Abstract
Pixel selection for data hiding becomes crucial for the solutions in spatial domain of steganography to ensure imperceptibility. This paper presents an efficient approach of pixel selection technique for hiding secret data in cover object of image steganography. After reviewing recent literature, it has been observed that most of the works on pixel selection uses zig-zag technique for their solution. However, it becomes very prone to steganalysis based attacks by the intruders. In this study, 8-directions pixel selection technique is proposed to embed data in the cover image where Least Significant Bit (LSB) method has been used on Red, Green and Blue (RGB) color image especially focused on JPG, JPEG, and PNG. Since this projected procedure avoids the known steganalysis techniques, it will be challenging for the attacker to recognize the presence of secret information from the stego image. To measure the quality, statistical analysis has been performed where the value of the quality measurement matrices has provided better results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Judge, J.C.: Steganography: past, present, future. No. UCRL-ID-151879. Lawrence Livermore National Lab., CA (US) (2001)
Singla, S., Bala, A.: A review: cryptography and steganography algorithm for cloud computing. In: 2018 Second International Conference on Inventive Communication and Computational Technologies, ICICCT, pp. 953–957. IEEE, April 2018
Feng, B., Lu, W., Sun, W.: Binary image steganalysis based on pixel mesh markov transition matrix. J. Vis. Commun. Image Represent. 26, 284–295 (2015)
Chen, J., Lu, W., Fang, Y., Liu, X., Yeung, Y., Xue, Y.: Binary image steganalysis based on local texture pattern. J. Vis. Commun. Image Represent. 55, 149–156 (2018)
Kadhim, I.J.: A new audio steganography system based on auto-key generator. Al-Khwarizmi Eng. J. 8(1), 27–36 (2012)
Feng, B., Weng, J., Lu, W., Pei, B.: Steganalysis of content-adaptive binary image data hiding. J. Vis. Commun. Image Represent. 46, 119–127 (2017)
Ashwin, S., Ramesh, J., Kumar, S.A., Gunavathi, K.: Novel and secure encoding and hiding techniques using image steganography: a survey. In: 2012 International Conference on Emerging Trends in Electrical Engineering and Energy Management, ICETEEEM, pp. 171–177. IEEE, December 2012
Awad, A.: A survey of spatial domain techniques in image steganography. J. Educ. Coll. Wasit Univ. 1(26), 497–510 (2017)
Odeh, A., Elleithy, K., Faezipour, M., Abdelfattah, E.: Novel steganography over HTML code. In: Sobh, T., Elleithy, K. (eds.) Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering. LNEE, vol. 313, pp. 607–611. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-06773-5_81
Thomas, P.: Literature survey on modern image steganographic techniques. Int. J. Eng. Res. Technol. 2, 107–111 (2013)
Nagpal, K.D., Dabhade, P.D.S.: A survey on image steganography and its techniques in spatial and frequency domain. Int. J. Recent Innov. Trends Comput. Commun. 3(2), 776–779 (2015)
Beroual, A., Al-Shaikhli, I.F.: A review of steganographic methods and techniques. Int. J. Perceptive Cogn. Comput. 4(1), 1–6 (2018)
Biradar, R.L., Umashetty, A.: A survey paper on steganography techniques. High Impact Factor 9(1), 721–722 (2016)
Saleh, M.A.: Image steganography techniques - a review paper. Ijarcce 7(9), 52–58 (2018)
Al-Shatnawi, A.M.: A new method in image steganography with improved image quality. Appl. Math. Sci. 6(79), 3907–3915 (2012)
Swain, G.: Very high capacity image steganography technique using quotient value differencing and LSB substitution. Arab. J. Sci. Eng. 44(4), 2995–3004 (2019)
Mahimah, P., Kurinji, R.: Zigzag pixel indicator based secret data hiding method. In: 2013 IEEE International Conference on Computational Intelligence and Computing Research, pp. 1–5. IEEE, December 2013
Sahu, A.K., Swain, G.: A review on LSB substitution and PVD based image steganography techniques. Indonesian J. Electr. Eng. Comput. Sci. 2(3), 712–719 (2016)
Pavani, M., Naganjaneyulu, S., Nagaraju, C.: A survey on LSB based steganography methods. Int. J. Eng. Comput. Sci. 2(8), 2464–2467 (2013)
Khan, Z., Shah, M., Naeem, M., Mahmood, T., Khan, S., Amin, N.U., Shahzad, D.: Threshold-based steganography: a novel technique for improved payload and SNR. Int. Arab J. Inf. Technol. 13(4), 380–386 (2016)
Bhuiyan, T., Sarower, A.H., Karim, M.R., Hassan, M.M.: An image steganography algorithm using LSB replacement through XOR substitution. In: 2019 International Conference on Information and Communications Technology, ICOIACT, pp. 44–49. IEEE, July 2019
Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recogn. Lett. 24, 1613–1626 (2003)
Mandal J.K., Debashis D.: Colour image steganography based on pixel value differencing in spatial domain, Int. J. Inf. Sci. Tech. (IJIST) 2(4) (2012)
Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S.: Image steganographic scheme based on pixel value differencing and LSB replacement method. In: IEEE Proceedings on Vision, Image and Signal processing, vol. 152, no. 5, pp. 611–615 (2005)
Bharti, P., Soni, R.: A new approach of data hiding in images using cryptography and steganography. IJOCA 58(8), 0975–8887 (2012)
Ali, A.N.: An image steganography method with high hiding capacity based on RGB image. Int. J. Signal Image Process. 1(4), 238–241 (2010)
Ran, Z.W., Chi, F.L., Ja, C.L.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn. Soc. 34, 671–683 (2001)
Li, B., Wang, M., Li, X., Tan, S., Huang, J.: A strategy of clustering modification directions in spatial image steganography. IEEE Trans. Inf. Forensics Secur. 10(9), 1905–1917 (2015)
Karim, S.M., Rahman, M.S., Hossain, M.I.: A new approach for LSB based image steganography using secret key. In: 14th international conference on computer and information technology, ICCIT 2011, pp. 286–291. IEEE, December 2011
Bloisi, D.D., Iocchi, L.: Image based steganography and cryptography. In: VISAPP, no. 1, pp. 127–134 (2007)
Westfeld, A.: F5—a steganographic algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45496-9_21
Thangadurai, K., Devi, G.S.: An analysis of LSB based image steganography techniques. In: 2014 International Conference on Computer Communication and Informatics, pp. 1–4. IEEE, January 2014
Zhu, Z., Zhang, T., Wan, B.: A special detector for the edge adaptive image steganography based on LSB matching revisited. In: 2013 10th IEEE International Conference on Control and Automation, ICCA, pp. 1363–1366. IEEE, June 2013
Sarmah, D.K., Bajpai, N.: Proposed system for data hiding using cryptography and steganography. Int. J. Comput. Appl. 8(9), 7–10 (2010)
Gowda, S.N.: Advanced dual layered encryption for block based approach to image steganography. In: 2016 International Conference on Computing, Analytics and Security Trends, CAST, pp. 250–254. IEEE, December 2016
Lokhande, U.: An effective way of using LSB steganography in images along with cryptography. Int. J. Comput. Appl. 88(12), 0975–8887 (2014)
Nakasone, T., Li, Y., Sasaki, Y., Iwamoto, M., Ohta, K., Sakiyama, K.: Key-dependent weakness of AES-based ciphers under clockwise collision distinguisher. In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. LNCS, vol. 7839, pp. 395–409. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-37682-5_28
Riasat, R., Bajwa, I.S., Ali, M.Z.: A hash-based approach for colour image steganography. In: International Conference on Computer Networks and Information Technology, pp. 303–307. IEEE, July 2011
Sarkar, A., Karforma, S.: A new pixel selection technique of LSB based steganography for data hiding. Int. Res. J. Comput. Sci. (IRJCS) 5(03), 120–125 (2018)
Aqeel, I., Raheel, M.: Digital image steganography by using a hash based LSB (3-2-3) technique. In: Bajwa, I.S., Kamareddine, F., Costa, A. (eds.) INTAP 2018. CCIS, vol. 932, pp. 713–724. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-6052-7_61
Bhardwaj, R., Sharma, V.: Image steganography based on complemented message and inverted bit LSB substitution. Proc. Comput. Sci. 93, 832–838 (2016)
Huang, L., Cai, S., Xiong, X., Xiao, M.: On symmetric color image encryption system with permutation-diffusion simultaneous operation. Opt. Lasers Eng. 115, 7–20 (2019)
Roy, R., Changder, S., Sarkar, A., Debnath, N.C.: Evaluating image steganography techniques: future research challenges. In: 2013 International Conference on Computing, Management and Telecommunications, ComManTel, pp. 309–314. IEEE, January 2013
Jassim, F.A.: A novel steganography algorithm for hiding text in image using five modulus method. arXiv preprint arXiv:1307.0642 (2013)
Hore, A., Ziou, D.: Image quality metrics: PSNR vs. SSIM. In: 2010 20th International Conference on Pattern Recognition, pp. 2366–2369. IEEE, August 2010
Kellman, P., McVeigh, E.R.: Image reconstruction in SNR units: a general method for SNR measurement. Magn. Reson. Med. 54(6), 1439–1447 (2005)
Vora, V.S., Suthar, A.C., Makwana, Y.N., Davda, S.J.: Analysis of compressed image quality assessments. M. Tech Student in E & C Dept, CCET, Wadhwan-Gujarat (2010)
Jain, A., Bhateja, V.: A full-reference image quality metric for objective evaluation in spatial domain. In: 2011 International Conference on Communication and Industrial Application, pp. 1–5. IEEE, December 2011
Liu, Z., Laganière, R.: Phase congruence measurement for image similarity assessment. Pattern Recogn. Lett. 28(1), 166–172 (2007)
Gonzalez, R.C., Woods, R.E., Eddins, S.L.: Digital Image Processing Using MATLAB. Pearson Education India, Chennai (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Alam, S.T., Jahan, N., Hassan, M.M. (2020). A New 8-Directional Pixel Selection Technique of LSB Based Image Steganography. In: Bhuiyan, T., Rahman, M.M., Ali, M.A. (eds) Cyber Security and Computer Science. ICONCS 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 325. Springer, Cham. https://doi.org/10.1007/978-3-030-52856-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-52856-0_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-52855-3
Online ISBN: 978-3-030-52856-0
eBook Packages: Computer ScienceComputer Science (R0)