Skip to main content

2021 | OriginalPaper | Buchkapitel

Image Steganography Using Bit Differencing Technique

verfasst von : Mudasir Rashid, Bhavna Arora

Erschienen in: Proceedings of Second International Conference on Computing, Communications, and Cyber-Security

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The swift progression of evidence correspondence in contemporary time demands protected communication of data. Steganography obscures personal material in numerous record organisations, for example, photograph, content, sound, and audio–visual, impalpability, payload and vigour are the key complications on the way to steganography. This proposed work would give a nascent procedure that could be used for storing imperative data inside some cover metaphors by means of most significant bits (MSB) of the cover metaphors that have been presented. Firstly, the bits are numbered in increasing order, and bit number 6 is concerned over storing the confidential data which is based on the difference of bits 6 and 7. The result is generated on the basis of the difference whether the resultant bit is same as that of secret bit or not. If the resultant bit is distinct as compared to confidential pixel, the bit number 6 is modified and updated in the original bit. The outcome communicates the suggested model that must give good percentile of improvements in signal-to-noise ratio. Here, picture is fragmented into red, green and blue components where red components used for signalling on the way to store information in green or blue components of the portrait. The proposed method built on most significant bits (MSB) is used for safeguarding the organisation from unauthorised admittance, and the interlopers would not be intelligent to admittance the intimate data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Khan Z, Shah M, Naeem M, Mahmood T, Khan S, Amin N, Shahzad D (2016) Threshold based steganography: a novel technique for improved payload and SNR. Inte Arab J Inf Technol 13(4):380–386 Khan Z, Shah M, Naeem M, Mahmood T, Khan S, Amin N, Shahzad D (2016) Threshold based steganography: a novel technique for improved payload and SNR. Inte Arab J Inf Technol 13(4):380–386
2.
Zurück zum Zitat Kadhim IJ, Premaratne P, Vial PJ, Halloran B (2019) Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335:299–326 Kadhim IJ, Premaratne P, Vial PJ, Halloran B (2019) Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335:299–326
3.
Zurück zum Zitat Mehta AM, Lanzisera S, Pister KSJ (2016) Steganography 802.15.4 wireless communication Mehta AM, Lanzisera S, Pister KSJ (2016) Steganography 802.15.4 wireless communication
4.
Zurück zum Zitat Morkel T, Eloff JHP, Oliver MS (2015) An over view of image steganography. Information and Computer Security Architecture (CSA) Research Group Morkel T, Eloff JHP, Oliver MS (2015) An over view of image steganography. Information and Computer Security Architecture (CSA) Research Group
5.
Zurück zum Zitat Chandramoul R, Memon N (2014) Analysis of LSB based image steganography techniques. 0-7803-6725- 1/0 1/$10.00 IEEE Chandramoul R, Memon N (2014) Analysis of LSB based image steganography techniques. 0-7803-6725- 1/0 1/$10.00 IEEE
6.
Zurück zum Zitat Kaur G, Kochhar A (2012) A steganography implementation based on LSB & DCT. Int J Sci Emerg Technol Latest Trends 4(1):35–41 Kaur G, Kochhar A (2012) A steganography implementation based on LSB & DCT. Int J Sci Emerg Technol Latest Trends 4(1):35–41
7.
Zurück zum Zitat Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Sig Process 90:727–752 Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Sig Process 90:727–752
8.
Zurück zum Zitat Kaur N, Bansal A (2014) A review on digital image steganography. (JCS T) Int J Comput Sci Inf Technol 5(6):8135–8137 Kaur N, Bansal A (2014) A review on digital image steganography. (JCS T) Int J Comput Sci Inf Technol 5(6):8135–8137
9.
Zurück zum Zitat Islam AU, Khalid F, Shah M, Khan Z, Mahmood T, Khan A, Al U, Naeem M (2016) An improved image steganography technique based on MSB using bit differencing. 978-1-5090-2000-3/16/$31.00 ©2016 IEEE Islam AU, Khalid F, Shah M, Khan Z, Mahmood T, Khan A, Al U, Naeem M (2016) An improved image steganography technique based on MSB using bit differencing. 978-1-5090-2000-3/16/$31.00 ©2016 IEEE
10.
Zurück zum Zitat Li B, He J, Huang J, Shi YQ (2017) A survey on image steganography and steganalysis. J Inf Hiding Multimedia Sig Process 2(2) Li B, He J, Huang J, Shi YQ (2017) A survey on image steganography and steganalysis. J Inf Hiding Multimedia Sig Process 2(2)
11.
12.
Zurück zum Zitat Pan X, Yan BT, Niu K (2010) Multiclass detect of current steganographic methods for JPEG format based re-stegnography. 978-1-4244-5848-6/10/$26.00 ©2010 IEEE Pan X, Yan BT, Niu K (2010) Multiclass detect of current steganographic methods for JPEG format based re-stegnography. 978-1-4244-5848-6/10/$26.00 ©2010 IEEE
13.
Zurück zum Zitat Rabie T, Kamel I (2017) High-capacity steganography: a global-adaptive-region discrete cosine transform approach. Multimedia Tools Appl 76:6473–6493 Rabie T, Kamel I (2017) High-capacity steganography: a global-adaptive-region discrete cosine transform approach. Multimedia Tools Appl 76:6473–6493
15.
Zurück zum Zitat Hamid N, Yahya A, Ahmad RB, Al-Qershi O (2012) Characteristic region based image steganography using speeded-up robust features technique. In: International conference on future communication networks Hamid N, Yahya A, Ahmad RB, Al-Qershi O (2012) Characteristic region based image steganography using speeded-up robust features technique. In: International conference on future communication networks
16.
Zurück zum Zitat Shah PD, Bichkar RS (2018) A secure spatial domain image steganography using genetic algorithm and linear congruential generator. In: Dash SS et al (eds) International conference on intelligent computing and applications, advances in intelligent systems and computing, vol 632. https://doi.org/10.1007/978-981-10-5520-1_12 Shah PD, Bichkar RS (2018) A secure spatial domain image steganography using genetic algorithm and linear congruential generator. In: Dash SS et al (eds) International conference on intelligent computing and applications, advances in intelligent systems and computing, vol 632. https://​doi.​org/​10.​1007/​978-981-10-5520-1_​12
17.
Zurück zum Zitat D Bandyopadhyay, Dasgupta K, Mandal JK, Dutta P, Ojha VK, Snášel V (2014) A framework of secured and bio-inspired image steganography using chaotic encryption with genetic algorithm optimization (CEGAO). In: Krömer P et al (eds) Proceedings of the fifth international conference on innovations in bio-inspired computing and applications IBICA. Advances in intelligent systems and computing, vol 303. https://doi.org/10.1007/978-3-319-08156-4_27 D Bandyopadhyay, Dasgupta K, Mandal JK, Dutta P, Ojha VK, Snášel V (2014) A framework of secured and bio-inspired image steganography using chaotic encryption with genetic algorithm optimization (CEGAO). In: Krömer P et al (eds) Proceedings of the fifth international conference on innovations in bio-inspired computing and applications IBICA. Advances in intelligent systems and computing, vol 303. https://​doi.​org/​10.​1007/​978-3-319-08156-4_​27
18.
Zurück zum Zitat Rahna E, Govindan VK, “A novel technique for secure, lossless steganography with unlimited payload and without exchange of stegoimage. Int J Adv Eng Technol. ISSN: 22311963 Rahna E, Govindan VK, “A novel technique for secure, lossless steganography with unlimited payload and without exchange of stegoimage. Int J Adv Eng Technol. ISSN: 22311963
19.
Zurück zum Zitat Barhoom TS, Mousa SMA (2015) A steganography LSB technique for hiding image within image using blowfish encryption algorithm. Int J Res Eng Sci (IJRES) 3(3):61–66. ISSN (Online): 2320-9364, ISSN (Print): 2320-9356. www.ijres.org Barhoom TS, Mousa SMA (2015) A steganography LSB technique for hiding image within image using blowfish encryption algorithm. Int J Res Eng Sci (IJRES) 3(3):61–66. ISSN (Online): 2320-9364, ISSN (Print): 2320-9356. www.​ijres.​org
20.
Zurück zum Zitat Laskar SA, Hemachandran K (2012) High capacity data hiding using LSB steganography and encryption. Int J Database Manag Syst (IJDMS) 4(6) Laskar SA, Hemachandran K (2012) High capacity data hiding using LSB steganography and encryption. Int J Database Manag Syst (IJDMS) 4(6)
21.
Zurück zum Zitat Al-Qwider WH, Salameh JNB (2017) Novel technique for securing data communication systems by using cryptography and steganography. Jordanian J Comput Inf Technol (JJCIT) 3(2) Al-Qwider WH, Salameh JNB (2017) Novel technique for securing data communication systems by using cryptography and steganography. Jordanian J Comput Inf Technol (JJCIT) 3(2)
22.
Zurück zum Zitat Khan Z, Shah M, Naeem M, Mahmood T, Khan SNA, Amin NU, Shahzad D Threshold-based steganography: a novel technique for improved payload and SNR. In: IAJIT first online publication Khan Z, Shah M, Naeem M, Mahmood T, Khan SNA, Amin NU, Shahzad D Threshold-based steganography: a novel technique for improved payload and SNR. In: IAJIT first online publication
23.
Zurück zum Zitat Gayathri C, Kalpana V (2013) Study on image steganography techniques. Int J Eng Technol (IJET) 5(2). ISSN: 0975-4024 Gayathri C, Kalpana V (2013) Study on image steganography techniques. Int J Eng Technol (IJET) 5(2). ISSN: 0975-4024
24.
Zurück zum Zitat Joshi K, Gill S, Yadav R (2018) A new method of image steganography using 7th bit of a pixel as indicator by introducing the successive temporary pixel in the gray scale image. Hindaw J Comput Netw Commun 2018(9475142):10. https://doi.org/10.1155/2018/9475142 Joshi K, Gill S, Yadav R (2018) A new method of image steganography using 7th bit of a pixel as indicator by introducing the successive temporary pixel in the gray scale image. Hindaw J Comput Netw Commun 2018(9475142):10. https://​doi.​org/​10.​1155/​2018/​9475142
25.
Zurück zum Zitat Khan M, Muhammad S, Irfan M, Seungmin R, Sung BW (2015) A novel magic LSB substitution method (M LSBSM) using multilevel encryption and achromatic component of an image. Springer, Berlin, Germany Khan M, Muhammad S, Irfan M, Seungmin R, Sung BW (2015) A novel magic LSB substitution method (M LSBSM) using multilevel encryption and achromatic component of an image. Springer, Berlin, Germany
Metadaten
Titel
Image Steganography Using Bit Differencing Technique
verfasst von
Mudasir Rashid
Bhavna Arora
Copyright-Jahr
2021
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-16-0733-2_59

Neuer Inhalt