in the aspect of determining the bases for converting binary numbers into multiple-based numbers, which differ from those in the references, are elaboratively explained in the following discussions:
1. In Wu et al. [25], the method is used as the base for “the difference between the gray values of a pair of corresponding pixels in two images.”
2. In Wu et al. [26], the method is used as the base, “the range of the gray value changes at the central pixel of an image block, each of which does not alter the contrast of the block.”
3. In Zhang et al. [27], the method is used as the base for “the degree of local variation computed based on the gray values of a pixel’s three neighbors.”
4. In Geetha et al. [28] and Tanga et al. [29], the methods are used as the base for “the variance of the gray values of the eight neighboring pixels around a pixel.”
5. In Chen et al. [30], the method uses the bases in the “optimal base vector” selected for every set of pixels in the sense of minimizing the resulting image distortion.
6. In Wu [31], the basic concept of the proposed method is roughly applied, as seen in the Acknowledgments section, to check the detailed differences from what has been done in this study.
Note also that the proposed method in this study uses as the base “the width of the quantization range to which a pixel pair’s difference value belongs,” which is different from those mentioned above.
Finally, as a brief introduction to the original PVD method proposed by Wu et al. [1], given a grayscale image, it is partitioned by the method into 1 × 2 non-overlapping blocks, with each containing a pair of neighboring pixels. A difference value is computed from the grayscale values of the two pixels. All possible absolute difference values in the block are in the range of [0, 255], divided into multiple quantization ranges in advance.
Also, a new PVD method is proposed in this study, which uses non-power-of-two quantization range widths to yield a higher embedding rate than those yielded by conventional PVD methods using power-of-two range widths. The bitstream of a secret message is embedded into a group of pixel pairs in the cover image through a multiple-based number conversion scheme. This scheme allows the number of bits that can be embedded in a pixel pair to be more flexible, achieving the maximum of
With the advantages above, the proposed method can enhance the applicability of PVD-based methods across a broader range of domains. Employing more general non-power-of-two range widths and implementing the multiple-based number conversion scheme, the proposed method enhances application flexibility and increases data embedding rates. Hence, the proposed method can be utilized to extend the capabilities of other PVD methods. Examples of such capability extensions of existing PVD methods will be presented in the later sections of this paper.
The content of the subsequent sections of this paper is organized as follows. The relevant PVD techniques are reviewed in more detail in Section 2. Section 3 presents the proposed method and the algorithms designed for implementing the data embedding and extraction processes of the proposed data-hiding model. An application of general quantization ranges is demonstrated in Section 4. Experimental results are covered in Section 5. Concluding remarks and suggestions for future works are included in Section 6.
2 Review of Related Techniques
This section conducts a detailed review of the original PVD method and the multiple-based number conversion scheme.
Wu et al. [1] proposed the PVD data-hiding method in 2003. By the method, an image is partitioned into 1 × 2 non-overlapping image blocks, each containing a pair of neighboring pixels. Let
A block with a small absolute difference value
where
The two-pixel values
where
The values of
Then, the values of
The embedded message is extracted from a stego-image by visiting two-pixel blocks in the order as determined in the embedding process. Assume that
At first, the falling-off-boundary checking process is also performed in the data extraction process by using the maximum value (the upper bound value
Then, the values (
If neither
where
2.2 Multiple-Based Number System and Multiple-Based Number Conversion
Wu et al. [25] proposed a multiple-based number system for hiding a secret message in a given image according to the following two steps: (1) transform the bits of the secret message into several multiple bases; (2) embed the digits of the number into a group of pixel pairs in a cover image.
Specifically, assume that the multiple-based number obtained in Step (2) above has the form of n digits as shown in the following:
where the digit
M can be expressed succinctly through the function
With a decimal value of M and the bases of
and
where the operation of mod yields the remainder of integer division, and the operation of div yields the quotient of integer division.
3 Proposed Data-Hiding Technique
In the proposed method, the data-hiding process, including data embedding and extraction, can be illustrated by Figs. 2 and 3, respectively, which can be regarded as a model of the proposed data-hiding system.
Specifically, in the data embedding process, as depicted in Fig. 2, the difference value of each pixel pair P in the cover image is computed, and the result is employed to decide a range R in a pre-defined range table by table lookup. The width of range R is next to be a base-b according to which the value n representing the input message M is used to compute a base-b digit db (see the detail of this step in Algorithm 1 described subsequently). The digit db is then embedded into the pixel pair P. This one-digit embedding method is repeated until the value n of message M is totally processed to obtain a desired stego-image. The base-b yielded, as mentioned above, is not fixed but variable for different pixel pairs; i.e., multiple bases are generated for use in the proposed method.
In the data extraction process, as depicted in Fig. 3, each pixel pair in the stego-image is first taken to extract a pixel value difference d, from which a base-b is decided in a way identical to that taken in the data embedding process. In addition, d is also regarded as a base-b digit db. Then, db is converted into a partial value of n representing the secret message M (the detail of this conversion step in Algorithm 2). This process is repeated until all partial values of n are collected, summed up, and converted into the original bitstream of the message M.
Secret messages are embedded by the proposed method into images by use of general quantization ranges, which can be expressed using
3.1 The Data Embedding Process
To apply the data embedding process of the proposed method, the cover image C is partitioned into n 1 × 2 image blocks. Then, the cover image is traversed in an order determined by a pseudo-random mechanism, visiting each pixel pair in the image only once to achieve secrecy. Let (
The value of
Similar to the PVD method [1], the proposed method performs falling-off-boundary checking on a block (
where n denotes the number of pixel pairs in C, and
where
To embed a secret message M with a length of B bits into image C, C must have a sufficient number of pixel pairs that meet the condition
If the condition is met, the proposed method converts M into the multiple-based number corresponding to the pixel pairs in C. The value of each digit in the multiple-based number is then embedded in the corresponding pixel pair. If images of the common size 512 × 512 are used, then the product in Eq. (16) can exceed
Fig. 5 illustrates the embedding of a 10-bit secret bitstream 11001110012 = 82510 into four-pixel pairs with gray values of (56, 58), (110, 242), (65, 52), and (68, 90). The differences in the gray values of the four pixel-pairs are 2, 132, −13, and 22, respectively. If the quantization ranges in Table 2B are applied, the corresponding range intervals of the differences are [0, 8], [131, 255], [9, 19], and [20, 34], respectively. After falling-off-boundary checking is performed for the four pixel-pairs, only (110, 242) is checked to have a possibility of falling outside (falling-off) 0 or 255, as shown by the following computations:
(1) pixel value difference
(2)
(3)
(4) (110 −
(5) therefore, the resulting pixel value 312 falls outside the boundary of 255 (
This pixel pair is skipped and not subjected to embedding. The widths of the range intervals of the other three pixel-pairs are 9, 11, and 15. Next, the secret bitstream is converted to a multiple-based number with 9, 11, and 15 bases. The corresponding digit values in the multiple-based number can be computed to be 6, 3, and 8 respectively as shown in the following:
(1) 825 mod 9 = 6 with quotient Q1 = 91;
(2) 91 mod 11 = 3 with quotient Q2 = 8;
(3) 8 mod 15 = 8 with quotient Q3 = 0.
The conversion result is 81531169. The values 6, 3, and 8 of the digits in the multiple-based number are then embedded into (56, 58), (65, 52), and (68, 90), respectively. The new differences obtained by Eq. (3) are 6, −12, and 28, and therefore the new gray values computed by Eq. (4) are (54, 60), (64, 52), and (65, 93), respectively.
3.2 The Data Extraction Process
To extract the B-bit secret message M from the stego-image S, S is partitioned into 1 × 2 image blocks in the same way applied during the embedding process. The extraction process traverses the stego-image using the identical pseudo-random mechanism to produce the same traversing order applied during the embedding process. Then, each digit value in a multiple-based number is computed using the corresponding pixel pair. The multiple-based number is converted to a B-bit bitstream to yield the resulting secret message. The data extraction algorithm used in this study is as follows:
Fig. 6 illustrates the extraction of a 10-bit secret message from the four pixel-pairs above with gray values of (54, 60), (110, 242), (64, 52), and (65, 93), which were yielded in the previous example, with the differences of the gray values of the four pixel-pairs being 6, 132, −12, and 28, respectively. The quantization ranges in Table 2B are applied, and the corresponding range intervals of the differences are [0, 8], [131, 255], [9, 19], and [20, 34]. After falling-off-boundary checking is performed for the four pixel-pairs, only (110, 242) is revealed to have the possibility of falling outside 0 or 255; thus, it is skipped and not subjected to data extraction. The values 6, 3, and 8 of the digits in the multiple-based number are extracted by Eq. (9) from (54, 60), (64, 52), and (65, 93), respectively. The widths of the range interval of the three pixel-pairs are 9, 11, and 15. Hence, a multiple-based number with bases of 9, 11, and 15 can be formed, which is 81531169. The equivalent decimal number is 82510, which is then converted to a 10-bit bitstream 11001110012 and taken finally to be the extracted secret message bitstream.
4 Application Example Using General Quantization Ranges
This section demonstrates an application example in which general quantization ranges are used. A quantization range table is required when the PVD method embeds a secret message. Small widths are selected for ranges close to 0; in contrast, large widths are chosen for ranges close to 255. Although the number of message bits that can be embedded in the large-width quantization range to which a pixel pair’s difference value belongs is larger than that achieved in the small-width quantization range, image distortion caused by the embedding of messages in the large-width quantization range is larger than that caused in the small-width quantization range. When the number of message bits to be embedded in a cover image does not exceed the maximum embedding capacity of the image, some pixel pairs in the image might not be used for data embedding. At this point, if the ranges of the quantization table can be dynamically adjusted so as not to compose the entire grayscale difference range of [0, 255], i.e., if they can be appropriately reduced to compose a smaller range from 0 to G instead of from 0 to 255, then the use of pixel pairs with pixel differences from 0 to G in the image might be sufficient for the embedding of all the secret data by avoiding embedding message data in those pixel pairs in the image with grayscale differences in the range from
If a cover image has n pixel-pairs, let the i-th pixel pair be
where
5 Experimental Results and Discussions
This section describes various experiments conducted in this study to show the superiority of the proposed method and its use to improve the existing PVD-based methods, with the experimental results presented for conducting various required comparisons.
5.1 Comparison with the Original PVD Method–Part I: Respective Results of All Ranges for a Single Cover Image
In the experiments conducted in this study to test the goodness of the proposed method, eight 512 × 512 grayscale images were used as cover images, and a random-generated bitstream was utilized as the secret message. Two of the tested cover images (i.e., named Baboon and Jet) are shown in Fig. 7. The experiments were conducted using the programming language C# with the BigInteger class being applied for big-integer processing. In the experiments, the quantization ranges in Tables 1, 2A,B were used to look up range widths based on the differences in gray values. Table 1 was used for the original PVD method [1]. The widths of the first and second quantization ranges in Table 2A were designed to be slightly smaller than those of the first and second ranges in Table 1. In contrast, the widths of the first and second quantization ranges in Table 2B were designed to be slightly larger than those in Table 1. The experimental performances from Table 2A,B were compared to those from Table 1.
Table 3 lists the results of using the Baboon image as an example of input cover images for estimating the data embedding rates, where both the conventional embedding method [1] and the proposed method with multiple-based number conversion were applied. The purpose is to conduct an initial check of the effect of the usage of non-power-of-two range widths and the multiple-based number conversion scheme. The following facts can be observed from Table 3.
(1) In the three range tables, the value differences of the pixel pairs in the image mainly belong to the ranges with indexes 1 and 2.
(2) About the first and second ranges in the three tables, those of Table 2B are the widest, followed by those of Tables 1 and 2A; the larger the range width to which a difference value of a pixel pair belongs, the more the information that can be embedded in the pixel pair. Hence, the use of Table 2B yields the highest embedding rate, followed by the uses of Tables 1 and 2A. Here, the embedding rate of an image is defined by the following equation:
(3) The width w of each range in Table 1 is a power of two that when the conventional method was applied,
(4) The widths of the ranges in Table 2A,B are not powers of two, whereas those in Table 1 are. Using each range width in the two tables, the embedding rate of the stego-image yielded by the proposed method with the multiple-based number conversion scheme is always higher than that yielded by the conventional method. This is owing to the fact
Fig. 8 shows four resulting stego-images with the aforementioned random bitstream as the input and Table 2A,B as the quantization tables. The resulting images are not visually different from the original ones, indicating that the proposed method can embed messages in images imperceptibly.
5.2 Comparison with the Original PVD Method–Part 2: Results of All Ranges for a Set of Cover Images
Table 4 shows the embedding rates and the peak signal-to-noise ratios (PSNRs) yielded by the original PVD method [1] using all the ranges in Tables 1, 2A, B, for all the eight cover above images, as well as those yielded by the proposed method using the same ranges in Tables 1, 2A,B, respectively. The original PVD method uses the conventional embedding technique for message embedding, while the proposed method uses non-power-of-two range widths and multiple-based number conversion. Table 4 reveals the following facts.
(1) The results presented in columns (A), (C), and (E) indicate that the embedding rates yielded by the original PVD method [1] using the ranges in Table 2A,B are lower than those yielded the same method using the ranges in Table 1. This is because the widths of the ranges in Table 2A,B are not powers of two, while only power-of-two range widths can be used by the original PVD method. That is, the use of the original PVD method for embedding message bits resulted in “wasting” some integer values that represent the non-power-of-two ranges in Table 2A,B, resulting in fewer embeddings of message bits and so lower embedding rates.
(2) Columns (C) and (I) show the embedding rates achieved using the ranges in Table 2A, and columns (E) and (K) show the embedding rates achieved using the ranges in Table 2B. These results indicate that the embedding rates obtained by the proposed method with multiple-based number conversion are higher than those obtained by embedding the message bits by the original PVD method [1].
(3) The results presented in columns (G), (I), and (K) indicate that the proposed method using the ranges listed in Table 2B yields the highest embedding rate, followed by those resulting from using the ranges listed in Tables 1 and 2A. This verifies that the proposed method can embed messages using non-power-of-two range widths and maintain high embedding rates.
(4) Columns (H), (J), and (L) show that the PSNR values of the resulting images are all above 35 dB, demonstrating the imperceptibility of the stego-images yielded by the proposed method.
In addition, the embedding rates achieved for image Baboon through the proposed method using the ranges in Tables 1, 2A,B are 1.743, 1.687, and 1.782, respectively, which are computed from the embedding capacities 456954, 442135, 467162, respectively. These values are identical to the estimated values listed in Table 3.
In addition, Table 5 shows the values of structure similarity (SSIM) indexes [35] yielded by the original PVD method [1] and the proposed method using the ranges in Tables 1, 2A,B, where SSIM stands for structural similarity and is another indicator used to assess image quality just like PSNR. The value of the SSIM ranges between 0 and 1, with a higher value indicating greater similarity between images. In columns (H), (J), and (L) of Table 5, the SSIM values of the resulting stego-images are all above 0.96, demonstrating the imperceptibility of the stego-image yielded by the proposed method.
5.3 Security Evaluation of the Proposed Method by RS Steganalysis
The dual statistics steganalysis method, RS steganalysis, proposed by Fridrich et al. [17], was employed to test the security of the stego-images yielded by the proposed method in this study. In Fig. 9, four RS diagrams generated from images in Fig. 8a through Fig. 8d are presented. In the diagrams, the x-axes depict the percentage of image pixels in the image in which secret messages are embedded, and the y-axes depict the percentages of regular and singular pixel groups with masks M = [0 1 1 0] and
5.4 Demonstration of the Properties of the Swain Method [10] Extended by the Proposed Method– Part I: From Data Embedding Perspective
In the experiments above, the results obtained by the original PVD method proposed by Wu et al. [1] were compared to those obtained by the proposed method, which uses non-power-of-two range widths and carries out multiple-based number conversion. The results indicated that the proposed method can improve the data embedding rate. Theoretically, given a steganographic method that is derived from the PVD method [1] to yield higher embedding rates, if the method can be extended to use non-power-of-two range widths and multiple-based number conversion as done in the proposed method, then the high data embedding capability of the steganographic method can be maintained.
The Swain method [10], one of the methods derived from the original PVD method [1], was extended using the proposed method to demonstrate the above reasoning in this study. Then, the original Swain method and the extended version were employed to conduct experiments like those in Section 5.2, but with the image block resized to 3 × 3.
Specifically, in the experiments each
Table 8 shows the embedding rates and the values of the PSNRs yielded both by the original Swain method [10] using the ranges in Tables 6, 7A,B, respectively, as well as by the extended Swain method with multiple-based number conversion using the ranges in Tables 6, 7A,B, respectively. Accordingly, the following facts can be observed from Table 8.
(a) Columns (C) and (I) of Table 8 show the embedding rates yielded using the ranges in Table 7A, and columns (E) and (K) show the embedding rates yielded using the ranges in Table 7B; these results indicate that the embedding rates yielded by the extended Swain method are higher than those obtained by the original Swain method [10]. This observation proves that the proposed multiple-based number conversion scheme, together with the non-power-of-two range widths, can be utilized integrally to extend a PVD-based method, the original Swain method [10], to enhance the data-hiding capability, just like the case that the proposed method can extend the original PVD method [1] to yield higher data embedding rates, as demonstrated in Sections 5.1 and 5.2 described previously.
(b) Columns (H), (J), and (L) in Table 8 exhibit that the resulting PSNRs of the stego-images yielded by the extended Swain method are all larger than 28, very close to those PSNRs yielded by the original Swain method as shown in Columns (B), (D), and (F) in Table 8, indicating the fact the qualities of the stego-images yielded by the original Swain method are maintained by the extended Swain method.
In order to ascertain more definitively the above fact of maintaining stego-image quality, the SSIM [35] indices were computed from the resulting stego-images yielded by the original Swain method as well as by the extended one, which is listed in Table 9 and showed the following fact. As shown in columns (H), (J), and (L) of Table 9, the values of the SSIM measures of the resulting steo-images are all above 0.90, again close to those yielded by the original Swain method, indicating again that the stego-image quality is kept by the extended Swain method.
5.5 Demonstration of the Properties of the Swain Method [10] Extended by the Proposed Method – Part II: From Security Perspectives
Additionally, efforts were made to compare the original Swain method [10] with its extended version from the steganalysis resistance perspective against the RS and PDH analyses. The results of these efforts are shown below.
Two examples of stego-images yielded by the extended Swain method and the corresponding results of RS and PDH steganalysis obtained in the experiments are depicted in Figs. 10 and 11, respectively. Fig. 11 indicates that the extended Swain method [10] with the proposed multiple-based number conversion technique using multiple range tables can also resist attacks from RS and PDH steganalysis.
5.6 Experimental Results of an Application Example Using General Quantization Ranges
As an application example of the technique of using dynamically adjustable ranges mentioned in Section 4, the quantization table presented in Table 1 was used as the initially given quantization table. The cover images were employed to embed varying amounts of a random bitstream. The G values yielded using the proposed method to embed varying numbers of random bits into image Lena and the corresponding PSNR values of the resulting stego-images are presented in Fig. 12. The trend of the curves in the figure indicates that the G value becomes larger, and the PSNR values become smaller (the stego-image quality become worse) as the size of the embedded data increases.
As a comparison, an experiment using the original PVD method [1] to embed the same sets of random bits into image Lena using the entire grayscale difference range of [0, 255] was conducted. The resulting PSNR values were computed and compared to those shown in Fig. 12. The comparison results are shown in Fig. 13, where the orange curve depicts the PSNR results already seen in Fig. 12, and the blue curve shows the PSNR values yielded by the original PVD method [1]. The former method with dynamic G values yields stego-images with better qualities.
6 Conclusions and Suggestions for Future Study
A new PVD data-hiding method with general quantization ranges is proposed. Under conventional PVD methods, the width of each quantization range to which a pixel pair’s difference value belongs is a power of two. The advantage of the proposed method is that it enables PVD methods to remove the restriction of power-of-two range widths and maintain high embedding rates. Firstly, the proposed method converts the bitstream of messages into digits in a multiple-based number, the bases of which are determined by the pixel pairs in the cover image. Then, the digits’ values are embedded in the pixel pairs in the image. In the process of data embedding, a pseudo-random mechanism is applied to achieve cryptography. Also, an RS steganalysis is conducted to show the security of the proposed method. In addition, the Swain method, which is derived from the PVD method, is employed to demonstrate that the proposed embedding technique can also be utilized to accomplish high embedding rates in the cases of using non-power-of-two range widths as the proposed method achieves high embedding rates in the original PVD method. Hopefully, using the proposed embedding technique, all the derived methods from the PVD method can achieve high embedding rates when using general range widths.
About future studies, at first, as demonstrated by the experimental results obtained in this study, the use of variable ranges of non-power-of-two widths seems to fix better the sensitivity of human vision to natural images, yielding better data embedding results and resulting image quality. Hence, in the future, it is suggested that non-power-of-two quantization range widths, together with the multiple-based conversion scheme, be used by all PVD-based data-hiding methods.
Next, regarding how to formulate the optimal width of each quantization range, it can be considered to minimize the resulting stego-image distortion for a secret message with a known size and to maximize the resulting data embedding capacity with reasonable image quality sensed by the human visual model. Both topics are worthwhile further explorations.
Finally, further research can also explore the application of multiple-based number conversion, and non-power-of-two quantization ranges in various aspects of digital signal processing, such as image processing, audio processing, and video processing. This can offer new opportunities for performance improvements across various technological domains.
Acknowledgement: Da-Chun Wu, the first author of this paper, wants to express his sincere thanks and appreciation to Wen-Hsiang Tsai at National Chiao Tung University, Taiwan. Tsai is the advisor who led Wu into the field of data-hiding when Wu was pursuing a doctoral degree. Also, Tsai is the corresponding author of the original PVD method [1]. Furthermore, the basic idea of the proposed method in this paper has been published previously in Wu [31] as a 5-page paper (in Chinese) with limited details and few experimental results. In this study, a great deal of improvement has been made, including (1) expanding the survey of related studies and increasing more references; (2) elaborating the presentation of the basic idea by detailed descriptions; (3) including additionally a data extraction algorithm (Algorithm 2) and describing its detailed steps; (4) giving additionally an application example using general quantization ranges; (5) using more cover images in the experiments; (6) using more quantization tables in the experimental for comparisons; (7) demonstrating additionally the proposed embedding technique by a method derived from the original PVD method for showing the generality of the proposed method; (8) providing more experimental results and analyses of them by tables, graphs or diagrams.
Funding Statement: The authors received no specific funding for this study.
Author Contributions: The authors confirm their contribution to the paper as follows: study conception and design: Da-Chun Wu, Zong-Nan Shih; data collection: Zong-Nan Shih; analysis and interpretation of results: Da-Chun Wu, Zong-Nan Shih; draft manuscript preparation: Da-Chun Wu, Zong-Nan Shih. All authors reviewed the results and approved the final version of the manuscript.
Availability of Data and Materials: The data that support the findings of this study are available from the corresponding author upon reasonable request.
Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.
References
1. Wu DC, Tsai WH. A steganographic method for images by pixel-value differencing. Pattern Recognit Lett. 2003;24(10):1613–26. doi:10.1016/S0167-8655(02)00402-6. [Google Scholar] [CrossRef]
2. Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T. Digital watermarking and steganography. 2nd ed. Burlington, MA: Morgan Kaufmann; 2008. doi:10.1016/B978-0-12-372585-1.X5001-3. [Google Scholar] [CrossRef]
3. Hussain M, Riaz Q, Saleem S, Ghafoor A, Jung KH. Enhanced adaptive data-hiding method using LSB and pixel value differencing. Multimed Tools Appl. 2021;80:20381–401. doi:10.1007/s11042-021-10652-2. [Google Scholar] [CrossRef]
4. Boroumand M, Chen M, Fridrich J. Deep residual network for steganalysis of digital images. IEEE Trans Inf Forensics Secur. 2018;14(5):1181–93. doi:10.1109/TIFS.2018.2871749. [Google Scholar] [CrossRef]
5. Sun B, Li Y, Zhang J, Xu H, Ma X, Xia P. Topic controlled steganography via graph-to-text generation. Comput Model Eng Sci. 2023;136(1):157–76. doi:10.32604/cmes.2023.025082. [Google Scholar] [CrossRef]
6. Wang RZ, Lin CF, Lin JC. Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognit. 2001;34(3):671–83. doi:10.1016/S0031-3203(00)00015-7. [Google Scholar] [CrossRef]
7. Wu HC, Wu NI, Tsai CS, Hwang MS. Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proc Vis Image Signal Process. 2005;152(5):611–5. doi:10.1049/ip-vis:20059022. [Google Scholar] [CrossRef]
8. Chang CC, Chuang CJ, Hu YC. Spatial domain image hiding scheme using pixel-values differencing. Fundam Inform. 2006;70(3):171–84. doi:10.5555/2369276.2369277. [Google Scholar] [CrossRef]
9. Khodaei M, Faez K. New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing. IET Image Process. 2012;6(6):677–86. doi:10.1049/iet-ipr.2011.0059. [Google Scholar] [CrossRef]
10. Swain G. High capacity image steganography using modified LSB substitution and PVD against pixel difference histogram analysis. Secur Commun Networks. 2018;1505896:1–15. doi:10.1155/2018/1505896. [Google Scholar] [CrossRef]
11. Shukla AK, Singh A, Singh B, Kumar A. A secure and high-capacity data-hiding method using compression, encryption and optimized pixel value differencing. IEEE Access. 2018;6:51130–9. doi:10.1109/ACCESS.2018.2868192. [Google Scholar] [CrossRef]
12. Hameed MA, Hassaballah M, Aly S, Awad AI. An adaptive image steganography method based on histogram of oriented gradient and PVD-LSB techniques. IEEE Access. 2019;7:185189–204. doi:10.1109/ACCESS.2019.2960254. [Google Scholar] [CrossRef]
13. Wu DC, Shih ZN, Wu JH. Modified multiway pixel-value differencing methods based on general quantization ranges for image steganography. IEEE Access. 2022;10:8824–39. doi:10.1109/ACCESS.2021.3138895. [Google Scholar] [CrossRef]
14. Chang KC, Chang CP, Huang PS, Tu TM. A novel image steganographic method using tri-way pixel-value differencing. J Multimedia. 2008;3(2):37–44. doi:10.4304/jmm.3.2.37-44. [Google Scholar] [CrossRef]
15. Sahu AK, Swain G, Sahu M, Hemalatha J. Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP. J Inf Secur Appl. 2021;58(102808):1–16. doi:10.1016/j.jisa.2021.102808. [Google Scholar] [CrossRef]
16. Sahu M, Padhy N, Gantayat SS. Multi-directional PVD steganography avoiding PDH and boundary issue. J King Saud Univ Comput Inf Sci. 2022;34(10):8838–51. doi:10.1016/j.jksuci.2021.10.007. [Google Scholar] [CrossRef]
17. Fridrich J, Goljan M, Du R. Reliable detection of LSB steganography in color and grayscale images. In: Proceedings of the 2001 Workshop on Multimedia and Security: New Challenges; 2001; Ottawa, Ontario, Canada. p. 27–30. doi:10.1145/1232454.1232466. [Google Scholar] [CrossRef]
18. Zhang XP, Wang S. Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recognit Lett. 2004;25(3):331–9. doi:10.1016/j.patrec.2003.10.014. [Google Scholar] [CrossRef]
19. Sahu AK, Swain G. An optimal information hiding approach based on pixel value differencing and modulus function. Wireless Pers Commun. 2019;108:159–74. doi:10.1007/s11277-019-06393-z. [Google Scholar] [CrossRef]
20. Sahu AK, Swain G. Digital image steganography using PVD and modulo operation. Internetwork Indones J. 2018;10(2):3–13. [Google Scholar]
21. Roselinkiruba R, Sharmila TS. Performance evaluation of encryption algorithm using fruit fly optimization improved hybridized seeker and PVD algorithm. Int J Inf Technol. 2021;13:1797–803. doi:10.1007/s41870-021-00774-z. [Google Scholar] [CrossRef]
22. Phad VS, Bhosale RS, Panhalkar AR. A novel security scheme for secret data using cryptography and steganography. Int J Comput Netw Inf Secur. 2012;2:36–42. doi:10.5815/ijcnis.2012.02.06. [Google Scholar] [CrossRef]
23. Filler T, Judas J, Fridrich J. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensics Secur. 2011;6(3):920–35. doi:10.1109/TIFS.2011.2134094. [Google Scholar] [CrossRef]
24. Li W, Zhang W, Li L, Zhou H, Yu N. Designing near-optimal steganographic codes in practice based on polar codes. IEEE Trans Commun. 2020;68(7):3948–62. doi:10.1109/TCOMM.2020.2982624. [Google Scholar] [CrossRef]
25. Wu DC, Tsai WH. Data-hiding in image via multiple-based number conversion and lossy compression. IEEE Trans Consum Electron. 1998;44(4):1406–12. doi:10.1109/30.735844. [Google Scholar] [CrossRef]
26. Wu DC, Tsai WH. Embedding of any type of data in images based on a human visual model and multiple-based number conversion. Pattern Recognit Lett. 1999;20(14):1511–17. doi:10.1016/S0167-8655(99)00118-X. [Google Scholar] [CrossRef]
27. Zhang X, Wang S. Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Process Lett. 2005;12(1):67–70. doi:10.1109/LSP.2004.838214. [Google Scholar] [CrossRef]
28. Geetha S, Kabilan V, Chockalingam SP, Kamaraj N. Varying radix numeral system based adaptive image steganography. Inf Process Lett. 2011;111(16):792–97. doi:10.1016/j.ipl.2011.05.013. [Google Scholar] [CrossRef]
29. Tanga MW, Wen SG, Chena XL, Hu J. An image information hiding using adaptation and radix. Optik. 2015;126(23):4136–41. doi:10.1016/j.ijleo.2015.07.200. [Google Scholar] [CrossRef]
30. Chen WS, Liao YK, Lin YT, Wang CM. A novel general multiple-base data embedding algorithm. Inf Sci. 2016;358:164–90. doi:10.1016/j.ins.2016.03.045. [Google Scholar] [CrossRef]
31. Wu DC. A pixel-value differencing technique for image steganography based on general quantization ranges. In: Proceedings of the 2021 Conference on Information Technology and Applications in Outlying Islands; 2021; Kinmen, Taiwan. p. 1138–42. [Google Scholar]
32. Ma B, Li K, Xu J, Wang C, Li J, Zhang L. Enhancing the security of image steganography via multiple adversarial networks and channel attention modules. Digit Signal Process. 2023;141:1–19. doi:10.1016/j.dsp.2023.104121. [Google Scholar] [CrossRef]
33. Sahu AK, Swain G. A novel multi stego-image based data-hiding method for gray scale image. Pertanika J Sci Technol. 2019;27(2):753–68. [Google Scholar]
34. Tseng WH, Leng HS. A steganographic method based on pixel-value differencing and the perfect square number. J Appl Math. 2013;2013(1):1–8. doi:10.1155/2013/189706. [Google Scholar] [CrossRef]
35. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP. Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process. 2004;13(4):600–12. doi:10.1109/TIP.2003.819861. [Google Scholar] [PubMed] [CrossRef]
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.