Image steganography method based on PVD and modulus function

The traditional steganography methods with Pixel Value Differencing (PVD) usually only deal with the PVD in the horizontal direction but ignore the vertical one. In this paper, the cover image is divided into 2×2 nonoverlapping blocks, then the modulus function method is used in horizontal direction...

Full description

Saved in:
Bibliographic Details
Published in2011 International Conference on Electronics, Communications and Control pp. 282 - 284
Main Authors Feng Pan, Jun Li, Xiaoyuan Yang
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.09.2011
Subjects
Online AccessGet full text
ISBN1457703203
9781457703201
DOI10.1109/ICECC.2011.6067590

Cover

Abstract The traditional steganography methods with Pixel Value Differencing (PVD) usually only deal with the PVD in the horizontal direction but ignore the vertical one. In this paper, the cover image is divided into 2×2 nonoverlapping blocks, then the modulus function method is used in horizontal direction and the simple PVD method is used in vertical direction for steganography. In addition, the falling-off boundary problem is solved. Experimental results show that the proposed approach provides higher stego-image quality, larger embedding capacity, and can against common attacks.
AbstractList The traditional steganography methods with Pixel Value Differencing (PVD) usually only deal with the PVD in the horizontal direction but ignore the vertical one. In this paper, the cover image is divided into 2×2 nonoverlapping blocks, then the modulus function method is used in horizontal direction and the simple PVD method is used in vertical direction for steganography. In addition, the falling-off boundary problem is solved. Experimental results show that the proposed approach provides higher stego-image quality, larger embedding capacity, and can against common attacks.
Author Feng Pan
Xiaoyuan Yang
Jun Li
Author_xml – sequence: 1
  surname: Feng Pan
  fullname: Feng Pan
  organization: Electron. Dept., Coll. of the Armed Police Force, Xi'an, China
– sequence: 2
  surname: Jun Li
  fullname: Jun Li
  email: lijun9250lj@163.com
  organization: Electron. Dept., Coll. of the Armed Police Force, Xi'an, China
– sequence: 3
  surname: Xiaoyuan Yang
  fullname: Xiaoyuan Yang
  organization: Key Lab. of Network & Inf. Security of the Minist. of Educ., Xidian Univ., Xi'an, China
BookMark eNo1j09LwzAchiMq6Ga_gF7yBVqT5j94kTq1MNCDeh1p80tXWZPRtId9-w2cz-XlubzwLNBViAEQuqekoJSYx7paVVVREkoLSaQShlygzChNuVCKsJLqS7T4F8JuUJbSLzkhpSmVukVP9WA7wGmCzobYjXa_PeABpm10uLEJHI4Bf_68YBscHqKbd3PCfg7t1Mdwh6693SXIzrtE36-rr-o9X3-81dXzOu-pElPeauBAXOk1Vc6BahvtvSXQtI55KR0TUBphrPNSnFK4aDi3HLgXmgnSMLZED3-_PQBs9mM_2PGwOQezI42fS0E
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICECC.2011.6067590
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781457703218
145770319X
1457703211
9781457703195
EndPage 284
ExternalDocumentID 6067590
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i175t-c8e4e0d2f817dde7cb8ffa0ebcd3f66d35e2959adf6520145b44a4e4f58350b33
IEDL.DBID RIE
ISBN 1457703203
9781457703201
IngestDate Wed Aug 27 02:49:07 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-c8e4e0d2f817dde7cb8ffa0ebcd3f66d35e2959adf6520145b44a4e4f58350b33
PageCount 3
ParticipantIDs ieee_primary_6067590
PublicationCentury 2000
PublicationDate 2011-Sept.
PublicationDateYYYYMMDD 2011-09-01
PublicationDate_xml – month: 09
  year: 2011
  text: 2011-Sept.
PublicationDecade 2010
PublicationTitle 2011 International Conference on Electronics, Communications and Control
PublicationTitleAbbrev ICECC
PublicationYear 2011
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000669277
Score 1.5753995
Snippet The traditional steganography methods with Pixel Value Differencing (PVD) usually only deal with the PVD in the horizontal direction but ignore the vertical...
SourceID ieee
SourceType Publisher
StartPage 282
SubjectTerms Data mining
Embedding capacity
Force
Histograms
Image quality
Information security
modulus function
Pixel Value Differencing(PVD)
PSNR
steganography
Title Image steganography method based on PVD and modulus function
URI https://ieeexplore.ieee.org/document/6067590
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwGA1zJ08qm_ibHDzaLU3SpAFvdWMTJjs42W3kp4iuHdpe_OtN2m6iePDWllISPpr38uV77wPgOhZaOEZ0RGONIirDP2ckjUSQ_BCDFE6C3nn2wCYLer9Mlh1ws9PCWGvr4jM7CJf1Wb4pdBVSZUMW6K3wG_Q9nrJGq7XLp3joFJjzWruVcB76gpOtpVN7H29FM0gMp9koyxoHz_arP9qr1OgyPgCz7biaopLXQVWqgf78Zdn434Efgv63jg_Odwh1BDo274Hb6dqvIdBH91nmrWE1bBpJw4BpBhY5nD_dQZkbuC5M9VZ9wAB_IYR9sBiPHrNJ1PZQiF48MSgjnVpqkcEujblfybhWqXMSWaUNcYwZklgsEiGNYwkOR4yKUkktdYmnZkgRcgy6eZHbEwA99eIq9dsPzRXlDPk3GY6ZJJ4RWInVKeiFma82jU3Gqp302d-Pz8F-k54N5VoXoFu-V_bS43uprurAfgG7KaAr
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV27TsMwFLWqMsAEqEW88cBI2iR-xRJbaNVAW3VoUbfKryAETRAkC1-PnaRFIAa2JIoiW1fxOb6-51wArgOueEqR8nCgfA8L989pgT3uJD9I-zIkTu88mdLRAt8vybIFbrZaGGNMVXxmeu6yOsvXuSpdqqxPHb3ldoO-QzDGpFZrbTMqFjx5yFil3iKMuc7gaGPq1NwHG9mMz_tJPIjj2sOz-e6PBisVvgz3wWQzsrqs5KVXFrKnPn-ZNv536Aeg-63kg7MtRh2Clsk64DZZ21UE2vg-iayxrIZ1K2noUE3DPIOzxzsoMg3XuS5fyw_oANAFsQsWw8E8HnlNFwXv2VKDwlORwcbXYRoFzK5lTMkoTYVvpNIopVQjYkJOuNApJaE7ZJQYC2xwSiw58yVCR6Cd5Zk5BtCSLyYjuwFRTGJGffsmDQMqkOUERoTyBHTczFdvtVHGqpn06d-Pr8DuaD4Zr8bJ9OEM7NXJWle8dQ7axXtpLizaF_KyCvIXVjijeA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2011+International+Conference+on+Electronics%2C+Communications+and+Control&rft.atitle=Image+steganography+method+based+on+PVD+and+modulus+function&rft.au=Feng+Pan&rft.au=Jun+Li&rft.au=Xiaoyuan+Yang&rft.date=2011-09-01&rft.pub=IEEE&rft.isbn=9781457703201&rft.spage=282&rft.epage=284&rft_id=info:doi/10.1109%2FICECC.2011.6067590&rft.externalDocID=6067590
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781457703201/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781457703201/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781457703201/sc.gif&client=summon&freeimage=true