Research Article  Open Access
Digital Image Steganography Using EightDirectional PVD against RS Analysis and PDH Analysis
Abstract
The least significant bit (LSB) substitution techniques are detected by RS analysis and the traditional pixel value differencing (PVD) approaches are detected by pixel difference histogram (PDH) analysis. The PVD steganography can escape from PDH analysis by using the edges in multiple directions. This paper proposes a steganography technique by exploiting the edges in eight directions and also using LSB substitution to resist from both RS analysis and PDH analysis. For every 3×3 pixel block the central pixel is embedded with 3 or 4 bits of data by modified LSB substitution technique. Then this new value of the central pixel is utilized to calculate eight difference values with eight neighboring pixels. These eight difference values are used to hide the data. There are two types with regard to two different range tables. Type 1 uses 3 bit modified LSB substitution and range table 1. Type 2 uses 4 bit modified LSB substitution and range table 2. Type 1 and type 2 are also known as variant 1 and variant 2, respectively. Type 1 possesses higher PSNR and type 2 possesses higher hiding capacity.
1. Introduction
The LSB substitution is one of the simplest and wellknown approaches for data hiding. This simplest technique is detected by RS analysis. Wu and Tsai [1] exposed the fact that the edge regions in an image can conceal more amounts of data as compared to the smooth regions. Based on this principle they proposed pixel value differencing (PVD) steganography. The image should be partitioned into different blocks, each of size 1×2 pixels. For a block the difference value between the two pixels is computed and changed to a new value by adding data to it. The PVD technique with block size of 2×2 has been proposed to improve the embedding capacity [2, 3]. In blocks of size 2×2, edges in three directions are considered. Chang and Tseng [4] considered the values of 2, 3, and 4 neighboring pixels, to calculate the pixel value differences. But they did not address the fall in error problem (FIEP). Yang et al. [5] calculated varieties of pixel value differences in 4pixel blocks for data hiding. Hong et al. [6] used diamond encoding with pixel value differencing to achieve better PSNR. LSB substitution techniques offer higher embedding capacity, but PVD techniques offer higher imperceptibility. Thus PVD and LSB techniques have been combined to obtain larger hiding capacity and better imperceptibility [7, 8]. Chen [9] proposed a PVD steganography using two reference tables to randomize the data embedding. Khodaei and Faez [10] proposed a hybrid approach by combining LSB substitution and PVD in 1×3 pixel block. It was further extended to 2×2 size block in [11] to achieve better performance. Based on pixel value differences adaptive LSB substitution has been performed in [12, 13].
The traditional PVD steganography techniques follow a static range table. Due to this some undesired steps are introduced in pixel difference histograms of the stego images. This step effects can be avoided by applying two tricks, (i) exploiting the edges in multiple directions and (ii) using adaptive range table. Luo et al. [14] also proposed an adaptive PVD steganography with threepixel blocks, which does not suffer with the step effects. Swain [15] proposed two adaptive PVD steganography techniques using vertical, horizontal, and diagonal edges, which do not suffer from step effects. The first technique uses pixel blocks of size 2×2 and the second technique uses pixel blocks of size 3×3. In general, adaptive image steganography schemes possess lower hiding capacity. The edges can be predicted by some prediction functions and hiding capacity depends upon this prediction. If we hide in smooth regions distortion will be more. Based on the level of complexity of the edge regions, adaptive embedding can be applied [16]. In this way capacity can be increased and chance of detection can be decreased. Balasubramanian et al. [17] published PVD schemes with 3×3 size pixel blocks, to achieve higher hiding capacity. To prevent the detection from pixel difference histogram (PDH) analysis, multidirectional edges have been exploited in [18]. Darabkh et al. [19] also proposed PVD steganography using eightdirectional PVD which is an extension from Wu and Tsai’s original PVD. A PVD steganography technique which is an extension of Wu and Tsai’s PVD approach should be verified by PDH analysis. Gulve and Joshi [20] used PVD with LSB in sixpixel blocks to achieve higher embedding capacity. In one of the six pixels LSB substitution was applied. Then five differences were calculated and based on these differences PVD approach was applied.
Zhang and Wang [21] proposed exploiting modification direction (EMD) steganography. The main goal in it is that a group of secret bits is converted to a digit in (2n+1)ary notational system, where n is the size of pixel block. This secret digit could be hidden in the pixel block by adding ±1 to only one pixel. In this technique the hiding capacity is not good. Kim [22] advanced the EMD technique using basis vector and )ary notational system, where n and x are user defined values. Shen and Huang [23] made the hiding capacity of a block adaptive using PVD with EMD to achieve higher hiding capacity and better PSNR. Nguyen et al. [24] used multiple bit planes and pixel block complexity measure to perform adaptive embedding. In this method more number of bits is hidden in high textured regions as compared to low textured regions. In [25] the steganography algorithm uses a public key and a private key to generate pseudo random numbers that identify the embedding locations.
This paper proposes a combination of modified LSB substitution and eightdirectional PVD in 3×3 pixel blocks. It is judiciously designed in such a manner that it can neither be detected by RS analysis nor be detected by PDH analysis. Furthermore Wu and Tsai’s PVD principle is not used.
2. Proposed EightDirectional PVD Technique
The embedding algorithm operates on 3×3 pixel blocks. The blocks are formed in a nonoverlapping manner. Let us denote a typical block as in Figure 1(a). The central pixel is and its surrounding pixels are , , , , , , , and . In central pixel t bit LSB substitution is performed. For type 1, the t value is 3 and range table is Table 1. For type 2, the t value is 4 and the range table is Table 2.


(a)
(b)
After performing t bit LSB substitution in , the stego value is . Suppose the integer (decimal) value of t LSB bits in is and the integer (decimal) value of t LSB bits in is . Now find the deviation, dev =  . Furthermore calculate a modified value of as in Using this modified value , calculate eight difference values , for i= 1 to 8 as in The difference value belongs to one of the six ranges. Suppose the lower bound is denoted as and hiding capacity as for the range of . Similarly , , , , , , and are the lower bounds and , , , , , , and are the hiding capacities of the ranges of , , , , , , and , respectively.
Now take , , , , , , , and bits of data separately and convert to their decimal values , , , , , , , and , respectively.
Now for i=1 to 8, calculate new difference values using For i = 1 to 8 a pair of new values for each is calculated as in Now out of two new values and , one value is chosen for using Thus the stego pixel block after hiding t, , , , , , , , and bits of data in pixels , , , , , , , , and , respectively, is as shown in Figure 1(b).
The extraction algorithm operates on 3×3 pixel blocks as in embedding algorithm. The blocks are formed in a nonoverlapping manner. A typical stego block is represented in Figure 1(b). Retrieve the t LSBs from . For i=1 to 8, find eight difference values as in Each belongs to a range whose embedding capacity is and lower bound is . For i=1 to 8, find the decimal values of the embedded secret bit streams using Now convert , , , , , , , and into , , , , , , , and binary bits, respectively.
The correctness of the extraction procedure is justified by the following mathematical discussions. That means how (8) is derived from (7) is described below.
As per (7), .
From (6), is , if . Otherwise is . So, can be defined as in From (4) and (5), =  and = + , respectively. Substituting these values of and in (9), (10) is obtained.Equation (10) can be simplified as From (3), + . Substituting on right hand side of (11), (12) is obtained. From (12), it can be concluded that + or = . This is nothing but (8) used in extraction procedure. Thus correctness of (8) is justified.
3. Examples for Embedding and Extraction
Figure 2 represents an example of embedding for type 1 with t=3 of the proposed technique. It is selfexplanatory. To understand this example it can be traversed from left to right and top to bottom.
Figure 3 represents an example of extraction for type 1 with t=3 of the proposed technique. It is selfexplanatory. To understand this example it can be traversed from left to right and top to bottom.
4. Results and Discussion
The embedding and extraction algorithms are simulated in MATLAB. Standard RGB color images from SIPI image data base are used for testing. The R, G, and B components (each 8 bits) of a pixel are treated as a single unit. For eight sample images the results are discussed and averaged. Figure 4 shows the original images, Figure 5 shows the stego images of type 1, and Figure 6 shows the stego images of type 2. In each of these stego images seven lakhs (700,000) bits of data is hidden. The evaluation parameters are (i) hiding capacity; (ii) bit rate (BPB); (iii) PSNR and quality index (Q). The hiding capacity is the total number of bits that an image can conceal. The bits per byte (BPB) indicate the average hiding capacity per a byte of the original image. Equation (13) is used to calculate BPB. Distortion in stego image is measured in terms of PSNR. Equation (14) is used to calculate it. where MSE denotes the mean square error and can be computed using where is a pixel of cover image and is the corresponding stego pixel.
(a) Pot
(b) House
(c) Boat
(d) Jet
(e) Peppers
(f) Tiffany
(g) Baboon
(h) Lena
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
The quality index (Q) is another parameter to measure the structural similarity between original image and stego image. Equation (16) is used to compute it. The maximum value of Q can be 1, if original image, p, and stego image, q, are the same.where stands for the mean pixel value of the original image, stands for the mean pixel value of the stego image, stands for the standard deviation of pixel values of original image, stands for the standard deviation of pixel values of stego image, and is the covariance between original image and stego image. Equations (17), (18), (19), (20), and (21) are used to calculate these values.
Table 3 notes the results of sevenway PVD [18] which is an extension of Wu and Tsai’s [1] technique. Table 4 notes the results of Khodaei and Faez’s technique [10] and Table 5 notes the results of the proposed technique. The PSNR and capacity of the proposed technique (both type 1 and type 2) are better than sevenway PVD. The bit rate and Q are also better. Although as compared to Khodaei and Faez’s technique the PSNR is not improved, but the hiding capacity is improved. The major advantage over Khodaei and Faez’s technique is that the proposed technique is resistant to PDH analysis, but Khodaei and Faez’s technique is detectable by PDH analysis. This is made possible by exploiting the edges in eight directions.



Now let us observe the results of proposed technique and compare type 1 and type 2. We can observe that the capacity is higher in type 2 as compared to type 1. This is because of the 4 LSBs substitution in type 2 at the central pixel; i.e., the t value is 4. On the other hand the PSNR of type 1 is better than that of type 2.
Table 6 represents the comparison of the proposed technique with the adaptive PVD technique in [26] and hybrid techniques in [27, 28]. The comparison parameters are average PSNR and average hiding capacity values. The two variants of adaptive PVD technique possess lesser hiding capacity as compared to the proposed eightdirectional PVD. As the hiding capacity of adaptive PVD [26] is very little, so PSNR is larger. The hybrid technique proposed in [27] is a combination of PVD, LSB and EMD. The hiding capacity of proposed technique is greater than all the four variants of the hybrid technique proposed in [27]. The technique in [28] uses PVD with modified LSB (MLSB) substitution. The results of this technique (type 1) are as good as the results of the proposed technique (type 1). Similarly, the results of this technique (type 2) are as good as the results of the proposed technique (type 2).

5. Security Analysis
The LSB substitution techniques suffer from RS analysis and PVD techniques suffer from PDH analysis. The proposed technique uses the concepts like modified LSB substitution and PVD, so it must be analyzed by both RS analysis and PDH analysis.
The PDH analysis is performed by calculating the difference value between every pair of pixels. A pair comprises two consecutive pixels. This difference values will be from 255 to +255 including 0. The frequency of each of these difference values is counted. A graph is plotted, with the pixel difference value on Xaxis and frequency on Yaxis. The curve obtained is called the PDH. The PDH of original image will be a smooth curve. If the PDH of stego image is also a smooth curve then steganography is not detected. If the PDH of stego image shows step effects, then steganography is identified.
Figure 7 is the PDH analysis of type 1 and Figure 8 is the PDH analysis of type 2 of the proposed technique. The analysis is carried over all the eight test images. For each image the PDH of the original image is represented by solid line and the PDH of the stego image is represented by dotted line. The solid line curves will be obviously free of step effects as they are of the original images. The dotted line curves in all the sixteen cases do not show any step effects. This justifies that the proposed technique is resistant to PDH analysis.
The RS analysis is based on statistical measures. It is done in the following manner. Define a function F_{1} : 2n ↔2n+1. It defines two transformations, (i) from value 2n to value 2n + 1 and (ii) from value 2n + 1 to value 2n. Similarly, define another function F_{−1} : 2n ↔2n 1. It defines other two transformations, (i) from value 2n to value 2n – 1 and (ii) from value 2n  1 to value 2n. The image, say M, is divided into a number of equal size blocks. Suppose such a block is G whose pixels are . Then use the function f(= to measure the smoothness of G. Then apply F_{1} to all the blocks of M and define the two parameters and as in (22) and (23). Similarly, apply to all the blocks of M and define the two parameters and as in (24) and (25).
RS analysis is performed by using these four parameters. If the condition ≈ > ≈ is true, then RS analysis fails to detect the steganography technique. But if the condition  >  is true, then the RS analysis succeeds in detecting the steganography technique.
Figure 9 represents RS analysis for the proposed technique. Figures 9(a) and 9(b) stand for RS analysis over Lena and Baboon images, respectively, of type 1. Similarly, Figures 9(c) and 9(d) stand for RS analysis over Lena and Baboon images, respectively, of type 2. In all the four cases the condition ≈ > ≈ is true, so we can conclude that RS analysis could not detect the proposed technique. Lena image has more smooth regions and Baboon image has more edge regions; all the remaining six images are in between these two in terms of smoothness. So it is sufficient to draw a conclusion based on these two images.
(a) Type 1, Lena
(b) Type 1, Baboon
(c) Type 2, Lena
(d) Type 2, Baboon
6. Conclusion
The traditional PVD steganography techniques follow a static range table. Due to this some undesired steps are introduced in pixel difference histograms of the stego images. This step effect could be avoided by exploiting edges in eight different directions. This paper proposes a steganography technique using a judicious combination of LSB substitution and eightdirectional PVD. The LSB substitution is performed only in one pixel out of nine pixels in a block, so RS analysis cannot detect it. By using the edges in multiple directions the PDH analysis cannot detect it. There exist two types of the proposed technique, with regard to two different quantization tables. The type 1 provides higher PSNR and the type 2 provides higher hiding capacity. This proposed technique performs better in terms of hiding capacity and PSNR over other competing PVD techniques.
Conflicts of Interest
The author declares that there are no conflicts of interest.
References
 D.C. Wu and W.H. Tsai, “A steganographic method for images by pixelvalue differencing,” Pattern Recognition Letters, vol. 24, no. 910, pp. 1613–1626, 2003. View at: Publisher Site  Google Scholar
 K. C. Chang, C. P. Chang, P. S. Huang, and T. M. Tu, “A novel image steganographic method using triway pixelvalue differencing,” Journal of Multimedia, vol. 3, no. 2, pp. 37–44, 2008. View at: Publisher Site  Google Scholar
 Y.P. Lee, J.C. Lee, W.K. Chen, K.C. Chang, I.J. Su, and C.P. Chang, “Highpayload image hiding with quality recovery using triway pixelvalue differencing,” Information Sciences, vol. 191, pp. 214–225, 2012. View at: Publisher Site  Google Scholar
 C.C. Chang and H.W. Tseng, “A steganographic method for digital images using side match,” Pattern Recognition Letters, vol. 25, no. 12, pp. 1431–1437, 2004. View at: Publisher Site  Google Scholar
 C.H. Yang, C.Y. Weng, H.K. Tso, and S.J. Wang, “A data hiding scheme using the varieties of pixelvalue differencing in multimedia images,” The Journal of Systems and Software, vol. 84, no. 4, pp. 669–678, 2011. View at: Publisher Site  Google Scholar
 W. Hong, T.S. Chen, and C.W. Luo, “Data embedding using pixel value differencing and diamond encoding with multiplebase notational system,” The Journal of Systems and Software, vol. 85, no. 5, pp. 1166–1175, 2012. View at: Publisher Site  Google Scholar
 H. C. Wu, N. I. Wu, C. S. Tsai, and M.S. Hwang, “Image steganographic scheme based on pixelvalue differencing and LSB replacement methods,” IEE Proceedings—Vision, Image and Signal Processing, vol. 152, no. 5, pp. 611–615, 2005. View at: Publisher Site  Google Scholar
 C.H. Yang, C.Y. Weng, S.J. Wang, and H.M. Sun, “Varied PVD + LSB evading detection programs to spatial domain in data embedding systems,” The Journal of Systems and Software, vol. 83, no. 10, pp. 1635–1643, 2010. View at: Publisher Site  Google Scholar
 J. Chen, “A PVDbased data hiding method with histogram preserving using pixel pair matching,” Signal Processing: Image Communication, vol. 29, no. 3, pp. 375–384, 2014. View at: Publisher Site  Google Scholar
 M. Khodaei and K. Faez, “New adaptive steganographic method using leastsignificantbit substitution and pixelvalue differencing,” IET Image Processing, vol. 6, no. 6, pp. 677–686, 2012. View at: Publisher Site  Google Scholar
 G. Swain, “A steganographic method combining LSB substitution and PVD in a block,” Procedia Computer Science, vol. 85, pp. 39–44, 2016. View at: Publisher Site  Google Scholar
 X. Liao, Q. Wen, and J. Zhang, “A steganographic method for digital images with fourpixel differencing and modified LSB substitution,” Journal of Visual Communication and Image Representation, vol. 22, no. 1, pp. 1–8, 2011. View at: Publisher Site  Google Scholar
 G. Swain, “Digital image steganography using ninepixel differencing and modified LSB substitution,” Indian Journal of Science and Technology, vol. 7, no. 9, pp. 1444–1450, 2014, http://www.indjst.org/index.php/indjst/article/. View at: Google Scholar
 W. Luo, F. Huang, and J. Huang, “A more secure steganography based on adaptive pixelvalue differencing scheme,” Multimedia Tools and Applications, vol. 52, no. 23, pp. 407–430, 2011. View at: Publisher Site  Google Scholar
 G. Swain, “Adaptive pixel value differencing steganography using both vertical and horizontal edges,” Multimedia Tools and Applications, vol. 75, no. 21, pp. 13541–13556, 2016. View at: Publisher Site  Google Scholar
 S. Chakraborty, A. S. Jalal, and C. Bhatnagar, “LSB based non blind predictive edge adaptive image steganography,” Multimedia Tools and Applications, vol. 76, no. 6, pp. 7973–7987, 2017. View at: Publisher Site  Google Scholar
 C. Balasubramanian, S. Selvakumar, and S. Geetha, “High payload image steganography with reduced distortion using octonary pixel pairing scheme,” Multimedia Tools and Applications, vol. 73, no. 3, pp. 2223–2245, 2014. View at: Publisher Site  Google Scholar
 A. Pradhan, K. R. Sekhar, and G. Swain, “Digital image steganography based on seven way pixel value differencing,” Indian Journal of Science and Technology, vol. 9, no. 37, pp. 1–11, 2016. View at: Publisher Site  Google Scholar
 K. A. Darabkh, A. K. AlDhamari, and I. F. Jafar, “A new steganographic algorithm based on multi directional PVD and modified LSB,” Information Technology and Control, vol. 46, no. 1, pp. 16–36, 2017. View at: Google Scholar
 A. K. Gulve and M. S. Joshi, “A high capacity secured image steganography method with five pixel pair differencing and LSB substitution,” International Journal of Image, Graphics and Signal Processing, vol. 7, no. 5, pp. 66–74, 2015. View at: Publisher Site  Google Scholar
 X. Zhang and S. Wang, “Efficient steganographic embedding by exploiting modification direction,” IEEE Communications Letters, vol. 10, no. 11, pp. 781–783, 2006. View at: Publisher Site  Google Scholar
 C. Kim, “Data hiding by an improved exploiting modification direction,” Multimedia Tools and Applications, vol. 69, no. 3, pp. 569–584, 2014. View at: Publisher Site  Google Scholar
 S. Y. Shen and L. H. Huang, “A data hiding scheme using pixel value differencing and improving exploiting modification directions,” Computers & Security, vol. 48, pp. 131–141, 2015. View at: Publisher Site  Google Scholar
 T. D. Nguyen, S. ArchInt, and N. ArchInt, “An adaptive multi bitplane image steganography using block datahiding,” Multimedia Tools and Applications, vol. 75, no. 14, pp. 8319–8345, 2016. View at: Publisher Site  Google Scholar
 A. SoriaLorente and S. Berres, “A secure steganographic algorithm based on frequency domain for the transmission of hidden information,” Security and Communication Networks, vol. 2017, Article ID 5397028, 14 pages, 2017. View at: Publisher Site  Google Scholar
 A. Pradhan, K. R. Sekhar, and G. Swain, “Adaptive PVD steganography using horizontal, vertical, and diagonal edges in sixpixel blocks,” Security and Communication Networks, vol. 2017, Article ID 1924618, 13 pages, 2017. View at: Publisher Site  Google Scholar
 A. Pradhan, K. R. ekhar, and G. Swain, “Digital image steganography using LSB substitution, PVD, and EMD,” Mathematical Problems in Engineering, 2018. View at: Google Scholar
 G. Swain, “High capacity image steganography using modified LSB substitution and PVD against pixel difference histogram analysis,” Security and Communication Networks, 2018. View at: Google Scholar
Copyright
Copyright © 2018 Gandharba Swain. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.