Hiding secret data by using modulo function in quad difference expansion

Yogi Kurniawan, Lidya Amalia Rahmania, Tohari Ahmad, Waskitho Wibisono, Royyana M. Ijtihadie

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Citations (Scopus)

Abstract

In this digital era, protecting sensitive data, such as military and financial data, has been an important factor for preventing attackers from illegally disclosing them. This protection can be done by hiding the secret into digital data (e.g., image, audio) which act as a cover. So, the secret messages cannot be seen easily. It is intended that the attacker is not able to detect the presence of the secret messages, while the authorized receiver is able to get it easily by using the extraction algorithm. A popular method for steganography is Difference Expansion (DE) whose common problem, similar to other methods, is the capacity of the secret which can be hidden and the quality of the stego data. In this paper, we propose to change the secret message into a series of base three numbers and compare it with modulo three of the difference between each quad pixel. The new pixel value is relatively close to its original one because the changes are limited between -2 to +2. The experimental result shows that the image is able to accommodate more secret messages while still maintaining the quality.

Original languageEnglish
Title of host publication2016 International Conference on Advanced Computer Science and Information Systems, ICACSIS 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages433-438
Number of pages6
ISBN (Electronic)9781509046294
DOIs
Publication statusPublished - 6 Mar 2017
Event8th International Conference on Advanced Computer Science and Information Systems, ICACSIS 2016 - Malang, Indonesia
Duration: 15 Oct 201616 Oct 2016

Publication series

Name2016 International Conference on Advanced Computer Science and Information Systems, ICACSIS 2016

Conference

Conference8th International Conference on Advanced Computer Science and Information Systems, ICACSIS 2016
Country/TerritoryIndonesia
CityMalang
Period15/10/1616/10/16

Keywords

  • Data hiding
  • Difference expansion
  • Information security
  • Modulo function

Fingerprint

Dive into the research topics of 'Hiding secret data by using modulo function in quad difference expansion'. Together they form a unique fingerprint.

Cite this