Skip to main content <#maincontent> We will keep fighting for all libraries - stand with us! Internet Archive logo A line drawing of the Internet Archive headquarters building façade. Search icon An illustration of a magnifying glass. Search icon An illustration of a magnifying glass. Upload icon An illustration of a horizontal line over an up pointing arrow. Upload User icon An illustration of a person's head and chest. Sign up | Log in Web icon An illustration of a computer application window Wayback Machine Texts icon An illustration of an open book. Books Video icon An illustration of two cells of a film strip. Video Audio icon An illustration of an audio speaker. Audio Software icon An illustration of a 3.5" floppy disk. Software Images icon An illustration of two photographs. Images Donate icon An illustration of a heart shape Donate Ellipses icon An illustration of text ellipses. More Hamburger icon An icon used to represent a menu that can be toggled by interacting with this icon. Internet Archive Audio Live Music Archive Librivox Free Audio Featured * All Audio * This Just In * Grateful Dead * Netlabels * Old Time Radio * 78 RPMs and Cylinder Recordings Top * Audio Books & Poetry * Computers, Technology and Science * Music, Arts & Culture * News & Public Affairs * Spirituality & Religion * Podcasts * Radio News Archive Images Metropolitan Museum Cleveland Museum of Art Featured * All Images * This Just In * Flickr Commons * Occupy Wall Street Flickr * Cover Art * USGS Maps Top * NASA Images * Solar System Collection * Ames Research Center Software Internet Arcade Console Living Room Featured * All Software * This Just In * Old School Emulation * MS-DOS Games * Historical Software * Classic PC Games * Software Library Top * Kodi Archive and Support File * Vintage Software * APK * MS-DOS * CD-ROM Software * CD-ROM Software Library * Software Sites * Tucows Software Library * Shareware CD-ROMs * Software Capsules Compilation * CD-ROM Images * ZX Spectrum * DOOM Level CD Books Books to Borrow Open Library Featured * All Books * All Texts * This Just In * Smithsonian Libraries * FEDLINK (US) * Genealogy * Lincoln Collection Top * American Libraries * Canadian Libraries * Universal Library * Project Gutenberg * Children's Library * Biodiversity Heritage Library * Books by Language * Additional Collections Video TV News Understanding 9/11 Featured * All Video * This Just In * Prelinger Archives * Democracy Now! * Occupy Wall Street * TV NSA Clip Library Top * Animation & Cartoons * Arts & Music * Computers & Technology * Cultural & Academic Films * Ephemeral Films * Movies * News & Public Affairs * Spirituality & Religion * Sports Videos * Television * Videogame Videos * Vlogs * Youth Media Search the history of over 835 billion web pages on the Internet. Search the Wayback Machine Search icon An illustration of a magnifying glass. Mobile Apps * Wayback Machine (iOS) * Wayback Machine (Android) Browser Extensions * Chrome * Firefox * Safari * Edge Archive-It Subscription * Explore the Collections * Learn More * Build Collections Save Page Now Capture a web page as it appears now for use as a trusted citation in the future. Please enter a valid web address * About * Blog * Projects * Help * Donate * Contact * Jobs * Volunteer * People * Sign up for free * Log in Search metadata Search text contents Search TV news captions Search radio transcripts Search archived web sites Advanced Search * About * Blog * Projects * Help * Donate Donate icon An illustration of a heart shape * Contact * Jobs * Volunteer * People Full text of "EMD Techniques of Image Steganography A Comparative Study " See other formats INTERNATIONAL JOURNAL OF TECHNOLOGICAL EXPLORATION AND LEARNING (IJTEL) www.ijtel.org EMD Techniques of Image Steganography A Comparative Study Mamta Kalra, Parvinder Singh Department of Computer Science & Engineering Deenbandhu Chhoturam University of Science & Technology Abstract — Exploiting Modification Direction (EMD) is a technique to hide secret data into digital images. This paper reviews different EMD techniques to hide the confidential data. The main idea of EMD is to embed secret data into digital image in such a way that it provides high embedding efficiency as compared to the other techniques. The brief introduction of various EMD schemes and their comparisons are presented in this paper. Keywords- Steganography, Exploiting Modification Direction (EMD), Stego image. I. Introduction Since the rise of internet secure data transmission has been a significant problem. The early approach was to secure communications is via data encryption. In data encryption, the content of the message is kept secret whereas sometimes the existence of message is also need to be kept secret. The technique used to implement this is called steganography. Steganography is a technique for hiding secret message into some other medium in such a way that no one can detect the existence of the hidden message. The word steganography is basically derived from two Greek words [1]: Steganos and Graphie, which means covered writing. Therefore steganography is a technique of hiding secret and confidential message in another media such that no one apart from the intended recipient can even detect the presence of the hidden message. The main goal of the steganography is to hide messages inside other messages in such a way that it does not allow any eavesdroppers and attacker to even detect that there is a second secret message present inside that message [2-12]. One way for improving security of the Steganographic system is to reduce the amount of changes inttoduced in the cover object due to embedding secret data i.e. increasing the embedding efficiency of the Steganographic system. Various techniques were designed for this purpose. EMD(Exploiting Modification direction) is one those Steganographic techniques that leads to higher embedding efficiency as compared to other techniques such as run length encoding [13] and matrix encoding [14]. EMD is a method of steganography embedding in digital images in which each secret digit in (2n+l)-ary notational system is carried by n cover pixels and only one cover pixel is either increased by one or decreased by one or remain same. In general, for each group of n cover pixels there are 2n possible ways of alteration. These 2n ways of modification and one case in which no pixel is changed form (2n + 1) different values of a secret digit. The direction of modification of cover pixel is fully exploited that's why it achieves high embedding efficiency as compared to other techniques. Various modifications of EMD are also designed which are given in this paper. The rest of the paper is organized as follows: In section II, concepts of EMD scheme has been explained. Various EMD techniques have been explained and compared in section III. In section IV, the complete paper is concluded. II. EXPLOITING MODIFICATION DIRECTION TECHNIQUE Zhang et al [15] proposed a data hiding method that exploits the modification directions called EMD technique that is used to convert binary secret data into secret digits(d) in (2n+l)-ary notational system such that n pixels can be used to carry one secret digit. In this technique, secret message is firstly converted into secret digits in (2n+l)-ary notational system and then each secret digit are embedded into pixel group (gi,g2, ,g n )- To embed secret digit d, value of extraction function f e is calculated by using (1). fei9v92.--.9n) = (g 1 xl + g 2 x2 + - + g n x nmod (2n+l) (1) If the value of f e is not equal to the secret digit d, only one of the pixels from the pixel group has to be incremented or decremented by one. If both the values are same, then there is no need to change any pixel. And the process is repeated until no secret digit is left. In the extraction procedure, same equation is used for each pixel group (gi,g2, ,g n ) to find out the secret digits and then all the secret digits are converted back into binary notation from (2n+l)-ary notation to find out the secret message. Fig.l. shows the exttaction function matrix for simplest case of n=2, where each square is labeled with its extraction value f e and the f e value of each square and its 2n neighbors are mutually different. After that each secret digit will be mapped to a group. If the value of secret digit d and exttaction value f e are same then no change is required in the group. But both are not same, value of r is calculated using (2). If r