CFP last date
20 June 2024
Reseach Article

An Analysis on LSB Image Steganography with Colour Image as Cover

by Amit Chaturvedi, Jahangeer Mohi Ud Din Lone
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 4
Year of Publication: 2018
Authors: Amit Chaturvedi, Jahangeer Mohi Ud Din Lone
10.5120/ijca2018917512

Amit Chaturvedi, Jahangeer Mohi Ud Din Lone . An Analysis on LSB Image Steganography with Colour Image as Cover. International Journal of Computer Applications. 182, 4 ( Jul 2018), 23-28. DOI=10.5120/ijca2018917512

@article{ 10.5120/ijca2018917512,
author = { Amit Chaturvedi, Jahangeer Mohi Ud Din Lone },
title = { An Analysis on LSB Image Steganography with Colour Image as Cover },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2018 },
volume = { 182 },
number = { 4 },
month = { Jul },
year = { 2018 },
issn = { 0975-8887 },
pages = { 23-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number4/29751-2018917512/ },
doi = { 10.5120/ijca2018917512 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:10:22.815944+05:30
%A Amit Chaturvedi
%A Jahangeer Mohi Ud Din Lone
%T An Analysis on LSB Image Steganography with Colour Image as Cover
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 4
%P 23-28
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

LSB-based steganographic methods embed secret messages into the cover image by directly manipulating the least-significant-bit (LSB) plane. Although it is not the best steganographic method, LSB replacement is worth studying because of its large embedding capacity and simplicity. In LSB replacement, the LSB plane is simply replaced with the secret message so that the LSB values carry the hidden message directly. As more and more techniques of hiding information (Steganography) are developed, the methods of detecting the use of steganography (Steganalysis), also advance. Most steganography techniques change the properties of the cover source which increases the probability of detecting the changes. The DCT-M3 algorithm reduces significantly the number of changes in the cover image; the embedding capacity has been improved by 16.7% approximately while maintaining minimum detectability against blind steganalysis schemes. The effectiveness of steganography is measured using three parameters. First, the steganographic technique must provide the maximum information. Second, the embedded data must not be traceable to the viewer. Third, the hidden information should be successfully retrieved at the receiver. It is difficult to recognize the existence of a hidden data in the cover image using the existing methods. This is because embedding is randomly performed in the frequency domain.

References
  1. T. Zhang, W. Li, Y. Zhang, E. Zheng, X. Ping, “Steganalysis of LSB matching based on statistical modeling of pixel difference distributions”, Information Sciences 180 (2010), pp. 4685–4694
  2. Huan Xu, J. Wanga, H. J. Kim, “Near-optimal solution to pair-wise LSB matching via an immune programming strategy”, Information Sciences 180 (2010), pp. 1201–1217
  3. S. Wang, J. Sang, X. Song, X. Niu, “Least Significant Qubit (LSQb) Information Hiding Algorithm for Quantum Image”, Elsevier, Measurement (2015), doi: http://dx.doi.org/10.1016/j.measurement. 2015.05.038
  4. Q. Liu, A. H. Sung, Z. Chen, J. Xu, “Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images”, Elsevier, Pattern Recognition 41 (2008),pp. 56 – 66
  5. D. Lerch-Hostalot, D. Megias, “LSB matching steganalysis based on patterns of pixel differences and random embedding”, Elsevier, Computers & security, Vol. 3 2 ( 2 0 1 3 ), pp. 192-206.
  6. M. Ghebleh, A. Kanso, “A robust chaotic algorithm for digital image steganography”, Elsevier, Communication in Nonlinear Science and Numerical Simulation, Vol. 19 (2014), pp. 1898–1907
  7. D. Zong-yuan, S. Xi, Y. Zhen, “LSB steganalysis of speech data based on distance measure and ML decision”, THE JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOMMUNICATIONS, Volume 14. Issue 3. SeDtember 2007
  8. Wen-Yuan Chen, “Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques”, Elsevier, Applied Mathematics and Computation, Vol. 196 (2008), pp. 40–54
  9. Wen-Yuan Chen, “Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation”, Elsevier, Applied Mathematics and Computation, Vol. 185 (2007), pp. 432–448
  10. M. Chaumont, W. Puech, C. Lahanier, “Securing color information of an image by concealing the color palette”, Elsevier, The Journal of Systems and Software, vol. 86 (2013), pp. 809– 825
  11. V.Nagaraj, Dr. V. Vijayalakshmi and Dr. G. Zayaraz, “Color Image Steganography based on Pixel Value Modification Method Using Modulus Function”, 2013 International Conference on Electronic Engineering and Computer Science, published in Elsevier, IERI Procedia Vol. 4 ( 2013 ), pp. 17 – 24
  12. R. Roy, A. Sarkar, S. Changder, “Chaos based Edge Adaptive Image Steganography”, International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA) 2013, published in Elsevier, Procedia Technology 10 ( 2013 ), pp. 138 – 146
  13. A. Khamrui, J K Mandal, “A Genetic Algorithm based Steganography using Discrete Cosine Transformation (GASDCT)”, International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA) 2013, published in Elsevier, Procedia Technology 10 ( 2013 ) 105 – 111
  14. S. Songa, J. Zhang, X. Liao, J. Du, Q. Wen, “A Novel Secure Communication Protocol Combining Steganography and Cryptography”, presented in the conference of Advanced in Control Engineering and Information Science, published in Elsevier, Procedia Engineering 15 (2011), pp. 2767 – 2772
  15. P.Malathi, T.Gireeshkumar, “Relating the embedding efficiency of LSB Steganography techniques in Spatial and Transform domains”, 6th International Conference On Advances In Computing & Communications, ICACC 2016, 6-8 September 2016, Cochin, India, published in Elsevier, Procedia Computer Science 93 ( 2016 ), pp. 878 – 885
  16. B. Datta, U. Mukherjee, S. K. Bandyopadhyay, “LSB Layer Independent Robust Steganography using Binary Addition”, International Conference on Computational Modeling and Security (CMS 2016), Elsevier, Procedia Computer Science 85 ( 2016 ), pp. 425 – 432
  17. G. Swain, “A steganographic method combining LSB substitution and PVD in a block”, International Conference on Computational Modeling and Security (CMS 2016), Elsevier, Procedia Computer Science 85 ( 2016 ), pp. 39 – 44
  18. Angel Rose A, Sabu M Thampi, “A Secure Verifiable Scheme for Secret Image Sharing”, Second International Symposium on Computer Vision and the Internet (VisionNet’15), Elsevier, Procedia Computer Science, Vol. 58 ( 2015 ), pp. 140 – 150
  19. D. Babya, J. Thomasa, G. Augustine, E. George, N. R. Michael, “A Novel DWT based Image Securing Method using Steganography”, International Conference on Information and Communication Technologies (ICICT 2014), Elsevier, Procedia Computer Science 46 ( 2015 ) 612 – 618
  20. G. S. Issac ,J. Jose, “Secured Transmission Of Image/Video By Performing Reversible Color Transformation”, International Conference on Emerging Trends in Engineering, Science and Technology (ICETEST- 2015), Elsevier, Procedia Technology, Vol. 24 ( 2016 ), pp. 1032 – 1038
  21. A. A. Attaby, Mona F.M. M. Ahmed, A.K. Alsammak, “Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3”, Ain Shams Engineering Journal (2017), ISSN : 2090-4479, pp. 1-10.
Index Terms

Computer Science
Information Sciences

Keywords

LSB image steganography secret message image cover LSB plane hidden information.