Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
A Novel Image Steganography Method with
Adaptive Number of Least Significant Bits Modification Based on Private Stego-Keys
Yogendra Kumar Jain
Pages - 40 - 49 | Revised - 25-02-2010 | Published - 26-03-2010
MORE INFORMATION
KEYWORDS
Steganography, stego-key, data hiding, digital image, PSNR (Peak-Signal-to-Noise-Ratio)
ABSTRACT
To enhance the embedding capacity of image steganography and provide an imperceptible stego-image for human vision, a novel adaptive number of least significant bits substitution method with private stego-key based on gray-level ranges are proposed in this paper. The new technique embeds binary bit stream in 24-bits color image (Blue channel) or in 8-bits gray-scale image. The method also verifies that whether the attacker has tried to modify the secret hidden (or stego-image also) information in the stego-image. The technique embeds the hidden information in the spatial domain of the cover image and uses simple (Ex-OR operation based) digital signature using 140-bit key to verify the integrity from the stego-image. Besides, the embedded confidential information can be extracted from stego-images without the assistance of original images. The proposed method can embed 4.20 bits in each pixel of gray-scale image and 4.15 bits in each pixel of color image. The presented method gives better results than the existing methods.
1 | Swain, G., & Lenka, S. K. (2015). A novel steganography technique by mapping words with LSB array. International Journal of Signal and Imaging Systems Engineering, 8(1-2), 115-122. |
2 | Manjula, G. R., & Danti, A. (2015). A novel hash based least significant bit (2-3-3) image steganography in spatial domain. arXiv preprint arXiv:1503.03674. |
3 | Deshmukh, M. A. P., & Suralkar, S. R. (2015). Literature Survey-Digital Watermarking on Camera Captured Color Images. |
4 | Amsaveni, A., & Vanathi, P. T. (2015). A comprehensive study on image steganography and steganalysis techniques. International Journal of Information and Communication Technology, 7(4-5), 406-424. |
5 | Sakthivel, S. M., & Ravi Sankar, A. (2015, February). A VLSI architecture for watermarking of grayscale images using weighted median prediction. In Electronics and Communication Systems (ICECS), 2015 2nd International Conference on (pp. 1128-1131). IEEE. |
6 | Thanekar, S. A. (2015). Eight Pixel Pairs Value Differencing Image Steganography. IJETT, 2(1). |
7 | Al-Hada, M., Naser, A. M., & Al-Thamary, M. Hide Image in Image Based on LSB Replacement and Arnold Transform. |
8 | Emam, M. M., Aly, A. A., & Omara, F. A. A Modified Image Steganography Method based on LSB. |
9 | Manjunatha Reddy, H. S. (2014). Design of image steganographic systems for covert communication. |
10 | Kachare, H., & Deshmukh, M. Metamorphic Cryptography: A Fusion of Cryptography and Steganography. International Journal of Engineering and Technical Research (IJETR), 2. |
11 | Venkatesh, K., Shah, S. S. M., Narasimhan, D., Krishnan, R. B., & Raajan, N. R. (2014). A Crypto-Stego Based Approach for Secured Key Transfer. International Journal of Applied Engineering Research, 9(19), 5679-5687. |
12 | Wai, Z., & Than, S. Data Hiding Technique Depended on Pseudorandom Sequences. |
13 | Swain, G. (2014). Digital image steganography using nine-pixel differencing and modified LSB substitution. Indian Journal of Science and Technology, 7(9), 1444-1450. |
14 | Leng, H. S. (2014) information hidden research - using perfect square , mixing with minimal distortion and edge detection function modulus of Information Management Thesis Chaoyang University of Technology , 1-64. |
15 | Hussain, M., & Hussain, M. (2013). A survey of image steganography techniques. |
16 | Swain, G., & Lenka, S. K. (2013). Steganography using two sided, three sided, and four sided side match methods. CSI transactions on ICT, 1(2), 127-133. |
17 | Swain, G. (2013). Steganography in Digital Images Using Maximum Difference of Neighboring Pixel Values. International Journal of Security & Its Applications, 7(6). |
18 | Tayel, M., Shawky, H., & Hafez, A. E. S. (2013, January). A hybrid chaos-fuzzy-threshold steganography algorithm for hiding secure data. In Advanced Communication Technology (ICACT), 2013 15th International Conference on (pp. 156-161). IEEE. |
19 | Thanekar, S., & Pawar, S. S. (2013, December). OCTA (STAR) PVD: A different approach of image steganopgraphy. In Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on (pp. 1-5). IEEE. |
20 | Kaur, R., & Kaur, B. A Study and Review of Techniques of Spatial Steganography. |
21 | Solanki, R., Chuahan, M., & Desai, m. survey of image steganography techniques. |
22 | Elangovan, B., Rajesh, K., & Venkateswari, P. (2013). An Efficient Method for High Secured Image Steganography Using Image Segments. International Journal of Applied Engineering Research, 8(12). |
23 | Sedeeq, I. T. (2013). Steganography in Colored Images. International Journal of Computer Science and Information Security, 11(4), 87. |
24 | G. Swain and S. K. Lenka, “Application Of A Large Key Cipher In Image Steganography By Exploring The Darkest And Brightest Pixels”, International Journal of Computer Science and Communication, 3(1), pp. 49-53, January-June 2012. |
25 | Swain, G., & Lenka, S. K. (2012). A Novel Approach to RGB Channel Based Image Steganography Technique. Int. Arab J. e-Technol., 2(4), 181-186. |
26 | Swain, G., & Lenka, S. K. (2012). LSB array based image steganography technique by exploring the four least significant bits. In Global Trends in Information Systems and Software Applications (pp. 479-488). Springer Berlin Heidelberg. |
27 | Tayel, M., Shawky, H., & Hafez, A. E. D. S. (2012, February). A new chaos steganography algorithm for hiding multimedia data. In Advanced Communication Technology (ICACT), 2012 14th International Conference on (pp. 208-212). IEEE. |
28 | Swain, G., & Lenka, S. K. (2012). A better RGB channel based image steganography technique. In Global Trends in Information Systems and Software Applications (pp. 470-478). Springer Berlin Heidelberg. |
29 | Swain, G., & Lenka, S. K. (2012). A Technique for secret communication using a new block cipher with dynamic steganography. International Journal of Security and Its Applications, 6(2), 1-12. |
30 | Pradhan, A., Sharma, D. S., & Swain, G. (2012). Variable rate steganography in digital images using two, three and four neighbor pixels. Indian Journal of Computer Science and Engineering, 3(3), 457-63. |
31 | Swain, G., & Lanka, S. K. (2012). A quick review of network security and steganography. International Journal of Electronics and Computer Science Engineering, 1(2), 426-435. |
32 | Swain, G., & Lenka, S. K. (2012). Application of a large key cipher in image steganography by exploring the darkest and brightest pixels. Int J Comput Sci Comm, 3(1), 49-53. |
33 | Sonaniya, A. K., & Rai, R. K. (2012). A Review on Comparison between Different Image Steganography Methods. |
34 | M. Hussain, “Efficient Data Hiding Techniques with Enhanced Capacity”, Thesis For The Degree Of Master Of Sciences In Information Technology, Department Of Computer Science, Shaheed Zulfiqar Ali Bhutto Institute Of Sciences And Technology (SZABIST), July, 2011. |
35 | K. V. Ramana, Dr.B.R. Babu and S. C.R. Babu, “A Randomized Secure Data Hiding Algorithm Using File Hybridization for Information Security”, International Journal on Computer Science and Engineering (IJCSE), 3(5), pp. 1878-1889, May 2011. |
36 | Ramana, K. V., Babu, B. R., & Babu, C. R. (2011). A Randomized Secure Data Hiding Algorithm Using File Hybridization for Information Security. International Journal on Computer Science and Engineering, 3(5), 1878-1889. |
37 | Hussain, M. (2011). Efficient Data Hiding Techniques with Enhanced Capacity. |
A. Cheddad, J. Condell, K. Curran and P. McKevitt, “Enhancing Steganography in digital images”, IEEE - 2008 Canadian conference on computer and Robot vision, pp. 326-332, 2008 | |
A. Westfeld, “F5- A steganographic algorithm: High capacity Despite Better Steganalysis”, Proceeding of 4th Int. Information Hiding Workshop, Springer-Verlag, vol. 2137, 2001. | |
Adnan Gutub, Ayed Al-Qahtani, Abdulaziz Tabakh, “Triple - A: Secure RGB Image Steganography Based on Randomization”, IEEE/ACM international conference on computer systems and applications, pp. 400 - 403, 2009. | |
B. Mehboob and R. A. Faruqui, “A steganography Implementation”, IEEE – International symposium on biometrics & security technologies, ISBAST’08, Islamabad, April 2008. | |
D. E. Denning, E. Dorothy, “Information Warfare and Security”, Boston, MA: ACM Press, pp. 310-313, 1999. | |
E.T. Lin, E.J. Delp, “A review of data hiding in images ”, Proceedings of the conference on image processing image quality image capture systems, PICS’99, pp. 274-278, April 1999. | |
F. A. P. Petitcolas, R. J. Anderson, “On the Limit of Steganography”, IEEE J. Sel. Areas Communication, vol. 16, issue 4, pp. 474-481, 1998. | |
F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn, “Information Hiding - A Survey”, Proceeding of the IEEE, vol. 87, issue 7, pp. 1062-1078, July 1999. | |
I. Cox, J. Kilian, T. Leighton and T. Shamoon, “Secure spread spectrum watermarking for multimedia”, IEEE Transaction on Image processing, vol. 6, issue 12, pp. 1673-1687, 1997. | |
J. Zollner, H. Federrath, H. Klimant, et al., “Modeling the Security of Steganographic Systems”, in 2nd Workshop on Information Hiding, Portland, pp. 345-355, April 1998. | |
Jian Zhao, E. Koch, “Embedding Robust Lables into Images for Copyright Protection”, Proceeding of the international Conference on Intellectual property Right for specialized information, Knowledge and New Technologies, Vienna, August 1995. | |
Jiri Fridrich. “A New Steganographic Method for Palette-Based Images”, Center for Intelligent Systems, SUNY Binghamton, Binghamton, NY 13902-6000, U.S Government, a grant number F30602-98-C-0009. | |
K. Ahsan and D. Kundur, “Practical data hiding in TCP/IP”, Proceeding of the workshop on multimedia security at ACM multimedia, 2002. | |
K. S. Babu, K. B. Raja, K. Kiran Kumar, T. H. Manjula Devi, K. R. Venugopal, L. M. Pataki, “Authentication of secret information in image steganography”, IEEE Region 10 Conference, TENCON-2008, pp. 1-6, Nov. 2008. | |
Ko-Chin Chang, Chien-Ping Chang, Ping S. Huang, and Te-ming Tu, “A novel image steganographic method using Tri-way pixel value Differencing”, Journal of multimedia, vol. 3, issue 2, June 2008. | |
M. Kutter, E. Jordan and E. Bossin, “Digital signature of Color images using amplitude modulation”, Journal of Electronics imaging, vol. 7, issue 2, pp. 326-332, 1998. | |
Neil F. Johnson, and Sushil Jajodia, “Exploring Steganography: Seeing the Unseen”, IEEE computer society press vol. 31, issue 2, pp 26-34, Feb. 1998. | |
R. Enayatifar, S. Faridnia, H. Sadeghi, “Using the Chaotic Map in Image Steganography”, IEEE international conference on signal processing systems, pp. 754 - 757, 2009. | |
S. Dumitrescu, W. X. Wu and N. Memon, “On steganalysis of random LSB embedding in continuous-tone images”, Proceeding of International conference on image Processing, Rochester, NY, pp. 641-644, 2002. | |
S. K. Moon and R.S. Kawitkar, “Data Security using Data Hiding”, IEEE International conference on computational intelligence and multimedia applications, vol. 4, pp. 247- 251, Dec. 2007. | |
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data Hiding”, IBM, syst. J., vol. 35, issue 3&4, pp. 313-336, 1996. | |
W. N. Lie and L. C. Chang, ”Data Hiding in images with adaptive numbers of least significant bits based on human visual system”, IEEE international conference on image processing, vol. 1, pp. 286-290, 1999. | |
Associate Professor Yogendra Kumar Jain
Samrat Ashok Technological Institute - India
ykjain_p@yahoo.co.in
|
|
|
|
View all special issues >> | |
|
|