Skip to main content
Erschienen in:
Buchtitelbild

2018 | OriginalPaper | Buchkapitel

A Framework for Pixel Intensity Modulation Based Image Steganography

verfasst von : Srijan Das, Saurav Sharma, Sambit Bakshi, Imon Mukherjee

Erschienen in: Progress in Advanced Computing and Intelligent Engineering

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Secured data transmission is one of the real issues faced in the world of Web. As the measure of data on Web is expanding daily, the importance of data security is also increasing. Several techniques like cryptography, watermarking, steganography are used to enhance the data to be transmitted. This paper uses a novel steganographic algorithm in the spatial domain using the concept of pixel modulation which diminishes the changes that occur in the stego image generated from the cover image. Experimental results and analysis of the observations show the effectiveness of the proposed algorithm. Different metrics like mean square error (MSE), peak to signal ratio (PSNR), bit-plane analysis, and histogram analysis have been used to show the better results of the proposed algorithm over the existing ones.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bhattacharyya, S., Khan, A., Sanyal, G.: DCT difference modulation (DCTDM) image steganography. Int. J. Comput. Inf. Net. Secur. 3, 40–63 (2014) Bhattacharyya, S., Khan, A., Sanyal, G.: DCT difference modulation (DCTDM) image steganography. Int. J. Comput. Inf. Net. Secur. 3, 40–63 (2014)
2.
Zurück zum Zitat Bhattacharyya, S., Sanyal, G.: A robust image steganography using DWT difference modulation (DWTDM). Int. J. Comput. Netw. Inf. Secur. 4, 27–40 (2012) Bhattacharyya, S., Sanyal, G.: A robust image steganography using DWT difference modulation (DWTDM). Int. J. Comput. Netw. Inf. Secur. 4, 27–40 (2012)
3.
Zurück zum Zitat Mukherjee, I., Datta, B., Banerjee, R., Das, S.: DWT Difference Modulation Based Novel Steganographic Algorithm. In: Jajodia, S., Majumdar, C. (eds.) ICISS 2015, vol. 9478, pp. 573–582. LNCS, Springer, Kolkata, Dec 2015 Mukherjee, I., Datta, B., Banerjee, R., Das, S.: DWT Difference Modulation Based Novel Steganographic Algorithm. In: Jajodia, S., Majumdar, C. (eds.) ICISS 2015, vol. 9478, pp. 573–582. LNCS, Springer, Kolkata, Dec 2015
4.
Zurück zum Zitat Sravanthi, G.S., Devi, B.S., Riyazoddin, S.M.: A spatial domain image steganography technique based on plane bit substitution method. Glob. J. Comput. Sci. Technol. Graph. Vis. USA 12 (2012) Sravanthi, G.S., Devi, B.S., Riyazoddin, S.M.: A spatial domain image steganography technique based on plane bit substitution method. Glob. J. Comput. Sci. Technol. Graph. Vis. USA 12 (2012)
5.
Zurück zum Zitat Mandal, J.K., Das, D.: Steganography using adaptive pixel value differencing(APVD) of gray images through exclusion of overflow/underflow. In: The second International Conference on Computer Science, Engineering and Applications (CCSEA-2012) (2012) Mandal, J.K., Das, D.: Steganography using adaptive pixel value differencing(APVD) of gray images through exclusion of overflow/underflow. In: The second International Conference on Computer Science, Engineering and Applications (CCSEA-2012) (2012)
6.
Zurück zum Zitat Wang, C., Yang, B., Niu, X.: A secure steganography method based on genetic algorithm. J. Inf. Hiding Multimed. Signal Proc. 1, 28–35 (2010) Wang, C., Yang, B., Niu, X.: A secure steganography method based on genetic algorithm. J. Inf. Hiding Multimed. Signal Proc. 1, 28–35 (2010)
7.
Zurück zum Zitat Ker, A.D.: Steganalysis of LSB matching in grayscale images. IEEE Signal Process. Lett. 12(6), 441–444 (2005) Ker, A.D.: Steganalysis of LSB matching in grayscale images. IEEE Signal Process. Lett. 12(6), 441–444 (2005)
8.
Zurück zum Zitat Da-Chun, W., Wen-Hsiang, T.: A steganographic method for images by pixel-value differencing. Pattern Recognit. Lett. 24, 613–626 (2003)MATH Da-Chun, W., Wen-Hsiang, T.: A steganographic method for images by pixel-value differencing. Pattern Recognit. Lett. 24, 613–626 (2003)MATH
9.
Zurück zum Zitat Joo, J.C., Oh, T.W., Lee, H.Y., Lee, H.K.: Adaptive steganographic method using the floor function with practical message formats, international. J. Innov. Comput. Inf. Control 7(1), 161–175 (2011). ISSN 1349-4198 Joo, J.C., Oh, T.W., Lee, H.Y., Lee, H.K.: Adaptive steganographic method using the floor function with practical message formats, international. J. Innov. Comput. Inf. Control 7(1), 161–175 (2011). ISSN 1349-4198
10.
Zurück zum Zitat Dagar, E., Dagar, S.: LSB based image steganography using X-Box mapping. In: IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI), New Delhi, India, 24–27 Sept 2014 Dagar, E., Dagar, S.: LSB based image steganography using X-Box mapping. In: IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI), New Delhi, India, 24–27 Sept 2014
11.
Zurück zum Zitat Das, S.K., Dhara, B.C.: A new secret image sharing with arithmetic coding. In: Proceedings of 2015 IEEE International Conference on Research in Computational Intelligence and Networks, Kolkata, India, pp. 395–399, Nov 2015 Das, S.K., Dhara, B.C.: A new secret image sharing with arithmetic coding. In: Proceedings of 2015 IEEE International Conference on Research in Computational Intelligence and Networks, Kolkata, India, pp. 395–399, Nov 2015
12.
Zurück zum Zitat Deshmukh, P.U., Pattewar, T.M.: A novel approach for edge adaptive steganography on LSB insertion technique. In: IEEE International Conference on Information Communication and Embedded Systems (ICICES), Chennai, India, 27–28 Feb 2014 Deshmukh, P.U., Pattewar, T.M.: A novel approach for edge adaptive steganography on LSB insertion technique. In: IEEE International Conference on Information Communication and Embedded Systems (ICICES), Chennai, India, 27–28 Feb 2014
13.
Zurück zum Zitat Paul, G., Davidson, I., Mukherjee, I., Ravi, S.S.: Keyless steganography in spatial domain using energetic pixels. In: Venkatakrishnan, V., et al. (eds.) Proceedings of the 8-th International Conference on Information Systems Security (ICISS), Guwahati, India, vol. 7671, pp. 134–148. LNCS, Springer, 15–19 Dec 2012. ISBN: 978-3-642-35129-7 Paul, G., Davidson, I., Mukherjee, I., Ravi, S.S.: Keyless steganography in spatial domain using energetic pixels. In: Venkatakrishnan, V., et al. (eds.) Proceedings of the 8-th International Conference on Information Systems Security (ICISS), Guwahati, India, vol. 7671, pp. 134–148. LNCS, Springer, 15–19 Dec 2012. ISBN: 978-3-642-35129-7
14.
Zurück zum Zitat Bas, P., Filler, T., Pevny, T.: Break our steganographic system, the ins and outs of organizing BOSS. Information Hiding, Czech Republic, vol. 6958/2011, pp. 59–70. LNCS, May 2011 Bas, P., Filler, T., Pevny, T.: Break our steganographic system, the ins and outs of organizing BOSS. Information Hiding, Czech Republic, vol. 6958/2011, pp. 59–70. LNCS, May 2011
15.
Zurück zum Zitat Fridrich, J., Lisonek, P., Soukal, D.: On Steganographic Embedding Efficiency, Information Hiding. 8th International Workshop, Alexandria, VA, vol. 4437, pp. 282–296. LNCS (2008) Fridrich, J., Lisonek, P., Soukal, D.: On Steganographic Embedding Efficiency, Information Hiding. 8th International Workshop, Alexandria, VA, vol. 4437, pp. 282–296. LNCS (2008)
16.
Zurück zum Zitat Feng, B., Lu, W., Sun, W.: Secure binary image steganography based on minimizing the distortion on the texture. IEEE Trans. Inf. Forensics Secur. 10(2), 243–255 (2015). FebruaryCrossRef Feng, B., Lu, W., Sun, W.: Secure binary image steganography based on minimizing the distortion on the texture. IEEE Trans. Inf. Forensics Secur. 10(2), 243–255 (2015). FebruaryCrossRef
Metadaten
Titel
A Framework for Pixel Intensity Modulation Based Image Steganography
verfasst von
Srijan Das
Saurav Sharma
Sambit Bakshi
Imon Mukherjee
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-6872-0_1

Neuer Inhalt