Skip to main content

Image Steganography – Least Significant Bit with Multiple Progressions

  • Conference paper

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 328))

Abstract

In this paper we have proposed a new technique of hiding a message on least significant bit of a cover image using different progressions. We have also compared the cover image and stego images with histograms and computed the CPU Time, Mean Square Error (MSE), Peak Signal Noise Ratio (PSNR), Structural Similarity (SSIM) index and Feature similarity index measure (FSIM) of all images with our method and earlier approaches and make an empirical study. Experimental results concluded that our method is more efficient and fast as compared to classical LSB and LSB using prime.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wolfgang, R., Delp, E.: A watermark for digital images. In: Proceedings of the IEEE International Conference on Image Processing, pp. 219–222 (1996)

    Google Scholar 

  2. Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE Computer 31(2), 26–34 (1998)

    Article  Google Scholar 

  3. Marvel, L.M., Retter, C.T.: A Methodology for Data Hiding Using Images. In: Proceedings of IEEE Military Communications Conference (MILCOM), pp. 1044–1047 (1998)

    Google Scholar 

  4. Anderson, R.J., Petitcolas, F.A.P.: On the Limits of Steganography. IEEE Journal of Selected Areas in Communications 16(4), 474–481 (1998)

    Article  Google Scholar 

  5. Eason, R.O., Kawaguchi, E.: Principle and applications of bpcs-steganography. In: Proceedings of SPIE, vol. 3528, pp. 464–473 (1998)

    Google Scholar 

  6. Fridrich, J., Goljan, M., Du, R.: Reliable Detection of LSB Steganography in Grayscale and Color Images. In: Proceedings of ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, pp. 27–30 (2001)

    Google Scholar 

  7. Lin, C.F., Wang, R.Z., Lin, J.C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern Recognition 34, 671–683 (2001)

    Article  MATH  Google Scholar 

  8. Avcibas, I., Memon, N., Sankur, B.: Image Steganalysis with Binary Similarity Measures. In: Proceedings of the International Conference on Image Processing, pp. 24–28 (2002)

    Google Scholar 

  9. Fridrich, J., Goljan, M., Hogeg, D.: Steganalysis of JPEG Images: Breaking the F5 Algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  10. Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Security and Privacy 1(3), 32–44 (2003)

    Article  Google Scholar 

  11. Hsiao, J.Y., Chang, C.C., Chan, C.-S.: Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition 36, 1583–1595 (2003)

    Article  Google Scholar 

  12. Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recognition Letters 24, 1613–1626 (2003)

    Article  MATH  Google Scholar 

  13. Chan, C.K., Cheng, L.M.: Hiding data in images by simple lsb substitution. Pattern Recognition 37, 469–474 (2004)

    Article  MATH  Google Scholar 

  14. Kong, X., Wang, Z., You, X.: Steganalysis of Palette Images: Attack Optimal Parity Assignment Algorithm. In: Proceedings of 5th IEEE International Conference on Information, Communications and Signal Processing, pp. 860–864 (2005)

    Google Scholar 

  15. Chang, C.C., Lin, C.Y., Wang, Y.Z.: New image steganographic methods using run-length approach. Information Sciences 176(22), 3393–3408 (2006)

    Article  MathSciNet  Google Scholar 

  16. Battisti, F., Carli, M., Neri, A., Egiaziarian, K.: A Generalized Fibonacci LSB Data Hiding Technique. In: 3rd International Conference on Computers and Devices for Communication (CODEC 2006) TEA, Institute of Radio Physics and Electronics, University of Calcutta, December 18-20 (2006)

    Google Scholar 

  17. Forouzan, A.: Cryptography and Network Security, 1st edn. McGraw-Hill, USA (2007)

    Google Scholar 

  18. Sandipan, D., Ajith, A., Sugata, S.: An LSB Data Hiding Technique Using Prime Numbers. In: The Third International Symposium on Information Assurance and Security, Manchester, UK. IEEE CS Press (2007)

    Google Scholar 

  19. Li, Z., Chen, X., Pan, X., Zeng, X.: Lossless data hiding scheme based on adjacent pixel difference. In: Proceedings of the International Conference on Computer Engineering and Technology, pp. 588–592 (2009)

    Google Scholar 

  20. Cheddad, A., et al.: Digital image steganography: Survey and analysis of current methods. Signal Processing 90(3), 727–752 (2010)

    Article  MATH  Google Scholar 

  21. Bhattacharyya, S., Khan, A., Nandi, A., Dasmalakar, A., Roy, S., Sanyal, G.: Pixel map-ping method (PMM) based bit plane complexity segmentation (BPCS) steganography. In: 2011 World Congress on Information and Communication Technologies (WICT), pp. 36–41 (2011)

    Google Scholar 

  22. Ghazanfari, K., Ghaemmaghami, S., Khosravi, S.R.: LSB++: An improvement to LSB+ steganography. In: IEEE Region Conference TENCON, pp. 364–368 (2011)

    Google Scholar 

  23. Bansod, S.P., Mane, V.M., Ragha, L.R.: Modified BPCS steganography using Hybrid cryptography for improving data embedding capacity. In: 2012 International Conference on Communication, Information & Computing Technology (ICCICT), pp. 1–6 (2012)

    Google Scholar 

  24. Kamble, M.V.: Information Hiding Technology- A Watermarking: Golden Research Thoughts (April 2012)

    Google Scholar 

  25. Wang, Z., Bovik, A.C.: Mean squared error: love it or leave it? - A new look at signal fidelity measures. IEEE Signal Processing Magazine 26(1), 98–117 (2009)

    Article  Google Scholar 

  26. Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: From error visibility to structural similarity. IEEE Transactions on Image Processing 13(4), 600–612 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Savita Goel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Goel, S., Gupta, S., Kaushik, N. (2015). Image Steganography – Least Significant Bit with Multiple Progressions. In: Satapathy, S., Biswal, B., Udgata, S., Mandal, J. (eds) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, vol 328. Springer, Cham. https://doi.org/10.1007/978-3-319-12012-6_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12012-6_12

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12011-9

  • Online ISBN: 978-3-319-12012-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics