Skip to main content
Top

2021 | OriginalPaper | Chapter

Image Steganography Using Bit Differencing Technique

Authors : Mudasir Rashid, Bhavna Arora

Published in: Proceedings of Second International Conference on Computing, Communications, and Cyber-Security

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The swift progression of evidence correspondence in contemporary time demands protected communication of data. Steganography obscures personal material in numerous record organisations, for example, photograph, content, sound, and audio–visual, impalpability, payload and vigour are the key complications on the way to steganography. This proposed work would give a nascent procedure that could be used for storing imperative data inside some cover metaphors by means of most significant bits (MSB) of the cover metaphors that have been presented. Firstly, the bits are numbered in increasing order, and bit number 6 is concerned over storing the confidential data which is based on the difference of bits 6 and 7. The result is generated on the basis of the difference whether the resultant bit is same as that of secret bit or not. If the resultant bit is distinct as compared to confidential pixel, the bit number 6 is modified and updated in the original bit. The outcome communicates the suggested model that must give good percentile of improvements in signal-to-noise ratio. Here, picture is fragmented into red, green and blue components where red components used for signalling on the way to store information in green or blue components of the portrait. The proposed method built on most significant bits (MSB) is used for safeguarding the organisation from unauthorised admittance, and the interlopers would not be intelligent to admittance the intimate data.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Khan Z, Shah M, Naeem M, Mahmood T, Khan S, Amin N, Shahzad D (2016) Threshold based steganography: a novel technique for improved payload and SNR. Inte Arab J Inf Technol 13(4):380–386 Khan Z, Shah M, Naeem M, Mahmood T, Khan S, Amin N, Shahzad D (2016) Threshold based steganography: a novel technique for improved payload and SNR. Inte Arab J Inf Technol 13(4):380–386
2.
go back to reference Kadhim IJ, Premaratne P, Vial PJ, Halloran B (2019) Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335:299–326 Kadhim IJ, Premaratne P, Vial PJ, Halloran B (2019) Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335:299–326
3.
go back to reference Mehta AM, Lanzisera S, Pister KSJ (2016) Steganography 802.15.4 wireless communication Mehta AM, Lanzisera S, Pister KSJ (2016) Steganography 802.15.4 wireless communication
4.
go back to reference Morkel T, Eloff JHP, Oliver MS (2015) An over view of image steganography. Information and Computer Security Architecture (CSA) Research Group Morkel T, Eloff JHP, Oliver MS (2015) An over view of image steganography. Information and Computer Security Architecture (CSA) Research Group
5.
go back to reference Chandramoul R, Memon N (2014) Analysis of LSB based image steganography techniques. 0-7803-6725- 1/0 1/$10.00 IEEE Chandramoul R, Memon N (2014) Analysis of LSB based image steganography techniques. 0-7803-6725- 1/0 1/$10.00 IEEE
6.
go back to reference Kaur G, Kochhar A (2012) A steganography implementation based on LSB & DCT. Int J Sci Emerg Technol Latest Trends 4(1):35–41 Kaur G, Kochhar A (2012) A steganography implementation based on LSB & DCT. Int J Sci Emerg Technol Latest Trends 4(1):35–41
7.
go back to reference Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Sig Process 90:727–752 Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Sig Process 90:727–752
8.
go back to reference Kaur N, Bansal A (2014) A review on digital image steganography. (JCS T) Int J Comput Sci Inf Technol 5(6):8135–8137 Kaur N, Bansal A (2014) A review on digital image steganography. (JCS T) Int J Comput Sci Inf Technol 5(6):8135–8137
9.
go back to reference Islam AU, Khalid F, Shah M, Khan Z, Mahmood T, Khan A, Al U, Naeem M (2016) An improved image steganography technique based on MSB using bit differencing. 978-1-5090-2000-3/16/$31.00 ©2016 IEEE Islam AU, Khalid F, Shah M, Khan Z, Mahmood T, Khan A, Al U, Naeem M (2016) An improved image steganography technique based on MSB using bit differencing. 978-1-5090-2000-3/16/$31.00 ©2016 IEEE
10.
go back to reference Li B, He J, Huang J, Shi YQ (2017) A survey on image steganography and steganalysis. J Inf Hiding Multimedia Sig Process 2(2) Li B, He J, Huang J, Shi YQ (2017) A survey on image steganography and steganalysis. J Inf Hiding Multimedia Sig Process 2(2)
11.
12.
go back to reference Pan X, Yan BT, Niu K (2010) Multiclass detect of current steganographic methods for JPEG format based re-stegnography. 978-1-4244-5848-6/10/$26.00 ©2010 IEEE Pan X, Yan BT, Niu K (2010) Multiclass detect of current steganographic methods for JPEG format based re-stegnography. 978-1-4244-5848-6/10/$26.00 ©2010 IEEE
13.
go back to reference Rabie T, Kamel I (2017) High-capacity steganography: a global-adaptive-region discrete cosine transform approach. Multimedia Tools Appl 76:6473–6493 Rabie T, Kamel I (2017) High-capacity steganography: a global-adaptive-region discrete cosine transform approach. Multimedia Tools Appl 76:6473–6493
15.
go back to reference Hamid N, Yahya A, Ahmad RB, Al-Qershi O (2012) Characteristic region based image steganography using speeded-up robust features technique. In: International conference on future communication networks Hamid N, Yahya A, Ahmad RB, Al-Qershi O (2012) Characteristic region based image steganography using speeded-up robust features technique. In: International conference on future communication networks
16.
go back to reference Shah PD, Bichkar RS (2018) A secure spatial domain image steganography using genetic algorithm and linear congruential generator. In: Dash SS et al (eds) International conference on intelligent computing and applications, advances in intelligent systems and computing, vol 632. https://doi.org/10.1007/978-981-10-5520-1_12 Shah PD, Bichkar RS (2018) A secure spatial domain image steganography using genetic algorithm and linear congruential generator. In: Dash SS et al (eds) International conference on intelligent computing and applications, advances in intelligent systems and computing, vol 632. https://​doi.​org/​10.​1007/​978-981-10-5520-1_​12
17.
go back to reference D Bandyopadhyay, Dasgupta K, Mandal JK, Dutta P, Ojha VK, Snášel V (2014) A framework of secured and bio-inspired image steganography using chaotic encryption with genetic algorithm optimization (CEGAO). In: Krömer P et al (eds) Proceedings of the fifth international conference on innovations in bio-inspired computing and applications IBICA. Advances in intelligent systems and computing, vol 303. https://doi.org/10.1007/978-3-319-08156-4_27 D Bandyopadhyay, Dasgupta K, Mandal JK, Dutta P, Ojha VK, Snášel V (2014) A framework of secured and bio-inspired image steganography using chaotic encryption with genetic algorithm optimization (CEGAO). In: Krömer P et al (eds) Proceedings of the fifth international conference on innovations in bio-inspired computing and applications IBICA. Advances in intelligent systems and computing, vol 303. https://​doi.​org/​10.​1007/​978-3-319-08156-4_​27
18.
go back to reference Rahna E, Govindan VK, “A novel technique for secure, lossless steganography with unlimited payload and without exchange of stegoimage. Int J Adv Eng Technol. ISSN: 22311963 Rahna E, Govindan VK, “A novel technique for secure, lossless steganography with unlimited payload and without exchange of stegoimage. Int J Adv Eng Technol. ISSN: 22311963
19.
go back to reference Barhoom TS, Mousa SMA (2015) A steganography LSB technique for hiding image within image using blowfish encryption algorithm. Int J Res Eng Sci (IJRES) 3(3):61–66. ISSN (Online): 2320-9364, ISSN (Print): 2320-9356. www.ijres.org Barhoom TS, Mousa SMA (2015) A steganography LSB technique for hiding image within image using blowfish encryption algorithm. Int J Res Eng Sci (IJRES) 3(3):61–66. ISSN (Online): 2320-9364, ISSN (Print): 2320-9356. www.​ijres.​org
20.
go back to reference Laskar SA, Hemachandran K (2012) High capacity data hiding using LSB steganography and encryption. Int J Database Manag Syst (IJDMS) 4(6) Laskar SA, Hemachandran K (2012) High capacity data hiding using LSB steganography and encryption. Int J Database Manag Syst (IJDMS) 4(6)
21.
go back to reference Al-Qwider WH, Salameh JNB (2017) Novel technique for securing data communication systems by using cryptography and steganography. Jordanian J Comput Inf Technol (JJCIT) 3(2) Al-Qwider WH, Salameh JNB (2017) Novel technique for securing data communication systems by using cryptography and steganography. Jordanian J Comput Inf Technol (JJCIT) 3(2)
22.
go back to reference Khan Z, Shah M, Naeem M, Mahmood T, Khan SNA, Amin NU, Shahzad D Threshold-based steganography: a novel technique for improved payload and SNR. In: IAJIT first online publication Khan Z, Shah M, Naeem M, Mahmood T, Khan SNA, Amin NU, Shahzad D Threshold-based steganography: a novel technique for improved payload and SNR. In: IAJIT first online publication
23.
go back to reference Gayathri C, Kalpana V (2013) Study on image steganography techniques. Int J Eng Technol (IJET) 5(2). ISSN: 0975-4024 Gayathri C, Kalpana V (2013) Study on image steganography techniques. Int J Eng Technol (IJET) 5(2). ISSN: 0975-4024
24.
go back to reference Joshi K, Gill S, Yadav R (2018) A new method of image steganography using 7th bit of a pixel as indicator by introducing the successive temporary pixel in the gray scale image. Hindaw J Comput Netw Commun 2018(9475142):10. https://doi.org/10.1155/2018/9475142 Joshi K, Gill S, Yadav R (2018) A new method of image steganography using 7th bit of a pixel as indicator by introducing the successive temporary pixel in the gray scale image. Hindaw J Comput Netw Commun 2018(9475142):10. https://​doi.​org/​10.​1155/​2018/​9475142
25.
go back to reference Khan M, Muhammad S, Irfan M, Seungmin R, Sung BW (2015) A novel magic LSB substitution method (M LSBSM) using multilevel encryption and achromatic component of an image. Springer, Berlin, Germany Khan M, Muhammad S, Irfan M, Seungmin R, Sung BW (2015) A novel magic LSB substitution method (M LSBSM) using multilevel encryption and achromatic component of an image. Springer, Berlin, Germany
Metadata
Title
Image Steganography Using Bit Differencing Technique
Authors
Mudasir Rashid
Bhavna Arora
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-16-0733-2_59