Analysis of Various Image Steganography Techniques Based Upon PSNR Metric

  IJPTT-book-cover
 
International Journal of P2P Network Trends and Technology (IJPTT)          
 
© 2011 by IJPTT Journal
Volume-1 Issue-2                           
Year of Publication : 2011
Authors : Rajkumar Yadav

MLA

Rajkumar Yadav."Analysis of Various Image Steganography Techniques Based Upon PSNR Metric". International Journal of P2P Network Trends and Technology (IJPTT), V1(2):30-33  Sep - Oct 2011, ISSN:2249-2615, www.ijpttjournal.org. Published by Seventh Sense Research Group.

Abstract

Every common person uses internet directly or indirectly in some spheres of his life. They mainly use the internet for information sharing. Also, information sharing has the primary importance in the field of Military Services, Medical Services, Mobile Services, and Investigation Agencies etc. The main hurdle in the path of information sharing is the security of information. The information security can be achieved by Cryptography and Steganography. But now days, Steganography is the most burnt area. There are lot of research is going on steganography. In this paper, we analyze various image steganography techniques by using peak signal to noise ratio (PSNR) Metric. After analyzing the techniques, we found that 6th, 7th and 8th Bit Method provides highest PSNR values and LSB Method provides lowest PSNR values.

References

[1] Cox, Ingemar, Bloom, Jeffrey, Miller, Matthew, Digital Watermarking: Principles & Practice, 2001, Morgan Kauffman Publishers, ISBN 1- 55860-714-5, ch. 1-2.
[2] Katzenbeisser, S., Petitcolas, F.A.P., Information hiding techniques for steganography and digital watermarking, Artech House Publishers, 2000.
[3] Feng, J. B., Wu, H. C, Tsai, C. S. and Chu, Y. P., “A new multi-secret images sharing scheme using largrange’s interpolation,” Journal of Systems and Software, vol. 76, no. 3, pp. 327–339, June 2005.
[4] Chang, C.C, Lin, I.C, “Remarks on fingerprint- based remote user authentication scheme using smart cards,” ACM Operating Systems Review, vol. 38, no. 3, pp. 91–100, Oct. 2004.
[5] Dugelay, J.L., Roche, S., “A survey of current watermarking techniques,” in Information Hiding Techniques for Steganography and Digital Watermarking, S. Katzenbeisser and F. A. P. Petitcolas, Eds. Norwood, MA: Artech House, 1999, ch. 6.
[6] Shoemaker, C., “Hidden bits: A survey of techniques for digital watermarking”, Independent study, EER 290, spring 2002.
[7] Wang, Y., Doherty, J.F., and Van Dyck, R.E., “A watermarking algorithm for fingerprinting Intelligence images”, Conference on Information Science and Systems, The John Hopkins University, March 21-23, 2001.
[8] S. Moller, A Pfitzmann, and I. Stirand, “Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, At Best.”, in Information Hiding: First International Workshop Proceedings, vol. 1174 of Lecture Notes in Computer Science, pp. 7-21, Springer, 1996.
[9] W. Bender, D. Gruhl, and N. Morimoto, “Techniques for Data Hiding”, Proceedings of the SPIE 2420, Storage and Retrieval for Image and Video Databases III, pp. 164-173, 1995.
[10] A. Hanjalic, G.C. Langelaar, P.M.B. van Roosmalen, J. Biemond, and R.L. Lagendijk, Image and Video Databases: Restoration, Watermarking, and Retrieval, Elsevier, 2000.

Keywords

Steganography, cryptography, LSB, GLM, parity checker etc.