Abstract
In this paper we have proposed a new technique of hiding a message on least significant bit of a cover image using different progressions. We have also compared the cover image and stego images with histograms and computed the CPU Time, Mean Square Error (MSE), Peak Signal Noise Ratio (PSNR), Structural Similarity (SSIM) index and Feature similarity index measure (FSIM) of all images with our method and earlier approaches and make an empirical study. Experimental results concluded that our method is more efficient and fast as compared to classical LSB and LSB using prime.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Wolfgang, R., Delp, E.: A watermark for digital images. In: Proceedings of the IEEE International Conference on Image Processing, pp. 219–222 (1996)
Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE Computer 31(2), 26–34 (1998)
Marvel, L.M., Retter, C.T.: A Methodology for Data Hiding Using Images. In: Proceedings of IEEE Military Communications Conference (MILCOM), pp. 1044–1047 (1998)
Anderson, R.J., Petitcolas, F.A.P.: On the Limits of Steganography. IEEE Journal of Selected Areas in Communications 16(4), 474–481 (1998)
Eason, R.O., Kawaguchi, E.: Principle and applications of bpcs-steganography. In: Proceedings of SPIE, vol. 3528, pp. 464–473 (1998)
Fridrich, J., Goljan, M., Du, R.: Reliable Detection of LSB Steganography in Grayscale and Color Images. In: Proceedings of ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, pp. 27–30 (2001)
Lin, C.F., Wang, R.Z., Lin, J.C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern Recognition 34, 671–683 (2001)
Avcibas, I., Memon, N., Sankur, B.: Image Steganalysis with Binary Similarity Measures. In: Proceedings of the International Conference on Image Processing, pp. 24–28 (2002)
Fridrich, J., Goljan, M., Hogeg, D.: Steganalysis of JPEG Images: Breaking the F5 Algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2003)
Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Security and Privacy 1(3), 32–44 (2003)
Hsiao, J.Y., Chang, C.C., Chan, C.-S.: Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition 36, 1583–1595 (2003)
Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recognition Letters 24, 1613–1626 (2003)
Chan, C.K., Cheng, L.M.: Hiding data in images by simple lsb substitution. Pattern Recognition 37, 469–474 (2004)
Kong, X., Wang, Z., You, X.: Steganalysis of Palette Images: Attack Optimal Parity Assignment Algorithm. In: Proceedings of 5th IEEE International Conference on Information, Communications and Signal Processing, pp. 860–864 (2005)
Chang, C.C., Lin, C.Y., Wang, Y.Z.: New image steganographic methods using run-length approach. Information Sciences 176(22), 3393–3408 (2006)
Battisti, F., Carli, M., Neri, A., Egiaziarian, K.: A Generalized Fibonacci LSB Data Hiding Technique. In: 3rd International Conference on Computers and Devices for Communication (CODEC 2006) TEA, Institute of Radio Physics and Electronics, University of Calcutta, December 18-20 (2006)
Forouzan, A.: Cryptography and Network Security, 1st edn. McGraw-Hill, USA (2007)
Sandipan, D., Ajith, A., Sugata, S.: An LSB Data Hiding Technique Using Prime Numbers. In: The Third International Symposium on Information Assurance and Security, Manchester, UK. IEEE CS Press (2007)
Li, Z., Chen, X., Pan, X., Zeng, X.: Lossless data hiding scheme based on adjacent pixel difference. In: Proceedings of the International Conference on Computer Engineering and Technology, pp. 588–592 (2009)
Cheddad, A., et al.: Digital image steganography: Survey and analysis of current methods. Signal Processing 90(3), 727–752 (2010)
Bhattacharyya, S., Khan, A., Nandi, A., Dasmalakar, A., Roy, S., Sanyal, G.: Pixel map-ping method (PMM) based bit plane complexity segmentation (BPCS) steganography. In: 2011 World Congress on Information and Communication Technologies (WICT), pp. 36–41 (2011)
Ghazanfari, K., Ghaemmaghami, S., Khosravi, S.R.: LSB++: An improvement to LSB+ steganography. In: IEEE Region Conference TENCON, pp. 364–368 (2011)
Bansod, S.P., Mane, V.M., Ragha, L.R.: Modified BPCS steganography using Hybrid cryptography for improving data embedding capacity. In: 2012 International Conference on Communication, Information & Computing Technology (ICCICT), pp. 1–6 (2012)
Kamble, M.V.: Information Hiding Technology- A Watermarking: Golden Research Thoughts (April 2012)
Wang, Z., Bovik, A.C.: Mean squared error: love it or leave it? - A new look at signal fidelity measures. IEEE Signal Processing Magazine 26(1), 98–117 (2009)
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: From error visibility to structural similarity. IEEE Transactions on Image Processing 13(4), 600–612 (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Goel, S., Gupta, S., Kaushik, N. (2015). Image Steganography – Least Significant Bit with Multiple Progressions. In: Satapathy, S., Biswal, B., Udgata, S., Mandal, J. (eds) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, vol 328. Springer, Cham. https://doi.org/10.1007/978-3-319-12012-6_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-12012-6_12
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12011-9
Online ISBN: 978-3-319-12012-6
eBook Packages: EngineeringEngineering (R0)