Loading

Image Steganography Built on Pixel Value Difference in Spatial Domain using Range Table
B. Reddaiah1, B. J. Job Karuna Sagar2, B. Susheel Kumar3, G. Sarvani4, A. Sneha sai5

1Reddaiah Buduri*, Yogi Vemana University, Kadapa, Andhra Pradesh, India.
2Job Karuna Sagar B J, Yogi Vemana University, Kadapa, India.
3Susheel Kumar Bodi, Yogi Vemana University, Kadapa, India.
4G. Sarvani, Sri Vivekananda Degree & P.G College for Women, Kadapa, India.
5A. Sneha Sai, Sri Vivekananda Degree & P.G College for Women, Kadapa, India.
Manuscript received on January 23, 2020. | Revised Manuscript received on February 05, 2020. | Manuscript published on February 30, 2020. | PP: 3448-3453 | Volume-9 Issue-3, February 2020. | Retrieval Number:   C6140029320/2020©BEIESP | DOI: 10.35940/ijeat.C6140.029320
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: With the increase of digital transactions, providing security for the network and its devices is a big challenge today. Sensitive information that has more value in the network is to be protected from unauthorized users in accessing it. Various algorithms are being developed to provide security services for the data. In this paper security is provided by using pixel value differencing technique. Valuable data is embedded in each of the component of color like red, blue and green of a pixel in a color image. In addition to that in providing additional security pixel value has been updated conditionally, that would be more complex to trace the incremented or decremented bits in a pixel of the stegoimage. From this experiment the proposed method provides better visual quality of stego image. This proposed algorithm is suitable for small business applications where small size data is important and threats are more common.
Keywords: Security services, pixel, image, pixel value difference, Encryption, Decryption.