Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP

Since the inception of pixel value differencing (PVD) image steganography, it has drawn considerable interest among the researchers of this field. However, most of the PVD based techniques suffer from either falling-off boundary problem (FOBP) or incorrect extraction problem (IEP). Therefore, to add...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of information security and applications Jg. 58; S. 102808
Hauptverfasser: Sahu, Aditya Kumar, Swain, Gandharba, Sahu, Monalisa, Hemalatha, J.
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Elsevier Ltd 01.05.2021
Schlagworte:
ISSN:2214-2126
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Since the inception of pixel value differencing (PVD) image steganography, it has drawn considerable interest among the researchers of this field. However, most of the PVD based techniques suffer from either falling-off boundary problem (FOBP) or incorrect extraction problem (IEP). Therefore, to address these two issues, this paper proposes a multi-directional pixel value differencing and modulus function (MDPVDMF) based technique. During the embedding process, the original image (OI) is partitioned into 2 × 2 size pixel blocks. Then, data embedding is performed by exploiting the horizontal, vertical, and diagonal directions for each block. For a 2 × 2 pixel block, two difference values can be obtained in any of the three directions. Next, using the difference values and the remainders of the pixel pairs, the secret bits are embedded. The experiment has been conducted to compute the performance of the proposed technique with regards to the image quality metrics like peak signal-to-noise ratio (PSNR), embedding capacity (EC), and FOBP. Results show that PSNR is optimal for vertical pairs with 39.17 dB whereas the EC is optimal for the diagonal pairs with 3.10 bits per pixel (BPP). Further, the proposed technique has shown exceptional attack resistance ability to regular & singular (RS) attack, salt & pepper (S&P) noise, pixel difference histogram (PDH) analysis, and subtractive pixel adjacency matrix (SPAM) steganalysis.
AbstractList Since the inception of pixel value differencing (PVD) image steganography, it has drawn considerable interest among the researchers of this field. However, most of the PVD based techniques suffer from either falling-off boundary problem (FOBP) or incorrect extraction problem (IEP). Therefore, to address these two issues, this paper proposes a multi-directional pixel value differencing and modulus function (MDPVDMF) based technique. During the embedding process, the original image (OI) is partitioned into 2 × 2 size pixel blocks. Then, data embedding is performed by exploiting the horizontal, vertical, and diagonal directions for each block. For a 2 × 2 pixel block, two difference values can be obtained in any of the three directions. Next, using the difference values and the remainders of the pixel pairs, the secret bits are embedded. The experiment has been conducted to compute the performance of the proposed technique with regards to the image quality metrics like peak signal-to-noise ratio (PSNR), embedding capacity (EC), and FOBP. Results show that PSNR is optimal for vertical pairs with 39.17 dB whereas the EC is optimal for the diagonal pairs with 3.10 bits per pixel (BPP). Further, the proposed technique has shown exceptional attack resistance ability to regular & singular (RS) attack, salt & pepper (S&P) noise, pixel difference histogram (PDH) analysis, and subtractive pixel adjacency matrix (SPAM) steganalysis.
ArticleNumber 102808
Author Swain, Gandharba
Sahu, Aditya Kumar
Hemalatha, J.
Sahu, Monalisa
Author_xml – sequence: 1
  givenname: Aditya Kumar
  surname: Sahu
  fullname: Sahu, Aditya Kumar
  email: adityasahu.cse@gmail.com, adityakumar.s@gmrit.edu.in
  organization: Department of Computer Science and Engineering, GMRIT, Rajam, Andhra Pradesh, 532127, India
– sequence: 2
  givenname: Gandharba
  surname: Swain
  fullname: Swain, Gandharba
  organization: Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, Andhra Pradesh, 522502, India
– sequence: 3
  givenname: Monalisa
  surname: Sahu
  fullname: Sahu, Monalisa
  organization: School of Engineering and Technology (CSE), GIET University, Gunupur, Odisha, 765022, India
– sequence: 4
  givenname: J.
  surname: Hemalatha
  fullname: Hemalatha, J.
  organization: Department of Computer Science and Engineering, AAA college of Engineering and Technology, Amathur, Sivakasi, Tamilnadu, 626123, India
BookMark eNp9kMtOwzAQRb0oEqX0B1j5B1Js5y2xgdJCpaJ2AWzNxHaKQ2pXdlKpf0_SsGLR1UhXc0Zzzw0aGWsUQneUzCihyX01q7SHGSOMdgHLSDZCY8ZoFDDKkms09b4ihFBG85iFY_T11taNDqR2SjTaGqhxUVvxgwvwSuLt5zMGI_HeyrZuPS5bc17Deg87hX2jdmDszsHh-4Qbi-FotcTLzdP2jK0W21t0VULt1fRvTtDHcvE-fw3Wm5fV_HEdiJCQJkgFjRORZCqVBYSFLFlY0lyAyCGPZdolwBIaJQmLVBrGBGgEpAAappIVMibhBGXDXeGs906VXOgG-l8bB7rmlPBeEK94L4j3gvggqEPZP_Tgun7udBl6GCDVlTpq5bgXWhmhBpVcWn0J_wUKnoM5
CitedBy_id crossref_primary_10_1007_s11042_022_12677_7
crossref_primary_10_1109_LSP_2025_3585824
crossref_primary_10_1109_ACCESS_2021_3136883
crossref_primary_10_1145_3694965
crossref_primary_10_1007_s11042_023_17927_w
crossref_primary_10_1007_s11042_022_13015_7
crossref_primary_10_1109_ACCESS_2021_3132424
crossref_primary_10_1007_s11042_023_17887_1
crossref_primary_10_1016_j_eswa_2025_128251
crossref_primary_10_1016_j_jksuci_2021_10_007
crossref_primary_10_1109_ACCESS_2025_3582159
crossref_primary_10_1080_1206212X_2025_2484763
crossref_primary_10_1109_ACCESS_2022_3181179
crossref_primary_10_1007_s11220_021_00360_4
crossref_primary_10_1117_1_JEI_32_5_053001
Cites_doi 10.1007/s11042-017-5056-4
10.3233/FI-2012-714
10.5121/csit.2012.2211
10.1109/TIFS.2010.2045842
10.1016/j.eij.2014.06.001
10.1016/j.jss.2007.01.049
10.1109/TIFS.2012.2190402
10.1007/s11042-018-6766-y
10.4304/jetwi.2.1.56-64
10.1016/j.compeleceng.2015.01.004
10.1016/S0167-8655(02)00402-6
10.1007/s11554-017-0719-y
10.3390/sym8060041
10.1109/LSP.2006.870357
10.3390/app8112199
10.1049/iet-ipr.2011.0059
10.1109/TIFS.2010.2041812
10.1007/s11432-014-5073-0
10.1080/01969722.2016.1214459
10.1007/s11042-019-7166-7
10.1109/TIFS.2017.2710946
10.1016/j.sigpro.2014.08.022
10.1080/13682199.2017.1355089
10.1016/j.sigpro.2009.08.010
10.1016/j.cose.2014.07.008
10.1109/ACCESS.2019.2960254
10.1049/ip-vis:20059022
ContentType Journal Article
Copyright 2021 Elsevier Ltd
Copyright_xml – notice: 2021 Elsevier Ltd
DBID AAYXX
CITATION
DOI 10.1016/j.jisa.2021.102808
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
ExternalDocumentID 10_1016_j_jisa_2021_102808
S221421262100048X
GroupedDBID --M
.~1
1~.
4.4
457
4G.
5VS
7-5
8P~
AACTN
AAEDT
AAEDW
AAFJI
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXUO
AAYFN
ABBOA
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFS
ACRLP
ACZNC
ADBBV
ADEZE
AEBSH
AEKER
AFKWA
AFTJW
AGHFR
AGUBO
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
AKYCK
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOMHK
AOUOD
AVARZ
AXJTR
BKOJK
BLXMC
EBS
EFJIC
EFLBG
EJD
FDB
FIRID
FNPLU
FYGXN
GBLVA
GBOLZ
KOM
M41
MO0
OAUVE
P-8
P-9
PC.
PRBVW
RIG
ROL
SPC
SPCBC
SSB
SSO
SSV
SSZ
T5K
~G-
AATTM
AAXKI
AAYWO
AAYXX
ACLOT
ACVFH
ADCNI
AEIPS
AEUPX
AFJKZ
AFPUW
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
ID FETCH-LOGICAL-c300t-7c156c68e7dba3bdf23f19cac9a95d73bda26146624e7350a14a0ba137d2bd503
ISICitedReferencesCount 41
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000647708400002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2214-2126
IngestDate Tue Nov 18 21:26:22 EST 2025
Wed Nov 05 20:43:46 EST 2025
Fri Feb 23 02:47:08 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Image steganography
Steganalysis
Pixel value differencing (PVD)
Modulus function (MF)
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c300t-7c156c68e7dba3bdf23f19cac9a95d73bda26146624e7350a14a0ba137d2bd503
ParticipantIDs crossref_citationtrail_10_1016_j_jisa_2021_102808
crossref_primary_10_1016_j_jisa_2021_102808
elsevier_sciencedirect_doi_10_1016_j_jisa_2021_102808
PublicationCentury 2000
PublicationDate May 2021
2021-05-00
PublicationDateYYYYMMDD 2021-05-01
PublicationDate_xml – month: 05
  year: 2021
  text: May 2021
PublicationDecade 2020
PublicationTitle Journal of information security and applications
PublicationYear 2021
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Lu, Tseng, Wu (bib0014) 2015; 108
Fridrich, Kodovsky (bib0036) 2012; 7
Mandal, J. K., & Das, D. (2012). Steganography using adaptive pixel value differencing (APVD) of gray images through exclusion of overflow/underflow.
USC-SIPI Image Database. [Online]. Available
Rodriguez-Perez, Morales-Reyes, Cumplido, Feregrino-Uribe (bib0034) 2015; 43
Abdulla, Sellahewa, Jassim (bib0004) 2019; 78
Khodaei, Faez (bib0024) 2012; 6
Zhang, Ping, Xu, Wang (bib0033) 2014; 57
Wu, Tsai (bib0017) 2003; 24
Kim, Yoon, Ryu, Jung (bib0020) 2019; 9038650
Liu, Lin, Lee (bib0022) 2019; 78
Maleki, Jalali, Jahan (bib0030) 2014; 15
Gutub, Al-Qahtani, Tabakh (bib0009) 2009
Gu, Guo (bib0005) 2019; 78
Accessed on 12 September 2018.
Hussain, Wahab, W., Javed, Jung (bib0010) 2016; 8
Hameed, Hassaballah, Aly, Awad (bib0027) 2019; 7
Mielikainen (bib0013) 2006; 13
Fridrich, Goljan (bib0011) April 2002; 4675
Hameed, Aly, Hassaballah (bib0018) 2017; 77
Hussain, Wahab, Idris, Ho, Jung (bib0002) 2018; 65
Gutub (bib0007) 2010; 2
Shen, Huang (bib0031) 2015; 48
Wu, Wu, Tsai, Hwang (bib0023) 2005; 152
Cheddad, Condell, Curran, Mc Kevitt (bib0001) 2010; 90
Luo, Huang, Huang (bib0016) 2010; 5
Wu, Hwang (bib0006) 2017; 65
Joo, Lee, Lee (bib0029) 2010; 249826
Ye, Ni, Yi (bib0037) 2017; 12
.
Sharp (bib0012) 2001
Jung (bib0026) 2018; 14
Hussain, Wahab, Ho, Javed, Jung (bib0019) 2017; 50
Zakaria, Hussain, Wahab, Idris, Abdullah, Jung (bib0003) 2018; 8
Liao, Wen, Zhao, Zhang (bib0032) 2012; 118
Wang, Wu, Tsai, Hwang (bib0028) 2008; 81
Pevny, Bas, Fridrich (bib0035) 2010; 5
Abu-Marie, Gutub, Abu-Mansour (bib0008) 2010; 1
Lu, Hsu (bib0015) 2008; 3
Khodaei, Sadeghi, Faez (bib0025) 2016; 47
Liao (10.1016/j.jisa.2021.102808_bib0032) 2012; 118
Pevny (10.1016/j.jisa.2021.102808_bib0035) 2010; 5
Kim (10.1016/j.jisa.2021.102808_bib0020) 2019; 9038650
Maleki (10.1016/j.jisa.2021.102808_bib0030) 2014; 15
Wang (10.1016/j.jisa.2021.102808_bib0028) 2008; 81
Fridrich (10.1016/j.jisa.2021.102808_bib0011) 2002; 4675
Gutub (10.1016/j.jisa.2021.102808_bib0009) 2009
Lu (10.1016/j.jisa.2021.102808_bib0014) 2015; 108
Zakaria (10.1016/j.jisa.2021.102808_bib0003) 2018; 8
Gu (10.1016/j.jisa.2021.102808_bib0005) 2019; 78
Wu (10.1016/j.jisa.2021.102808_bib0017) 2003; 24
Khodaei (10.1016/j.jisa.2021.102808_bib0024) 2012; 6
Cheddad (10.1016/j.jisa.2021.102808_bib0001) 2010; 90
Hussain (10.1016/j.jisa.2021.102808_bib0019) 2017; 50
Khodaei (10.1016/j.jisa.2021.102808_bib0025) 2016; 47
Wu (10.1016/j.jisa.2021.102808_bib0023) 2005; 152
Fridrich (10.1016/j.jisa.2021.102808_bib0036) 2012; 7
Hameed (10.1016/j.jisa.2021.102808_bib0018) 2017; 77
Jung (10.1016/j.jisa.2021.102808_bib0026) 2018; 14
10.1016/j.jisa.2021.102808_bib0021
Ye (10.1016/j.jisa.2021.102808_bib0037) 2017; 12
Abdulla (10.1016/j.jisa.2021.102808_bib0004) 2019; 78
Gutub (10.1016/j.jisa.2021.102808_bib0007) 2010; 2
Rodriguez-Perez (10.1016/j.jisa.2021.102808_bib0034) 2015; 43
Zhang (10.1016/j.jisa.2021.102808_bib0033) 2014; 57
Hussain (10.1016/j.jisa.2021.102808_bib0010) 2016; 8
Liu (10.1016/j.jisa.2021.102808_bib0022) 2019; 78
Lu (10.1016/j.jisa.2021.102808_bib0015) 2008; 3
Shen (10.1016/j.jisa.2021.102808_bib0031) 2015; 48
Wu (10.1016/j.jisa.2021.102808_bib0006) 2017; 65
Mielikainen (10.1016/j.jisa.2021.102808_bib0013) 2006; 13
Joo (10.1016/j.jisa.2021.102808_bib0029) 2010; 249826
Abu-Marie (10.1016/j.jisa.2021.102808_bib0008) 2010; 1
Sharp (10.1016/j.jisa.2021.102808_bib0012) 2001
10.1016/j.jisa.2021.102808_bib0038
Hussain (10.1016/j.jisa.2021.102808_bib0002) 2018; 65
Luo (10.1016/j.jisa.2021.102808_bib0016) 2010; 5
Hameed (10.1016/j.jisa.2021.102808_bib0027) 2019; 7
References_xml – volume: 1
  start-page: 1
  year: 2010
  end-page: 9
  ident: bib0008
  article-title: Image Based Steganography Using Truth Table Based and Determinate Array on RGB Indicator
  publication-title: International Journal of Signal & Image Processing
– volume: 3
  start-page: 626
  year: 2008
  end-page: 631
  ident: bib0015
  article-title: The Technique of Information Hiding Based on Modification Function and LSB Matching
  publication-title: 2008 Eighth International Conference on Intelligent Systems Design and Applications
– volume: 8
  start-page: 1
  year: 2016
  end-page: 21
  ident: bib0010
  article-title: Hybrid data hiding scheme using right-most digit replacement and adaptive least significant bit for digital images
  publication-title: Symmetry
– volume: 118
  start-page: 281
  year: 2012
  end-page: 289
  ident: bib0032
  article-title: A novel steganographic method with four-pixel differencing and modulus function
  publication-title: Fundamenta Informaticae
– volume: 6
  start-page: 677
  year: 2012
  end-page: 686
  ident: bib0024
  article-title: New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing
  publication-title: IET Image processing
– reference: Mandal, J. K., & Das, D. (2012). Steganography using adaptive pixel value differencing (APVD) of gray images through exclusion of overflow/underflow.
– volume: 2
  start-page: 56
  year: 2010
  end-page: 64
  ident: bib0007
  article-title: Pixel Indicator Technique for RGB Image Steganography
  publication-title: Journal of Emerging Technologies in Web Intelligence
– volume: 5
  start-page: 201
  year: 2010
  end-page: 214
  ident: bib0016
  article-title: Edge adaptive image steganography based on LSB matching revisited
  publication-title: IEEE Transactions on information forensics and security
– volume: 65
  start-page: 371
  year: 2017
  end-page: 378
  ident: bib0006
  article-title: A novel LSB data hiding scheme with the lowest distortion
  publication-title: The Imaging Science Journal
– volume: 108
  start-page: 77
  year: 2015
  end-page: 89
  ident: bib0014
  article-title: Dual imaging-based reversible hiding technique using LSB matching
  publication-title: Signal Processing
– volume: 15
  start-page: 115
  year: 2014
  end-page: 127
  ident: bib0030
  article-title: Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function
  publication-title: Egyptian Informatics Journal
– volume: 50
  start-page: 44
  year: 2017
  end-page: 57
  ident: bib0019
  article-title: A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement
  publication-title: Signal Processing: Image Communication
– volume: 14
  start-page: 127
  year: 2018
  end-page: 136
  ident: bib0026
  article-title: Data hiding scheme improving embedding capacity using mixed PVD and LSB on bi plane
  publication-title: Journal of Real-Time Image Processing
– volume: 7
  start-page: 868
  year: 2012
  end-page: 882
  ident: bib0036
  article-title: Rich models for steganalysis of digital images
  publication-title: IEEE Transactions on Information Forensics and Security
– volume: 12
  start-page: 2545
  year: 2017
  end-page: 2557
  ident: bib0037
  article-title: Deep learning hierarchical representations for image steganalysis
  publication-title: IEEE Transactions on Information Forensics and Security
– volume: 7
  start-page: 185189
  year: 2019
  end-page: 185204
  ident: bib0027
  article-title: An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and PVD-LSB Techniques
  publication-title: IEEE Access
– volume: 24
  start-page: 1613
  year: 2003
  end-page: 1626
  ident: bib0017
  article-title: A steganographic method for images by pixel-value differencing
  publication-title: Pattern Recognition Letters
– volume: 78
  start-page: 12157
  year: 2019
  end-page: 12181
  ident: bib0022
  article-title: A digital data hiding scheme based on pixel-value differencing and side match method
  publication-title: Multimedia Tools and Applications
– volume: 57
  start-page: 1
  year: 2014
  end-page: 7
  ident: bib0033
  article-title: Steganalysis by subtractive pixel adjacency matrix and dimensionality reduction
  publication-title: Science China Information Sciences
– volume: 90
  start-page: 727
  year: 2010
  end-page: 752
  ident: bib0001
  article-title: Digital image steganography: Survey and analysis of current methods
  publication-title: Signal processing
– volume: 152
  start-page: 611
  year: 2005
  end-page: 615
  ident: bib0023
  article-title: Image steganographic scheme based on pixel-value differencing and LSB replacement methods
  publication-title: IEE Proceedings-Vision, Image and Signal Processing
– volume: 8
  start-page: 1
  year: 2018
  end-page: 19
  ident: bib0003
  article-title: High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution
  publication-title: Applied Sciences
– volume: 81
  start-page: 150
  year: 2008
  end-page: 158
  ident: bib0028
  article-title: A high quality steganographic method with pixel-value differencing and modulus function
  publication-title: Journal of Systems and Software
– start-page: 400
  year: 2009
  end-page: 403
  ident: bib0009
  article-title: Triple-A: Secure RGB image steganography based on randomization
  publication-title: Computer Systems and Applications, 2009. AICCSA 2009
– volume: 43
  start-page: 9
  year: 2015
  end-page: 16
  ident: bib0034
  article-title: An analysis of computational models for accelerating the subtractive pixel adjacency model computation
  publication-title: Computers & Electrical Engineering
– reference: . Accessed on 12 September 2018.
– volume: 77
  start-page: 14705
  year: 2017
  end-page: 14723
  ident: bib0018
  article-title: An efficient data hiding method based on adaptive directional pixel value differencing (ADPVD)
  publication-title: Multimedia Tools and Applications
– reference: .
– volume: 249826
  start-page: 1
  year: 2010
  end-page: 13
  ident: bib0029
  article-title: Improved steganographic method preserving pixel-value differencing histogram with modulus function
  publication-title: EURASIP Journal on Advances in Signal Processing, 2010
– volume: 65
  start-page: 46
  year: 2018
  end-page: 66
  ident: bib0002
  article-title: Image steganography in spatial domain: A survey
  publication-title: Signal Processing: Image Communication
– volume: 5
  start-page: 215
  year: 2010
  end-page: 224
  ident: bib0035
  article-title: Steganalysis by subtractive pixel adjacency matrix
  publication-title: IEEE Transactions on information Forensics and Security
– volume: 78
  start-page: 17799
  year: 2019
  end-page: 17823
  ident: bib0004
  article-title: Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images
  publication-title: Multimedia Tools and Applications
– start-page: 13
  year: 2001
  end-page: 26
  ident: bib0012
  article-title: An implementation of key-based digital signal steganography
  publication-title: International Workshop on Information Hiding
– volume: 48
  start-page: 131
  year: 2015
  end-page: 141
  ident: bib0031
  article-title: A data hiding scheme using pixel value differencing and improving exploiting modification directions
  publication-title: Computers & Security
– volume: 47
  start-page: 617
  year: 2016
  end-page: 628
  ident: bib0025
  article-title: Adaptive Data Hiding, Using Pixel-Value Differencing and LSB Substitution
  publication-title: Cybernetics and Systems
– volume: 13
  start-page: 285
  year: 2006
  end-page: 287
  ident: bib0013
  publication-title: LSB matching revisited.
– volume: 78
  start-page: 19681
  year: 2019
  end-page: 19695
  ident: bib0005
  publication-title: A study on Subtractive Pixel Adjacency Matrix features.
– volume: 4675
  start-page: 1
  year: April 2002
  end-page: 14
  ident: bib0011
  article-title: Practical steganalysis of digital images: state of the art
– volume: 9038650
  start-page: 1
  year: 2019
  end-page: 11
  ident: bib0020
  article-title: Data-Hiding Scheme Using Multidirectional Pixel-Value Differencing on Colour Images
  publication-title: Security and Communication Networks
– reference: USC-SIPI Image Database. [Online]. Available:
– volume: 77
  start-page: 14705
  issue: 12
  year: 2017
  ident: 10.1016/j.jisa.2021.102808_bib0018
  article-title: An efficient data hiding method based on adaptive directional pixel value differencing (ADPVD)
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-017-5056-4
– volume: 118
  start-page: 281
  issue: 3
  year: 2012
  ident: 10.1016/j.jisa.2021.102808_bib0032
  article-title: A novel steganographic method with four-pixel differencing and modulus function
  publication-title: Fundamenta Informaticae
  doi: 10.3233/FI-2012-714
– ident: 10.1016/j.jisa.2021.102808_bib0021
  doi: 10.5121/csit.2012.2211
– volume: 5
  start-page: 215
  issue: 2
  year: 2010
  ident: 10.1016/j.jisa.2021.102808_bib0035
  article-title: Steganalysis by subtractive pixel adjacency matrix
  publication-title: IEEE Transactions on information Forensics and Security
  doi: 10.1109/TIFS.2010.2045842
– volume: 15
  start-page: 115
  issue: 2
  year: 2014
  ident: 10.1016/j.jisa.2021.102808_bib0030
  article-title: Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function
  publication-title: Egyptian Informatics Journal
  doi: 10.1016/j.eij.2014.06.001
– volume: 81
  start-page: 150
  issue: 1
  year: 2008
  ident: 10.1016/j.jisa.2021.102808_bib0028
  article-title: A high quality steganographic method with pixel-value differencing and modulus function
  publication-title: Journal of Systems and Software
  doi: 10.1016/j.jss.2007.01.049
– volume: 7
  start-page: 868
  issue: 3
  year: 2012
  ident: 10.1016/j.jisa.2021.102808_bib0036
  article-title: Rich models for steganalysis of digital images
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2012.2190402
– volume: 78
  start-page: 12157
  issue: 9
  year: 2019
  ident: 10.1016/j.jisa.2021.102808_bib0022
  article-title: A digital data hiding scheme based on pixel-value differencing and side match method
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-018-6766-y
– start-page: 400
  year: 2009
  ident: 10.1016/j.jisa.2021.102808_bib0009
  article-title: Triple-A: Secure RGB image steganography based on randomization
– volume: 2
  start-page: 56
  issue: 1
  year: 2010
  ident: 10.1016/j.jisa.2021.102808_bib0007
  article-title: Pixel Indicator Technique for RGB Image Steganography
  publication-title: Journal of Emerging Technologies in Web Intelligence
  doi: 10.4304/jetwi.2.1.56-64
– volume: 43
  start-page: 9
  year: 2015
  ident: 10.1016/j.jisa.2021.102808_bib0034
  article-title: An analysis of computational models for accelerating the subtractive pixel adjacency model computation
  publication-title: Computers & Electrical Engineering
  doi: 10.1016/j.compeleceng.2015.01.004
– volume: 3
  start-page: 626
  year: 2008
  ident: 10.1016/j.jisa.2021.102808_bib0015
  article-title: The Technique of Information Hiding Based on Modification Function and LSB Matching
– volume: 24
  start-page: 1613
  issue: 9-10
  year: 2003
  ident: 10.1016/j.jisa.2021.102808_bib0017
  article-title: A steganographic method for images by pixel-value differencing
  publication-title: Pattern Recognition Letters
  doi: 10.1016/S0167-8655(02)00402-6
– volume: 50
  start-page: 44
  year: 2017
  ident: 10.1016/j.jisa.2021.102808_bib0019
  article-title: A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement
  publication-title: Signal Processing: Image Communication
– volume: 14
  start-page: 127
  issue: 1
  year: 2018
  ident: 10.1016/j.jisa.2021.102808_bib0026
  article-title: Data hiding scheme improving embedding capacity using mixed PVD and LSB on bi plane
  publication-title: Journal of Real-Time Image Processing
  doi: 10.1007/s11554-017-0719-y
– volume: 8
  start-page: 1
  issue: 6
  year: 2016
  ident: 10.1016/j.jisa.2021.102808_bib0010
  article-title: Hybrid data hiding scheme using right-most digit replacement and adaptive least significant bit for digital images
  publication-title: Symmetry
  doi: 10.3390/sym8060041
– volume: 13
  start-page: 285
  issue: 5
  year: 2006
  ident: 10.1016/j.jisa.2021.102808_bib0013
  publication-title: LSB matching revisited. IEEE signal processing letters
  doi: 10.1109/LSP.2006.870357
– volume: 8
  start-page: 1
  issue: 11
  year: 2018
  ident: 10.1016/j.jisa.2021.102808_bib0003
  article-title: High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution
  publication-title: Applied Sciences
  doi: 10.3390/app8112199
– volume: 6
  start-page: 677
  issue: 6
  year: 2012
  ident: 10.1016/j.jisa.2021.102808_bib0024
  article-title: New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing
  publication-title: IET Image processing
  doi: 10.1049/iet-ipr.2011.0059
– start-page: 13
  year: 2001
  ident: 10.1016/j.jisa.2021.102808_bib0012
  article-title: An implementation of key-based digital signal steganography
– volume: 5
  start-page: 201
  issue: 2
  year: 2010
  ident: 10.1016/j.jisa.2021.102808_bib0016
  article-title: Edge adaptive image steganography based on LSB matching revisited
  publication-title: IEEE Transactions on information forensics and security
  doi: 10.1109/TIFS.2010.2041812
– volume: 57
  start-page: 1
  issue: 4
  year: 2014
  ident: 10.1016/j.jisa.2021.102808_bib0033
  article-title: Steganalysis by subtractive pixel adjacency matrix and dimensionality reduction
  publication-title: Science China Information Sciences
  doi: 10.1007/s11432-014-5073-0
– volume: 47
  start-page: 617
  issue: 8
  year: 2016
  ident: 10.1016/j.jisa.2021.102808_bib0025
  article-title: Adaptive Data Hiding, Using Pixel-Value Differencing and LSB Substitution
  publication-title: Cybernetics and Systems
  doi: 10.1080/01969722.2016.1214459
– volume: 78
  start-page: 17799
  issue: 13
  year: 2019
  ident: 10.1016/j.jisa.2021.102808_bib0004
  article-title: Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-019-7166-7
– volume: 65
  start-page: 46
  year: 2018
  ident: 10.1016/j.jisa.2021.102808_bib0002
  article-title: Image steganography in spatial domain: A survey
  publication-title: Signal Processing: Image Communication
– volume: 1
  start-page: 1
  issue: 3
  year: 2010
  ident: 10.1016/j.jisa.2021.102808_bib0008
  article-title: Image Based Steganography Using Truth Table Based and Determinate Array on RGB Indicator
  publication-title: International Journal of Signal & Image Processing
– volume: 12
  start-page: 2545
  issue: 11
  year: 2017
  ident: 10.1016/j.jisa.2021.102808_bib0037
  article-title: Deep learning hierarchical representations for image steganalysis
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2017.2710946
– volume: 108
  start-page: 77
  year: 2015
  ident: 10.1016/j.jisa.2021.102808_bib0014
  article-title: Dual imaging-based reversible hiding technique using LSB matching
  publication-title: Signal Processing
  doi: 10.1016/j.sigpro.2014.08.022
– volume: 65
  start-page: 371
  issue: 6
  year: 2017
  ident: 10.1016/j.jisa.2021.102808_bib0006
  article-title: A novel LSB data hiding scheme with the lowest distortion
  publication-title: The Imaging Science Journal
  doi: 10.1080/13682199.2017.1355089
– volume: 4675
  start-page: 1
  year: 2002
  ident: 10.1016/j.jisa.2021.102808_bib0011
  article-title: Practical steganalysis of digital images: state of the art
  publication-title: Security and Watermarking of Multimedia Contents IV, International Society for Optics and Photonics
– ident: 10.1016/j.jisa.2021.102808_bib0038
– volume: 90
  start-page: 727
  issue: 3
  year: 2010
  ident: 10.1016/j.jisa.2021.102808_bib0001
  article-title: Digital image steganography: Survey and analysis of current methods
  publication-title: Signal processing
  doi: 10.1016/j.sigpro.2009.08.010
– volume: 48
  start-page: 131
  year: 2015
  ident: 10.1016/j.jisa.2021.102808_bib0031
  article-title: A data hiding scheme using pixel value differencing and improving exploiting modification directions
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2014.07.008
– volume: 78
  start-page: 19681
  issue: 14
  year: 2019
  ident: 10.1016/j.jisa.2021.102808_bib0005
  publication-title: A study on Subtractive Pixel Adjacency Matrix features. Multimedia Tools and Applications
– volume: 7
  start-page: 185189
  year: 2019
  ident: 10.1016/j.jisa.2021.102808_bib0027
  article-title: An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and PVD-LSB Techniques
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2960254
– volume: 9038650
  start-page: 1
  year: 2019
  ident: 10.1016/j.jisa.2021.102808_bib0020
  article-title: Data-Hiding Scheme Using Multidirectional Pixel-Value Differencing on Colour Images
  publication-title: Security and Communication Networks
– volume: 152
  start-page: 611
  issue: 5
  year: 2005
  ident: 10.1016/j.jisa.2021.102808_bib0023
  article-title: Image steganographic scheme based on pixel-value differencing and LSB replacement methods
  publication-title: IEE Proceedings-Vision, Image and Signal Processing
  doi: 10.1049/ip-vis:20059022
– volume: 249826
  start-page: 1
  year: 2010
  ident: 10.1016/j.jisa.2021.102808_bib0029
  article-title: Improved steganographic method preserving pixel-value differencing histogram with modulus function
  publication-title: EURASIP Journal on Advances in Signal Processing, 2010
SSID ssj0001219523
Score 2.4424691
Snippet Since the inception of pixel value differencing (PVD) image steganography, it has drawn considerable interest among the researchers of this field. However,...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 102808
SubjectTerms Image steganography
Modulus function (MF)
Pixel value differencing (PVD)
Steganalysis
Title Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP
URI https://dx.doi.org/10.1016/j.jisa.2021.102808
Volume 58
WOSCitedRecordID wos000647708400002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: ScienceDirect Freedom Collection 2021
  issn: 2214-2126
  databaseCode: AIEXJ
  dateStart: 20130701
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: false
  ssIdentifier: ssj0001219523
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELaWLQcuvBEtD_nALUoVOw8nxxa2FCTKShS0t-DYDu2ym626D3rkpzNjO9mlhQqQuESRk3GimU-e8XgehLxQgscmN3WoQfmGiUqwzYvSYMjVmeSmqIxWttmEODrKR6Ni2Ot9b3NhVhPRNPnFRXH2X0UNYyBsTJ39C3F3k8IA3IPQ4Qpih-sfCd6m1IZOVTk_XwUK62uA-koHw0-v7HnBdKaXk-U8QL3m4h2nGL0DMv8iG1_GGu1SuZqd6uDg_f7QRQ4Phr8xZ30FVjvX3DfFc5VgN47IO3-OPFnaVUnDWzKwcd7ds2_S1TV4DdQneBxymeqd3T3Mu_FDM5UTPAOwkNzddGRwtg4bdN61NsNmHc4EiyDnLAlBvWabK7Yr9n5l8Xd-iPHuGMMA8AtYlyKP8rWq6wIQP-C8OC1nNq1-dINscZEWeZ9s7b0ZjN5u-OlYkdougd2v-NwrFyZ4-WO_tm82bJbju-S2lw7dcyC5R3qmuU_utI08qF_XH5DPVzBDLWaoxQwFzFCQBfWYoS1mqMUM_QkzdDGjFjMUMWPJADMPyceDwfHLw9C33ghVHEWLUCjY16ssN0JXMq50zeOaFUqqQhapFjAiYeudZBlPjIjTSLJERpVksdC80mkUPyL9ZtaYx4TGjOsszmRSqBqrS0qRikobtBRZlelsm7CWYaXydemxPcqkbAMQxyUyuUQml47J2yToaM5cVZZr305bOZTernQMLQE519Dt_CPdE3Jrje-npL84X5pn5KZaLU7n5889wH4AFDieyQ
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Multi-directional+block+based+PVD+and+modulus+function+image+steganography+to+avoid+FOBP+and+IEP&rft.jtitle=Journal+of+information+security+and+applications&rft.au=Sahu%2C+Aditya+Kumar&rft.au=Swain%2C+Gandharba&rft.au=Sahu%2C+Monalisa&rft.au=Hemalatha%2C+J.&rft.date=2021-05-01&rft.pub=Elsevier+Ltd&rft.issn=2214-2126&rft.volume=58&rft_id=info:doi/10.1016%2Fj.jisa.2021.102808&rft.externalDocID=S221421262100048X
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2214-2126&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2214-2126&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2214-2126&client=summon