TY - JOUR
T1 - Securing secret data by enhancing the controlling expansion method
AU - Ahmad, Tohari
AU - Manek, Siprianus Septian
N1 - Publisher Copyright:
© 2018, ICIC International. All rights reserved.
PY - 2018/11
Y1 - 2018/11
N2 - In order to protect digital data, various methods have been applied. This includes steganography, which has been popular to use. Here, secret data are embedded in a cover medium. Some methods which have been introduced still have problems in certain factors, for example, the quality of the stego data. In this paper, we enhance the present controlling expansion method, which is variant of difference expansion and reduced difference expansion. This improvement is implemented by using an image as the cover. It is done by controlling the new pixel values, such that the difference from their original value is not greater than 2 or 4, for 0 or 1 bit secret message, respectively. In addition, the possible underflow and overflow values are eliminated. Also, different from other existing methods, in the extraction process to obtain the secret message from the stego data, we do not need a location map. The experimental result, which is performed in grayscale images, shows that the proposed method is better than existing ones. It has been able to increase around 3-4 dB of PSNR (Peak Signal to Noise Ratio) on average, for an equivalent size of secret messages.
AB - In order to protect digital data, various methods have been applied. This includes steganography, which has been popular to use. Here, secret data are embedded in a cover medium. Some methods which have been introduced still have problems in certain factors, for example, the quality of the stego data. In this paper, we enhance the present controlling expansion method, which is variant of difference expansion and reduced difference expansion. This improvement is implemented by using an image as the cover. It is done by controlling the new pixel values, such that the difference from their original value is not greater than 2 or 4, for 0 or 1 bit secret message, respectively. In addition, the possible underflow and overflow values are eliminated. Also, different from other existing methods, in the extraction process to obtain the secret message from the stego data, we do not need a location map. The experimental result, which is performed in grayscale images, shows that the proposed method is better than existing ones. It has been able to increase around 3-4 dB of PSNR (Peak Signal to Noise Ratio) on average, for an equivalent size of secret messages.
KW - Data hiding
KW - Data protection
KW - Information security
KW - Network security
KW - Steganography
UR - http://www.scopus.com/inward/record.url?scp=85056818496&partnerID=8YFLogxK
U2 - 10.24507/icicelb.09.11.1091
DO - 10.24507/icicelb.09.11.1091
M3 - Article
AN - SCOPUS:85056818496
SN - 2185-2766
VL - 9
SP - 1091
EP - 1099
JO - ICIC Express Letters, Part B: Applications
JF - ICIC Express Letters, Part B: Applications
IS - 11
ER -