Skip to main content

2016 | OriginalPaper | Buchkapitel

An LSB Substitution with Bit Inversion Steganography Method

verfasst von : Nadeem Akhtar

Erschienen in: Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Several works have been proposed and implemented for image Steganography using LSB substitution. In this paper, a module based LSB substitution method is implemented, which is further improved by using a novel bit inversion technique. The substitution method hides the message data after compressing smoother areas of the image in a lossless way, resulting in fewer number of modified cover image pixels. After this, a bit inversion technique is applied. In the bit inversion technique, certain LSBs of pixels of cover image are changed if they occur with a particular pattern. In this way, less number of pixels is modified. So PSNR of stego-image is improved. For correct de-steganography, the bit patterns for which LSBs has inverted needs to be stored within the stego-image somewhere.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sencar, H.T., Ramkumar, M., Akansu, A.N.: Data hiding fundamentals and applications: content security in digital multimedia. Access Online via Elsevier (2004) Sencar, H.T., Ramkumar, M., Akansu, A.N.: Data hiding fundamentals and applications: content security in digital multimedia. Access Online via Elsevier (2004)
2.
Zurück zum Zitat Cox, I., et al.: Digital watermarking and steganography. Morgan Kaufmann (2007) Cox, I., et al.: Digital watermarking and steganography. Morgan Kaufmann (2007)
3.
Zurück zum Zitat Chan, C.K., Cheng, L.M.: Hiding data in image by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)MATHCrossRef Chan, C.K., Cheng, L.M.: Hiding data in image by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)MATHCrossRef
4.
Zurück zum Zitat Chang, C.-C., Tseng, H.W.: Data hiding in images by hybrid LSB substitution. In: International Conference on Multimedia and Ubiquitous Engineering. IEEE (2009) Chang, C.-C., Tseng, H.W.: Data hiding in images by hybrid LSB substitution. In: International Conference on Multimedia and Ubiquitous Engineering. IEEE (2009)
5.
Zurück zum Zitat Akhtar, N., Johri, P., Khan, S.: Enhancing the security and quality of LSB based image steganography. In: IEEE International Conference on Computational Intelligence and Computer Networks (CICN), Mathura, India, 27–29 Sept. 2013 Akhtar, N., Johri, P., Khan, S.: Enhancing the security and quality of LSB based image steganography. In: IEEE International Conference on Computational Intelligence and Computer Networks (CICN), Mathura, India, 27–29 Sept. 2013
6.
Zurück zum Zitat Mohamed, M., Afari, F., Bamatraf, M.: Data hiding by LSB substitution using genetic optimal key-permutation. Int. Arab J. e-Technol. 2.1, 11–17 (2011) Mohamed, M., Afari, F., Bamatraf, M.: Data hiding by LSB substitution using genetic optimal key-permutation. Int. Arab J. e-Technol. 2.1, 11–17 (2011)
8.
Zurück zum Zitat Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: 3rd International Workshop on Information Hiding (IHW 99), pp. 61–76 (1999) Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: 3rd International Workshop on Information Hiding (IHW 99), pp. 61–76 (1999)
9.
Zurück zum Zitat Fridrich, J., Goljan, M., Du, R.: Detecting LSB Steganography in color and gray images. Magazine of IEEE Multimedia (Special Issue on Security), Oct.-Nov. 22–28 (2001) Fridrich, J., Goljan, M., Du, R.: Detecting LSB Steganography in color and gray images. Magazine of IEEE Multimedia (Special Issue on Security), Oct.-Nov. 22–28 (2001)
10.
Zurück zum Zitat Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. Springer LNCS 2578, 355–372 (2003) Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. Springer LNCS 2578, 355–372 (2003)
11.
Zurück zum Zitat Chen, S.-K.: A module-based LSB substitution method with lossless secret data compression. Comput. Stand. Interf. 33(4), 367–371 (2011)MATHCrossRef Chen, S.-K.: A module-based LSB substitution method with lossless secret data compression. Comput. Stand. Interf. 33(4), 367–371 (2011)MATHCrossRef
12.
Zurück zum Zitat Cheddad, A., et al.: Digital image steganography: survey and analysis of current methods. Signal Process. 90.3, 727–752 (2010) Cheddad, A., et al.: Digital image steganography: survey and analysis of current methods. Signal Process. 90.3, 727–752 (2010)
13.
Zurück zum Zitat Akhtar, N., Bano, A., Islam, F.: An improved module based substitution steganography method. In: Fourth IEEE International Conference on Communication Systems and Network Technologies (CSNT), pp. 695–699 (2014) Akhtar, N., Bano, A., Islam, F.: An improved module based substitution steganography method. In: Fourth IEEE International Conference on Communication Systems and Network Technologies (CSNT), pp. 695–699 (2014)
Metadaten
Titel
An LSB Substitution with Bit Inversion Steganography Method
verfasst von
Nadeem Akhtar
Copyright-Jahr
2016
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2538-6_53