Skip to main content

2021 | OriginalPaper | Buchkapitel

21. Optimized Data Hiding for the Image Steganography Using HVS Characteristics

verfasst von : Sahil Gupta, Naresh Kumar Garg

Erschienen in: Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Steganography algorithms used to secure sensitive data on the Internet. It hides the secret data in the cover image and provides imperceptibility to the attacker. The least significant bit (LSB) is the most preferred data hiding technique in the steganography. In this technique, the least significant bit of the cover image pixel replaced with data bits. In the literature, the data hiding achieved without considering the human visual system (HVS) characteristics that degrade the visual quality of the image. In this paper, the optimized data hiding has done while considering the HVS characteristics. The colour image contains three planes known as the red–green–blue plane. The green plane is the most sensitive, and blue is less sensitive to the human eyes. Thus, in the proposed technique, the green plane used as a reference plane for data hiding in the red and blue planes. In the optimized data hiding technique, the secret data bits match with the cover pixel bits. If the bits match, then the corresponding optimal index determines, else data hiding done in the LSB bits of the cover pixel. After that, the optimal indexes hide in the cover image using a 2-bit LSB technique. In the proposed technique, image smooth and edge region characteristics explored before data hiding. There is a high correlation between the consecutive pixels in the smooth region and the minimum correlation on the edges. Thus, we have matched the secret data bits with the cover pixel bits in the smooth region and hide the optimal indexes on the edges. The experimental results performed on the standard dataset images downloaded from the USC-SIPI image database. The experimental results show that the proposed technique provides better visual quality as compared to the existing techniques.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Baig F, Khan MF, Beg S, Shah T, Saleem K (2016) Onion steganography: a novel layering approach. Nonlinear Dyn 84(3):1431–1446 Baig F, Khan MF, Beg S, Shah T, Saleem K (2016) Onion steganography: a novel layering approach. Nonlinear Dyn 84(3):1431–1446
2.
Zurück zum Zitat Antonio H, Prasad PWC, Alsadoon A (2019) Implementation of cryptography in steganography for enhanced security. Multimedia Tools Appl 78(23):32721–32734 Antonio H, Prasad PWC, Alsadoon A (2019) Implementation of cryptography in steganography for enhanced security. Multimedia Tools Appl 78(23):32721–32734
3.
Zurück zum Zitat Parah SA, Sheikh JA, Assad UI, Bhat GM (2017) Hiding in encrypted images: a three tier security data hiding technique. Multidimension Syst Signal Process 28(2):549–572 Parah SA, Sheikh JA, Assad UI, Bhat GM (2017) Hiding in encrypted images: a three tier security data hiding technique. Multidimension Syst Signal Process 28(2):549–572
4.
Zurück zum Zitat Mukherjee S, Sanyal G (2019) Edge based image steganography with variable threshold. Multimedia Tools Appl 78(12):16363–16388 Mukherjee S, Sanyal G (2019) Edge based image steganography with variable threshold. Multimedia Tools Appl 78(12):16363–16388
5.
Zurück zum Zitat Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimedia Tools Appl 76(6):8597–8626 Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimedia Tools Appl 76(6):8597–8626
6.
Zurück zum Zitat Wang S, Yang B, Niu X (2010) A secure steganography method based on genetic algorithm. J Inf Hiding Multimedia Signal Process 1(1):28–35 Wang S, Yang B, Niu X (2010) A secure steganography method based on genetic algorithm. J Inf Hiding Multimedia Signal Process 1(1):28–35
7.
Zurück zum Zitat Perumal K, Muthusamy S, Gengavel G (2019) Robust multitier spatial domain secured color image steganography in server environment. Cluster Comput 22(5):11285–11293 Perumal K, Muthusamy S, Gengavel G (2019) Robust multitier spatial domain secured color image steganography in server environment. Cluster Comput 22(5):11285–11293
8.
Zurück zum Zitat Mstafa RJ, Elleithy KM (2016) A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes. Multimedia Tools Appl 75(17):10311–10333 Mstafa RJ, Elleithy KM (2016) A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes. Multimedia Tools Appl 75(17):10311–10333
9.
Zurück zum Zitat Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41(14):6123–6130 Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41(14):6123–6130
10.
Zurück zum Zitat Shah PD, Bichkar RS (2018) A secure spatial domain image steganography using genetic algorithm and linear congruential generator. In: International conference on intelligent computing and applications, Springer, Singapore, pp 119–129 Shah PD, Bichkar RS (2018) A secure spatial domain image steganography using genetic algorithm and linear congruential generator. In: International conference on intelligent computing and applications, Springer, Singapore, pp 119–129
11.
Zurück zum Zitat Singh A, Singh H (2015) An improved LSB based image steganography technique for RGB images. In: IEEE international conference on electrical, computer and communication technologies Singh A, Singh H (2015) An improved LSB based image steganography technique for RGB images. In: IEEE international conference on electrical, computer and communication technologies
13.
Zurück zum Zitat Mukherjee N, Paul G, Saha SK (2018) An efficient multi-bit steganography algorithm in spatial domain with two-layer security. Multimedia Tools Appl 77(14):18451–18481 (2018) Mukherjee N, Paul G, Saha SK (2018) An efficient multi-bit steganography algorithm in spatial domain with two-layer security. Multimedia Tools Appl 77(14):18451–18481 (2018)
14.
Zurück zum Zitat Swain G (2018) High capacity image steganography using modified LSB substitution and PVD against pixel difference histogram analysis. Secur Commun Networks Swain G (2018) High capacity image steganography using modified LSB substitution and PVD against pixel difference histogram analysis. Secur Commun Networks
Metadaten
Titel
Optimized Data Hiding for the Image Steganography Using HVS Characteristics
verfasst von
Sahil Gupta
Naresh Kumar Garg
Copyright-Jahr
2021
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-7533-4_21

Neuer Inhalt