Skip to main content

A New 8-Directional Pixel Selection Technique of LSB Based Image Steganography

  • Conference paper
  • First Online:
Cyber Security and Computer Science (ICONCS 2020)

Abstract

Pixel selection for data hiding becomes crucial for the solutions in spatial domain of steganography to ensure imperceptibility. This paper presents an efficient approach of pixel selection technique for hiding secret data in cover object of image steganography. After reviewing recent literature, it has been observed that most of the works on pixel selection uses zig-zag technique for their solution. However, it becomes very prone to steganalysis based attacks by the intruders. In this study, 8-directions pixel selection technique is proposed to embed data in the cover image where Least Significant Bit (LSB) method has been used on Red, Green and Blue (RGB) color image especially focused on JPG, JPEG, and PNG. Since this projected procedure avoids the known steganalysis techniques, it will be challenging for the attacker to recognize the presence of secret information from the stego image. To measure the quality, statistical analysis has been performed where the value of the quality measurement matrices has provided better results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Judge, J.C.: Steganography: past, present, future. No. UCRL-ID-151879. Lawrence Livermore National Lab., CA (US) (2001)

    Google Scholar 

  2. Singla, S., Bala, A.: A review: cryptography and steganography algorithm for cloud computing. In: 2018 Second International Conference on Inventive Communication and Computational Technologies, ICICCT, pp. 953–957. IEEE, April 2018

    Google Scholar 

  3. Feng, B., Lu, W., Sun, W.: Binary image steganalysis based on pixel mesh markov transition matrix. J. Vis. Commun. Image Represent. 26, 284–295 (2015)

    Article  Google Scholar 

  4. Chen, J., Lu, W., Fang, Y., Liu, X., Yeung, Y., Xue, Y.: Binary image steganalysis based on local texture pattern. J. Vis. Commun. Image Represent. 55, 149–156 (2018)

    Article  Google Scholar 

  5. Kadhim, I.J.: A new audio steganography system based on auto-key generator. Al-Khwarizmi Eng. J. 8(1), 27–36 (2012)

    Google Scholar 

  6. Feng, B., Weng, J., Lu, W., Pei, B.: Steganalysis of content-adaptive binary image data hiding. J. Vis. Commun. Image Represent. 46, 119–127 (2017)

    Article  Google Scholar 

  7. Ashwin, S., Ramesh, J., Kumar, S.A., Gunavathi, K.: Novel and secure encoding and hiding techniques using image steganography: a survey. In: 2012 International Conference on Emerging Trends in Electrical Engineering and Energy Management, ICETEEEM, pp. 171–177. IEEE, December 2012

    Google Scholar 

  8. Awad, A.: A survey of spatial domain techniques in image steganography. J. Educ. Coll. Wasit Univ. 1(26), 497–510 (2017)

    Article  Google Scholar 

  9. Odeh, A., Elleithy, K., Faezipour, M., Abdelfattah, E.: Novel steganography over HTML code. In: Sobh, T., Elleithy, K. (eds.) Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering. LNEE, vol. 313, pp. 607–611. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-06773-5_81

    Chapter  Google Scholar 

  10. Thomas, P.: Literature survey on modern image steganographic techniques. Int. J. Eng. Res. Technol. 2, 107–111 (2013)

    Article  Google Scholar 

  11. Nagpal, K.D., Dabhade, P.D.S.: A survey on image steganography and its techniques in spatial and frequency domain. Int. J. Recent Innov. Trends Comput. Commun. 3(2), 776–779 (2015)

    Article  Google Scholar 

  12. Beroual, A., Al-Shaikhli, I.F.: A review of steganographic methods and techniques. Int. J. Perceptive Cogn. Comput. 4(1), 1–6 (2018)

    Article  Google Scholar 

  13. Biradar, R.L., Umashetty, A.: A survey paper on steganography techniques. High Impact Factor 9(1), 721–722 (2016)

    Google Scholar 

  14. Saleh, M.A.: Image steganography techniques - a review paper. Ijarcce 7(9), 52–58 (2018)

    Article  Google Scholar 

  15. Al-Shatnawi, A.M.: A new method in image steganography with improved image quality. Appl. Math. Sci. 6(79), 3907–3915 (2012)

    Google Scholar 

  16. Swain, G.: Very high capacity image steganography technique using quotient value differencing and LSB substitution. Arab. J. Sci. Eng. 44(4), 2995–3004 (2019)

    Article  Google Scholar 

  17. Mahimah, P., Kurinji, R.: Zigzag pixel indicator based secret data hiding method. In: 2013 IEEE International Conference on Computational Intelligence and Computing Research, pp. 1–5. IEEE, December 2013

    Google Scholar 

  18. Sahu, A.K., Swain, G.: A review on LSB substitution and PVD based image steganography techniques. Indonesian J. Electr. Eng. Comput. Sci. 2(3), 712–719 (2016)

    Article  Google Scholar 

  19. Pavani, M., Naganjaneyulu, S., Nagaraju, C.: A survey on LSB based steganography methods. Int. J. Eng. Comput. Sci. 2(8), 2464–2467 (2013)

    Google Scholar 

  20. Khan, Z., Shah, M., Naeem, M., Mahmood, T., Khan, S., Amin, N.U., Shahzad, D.: Threshold-based steganography: a novel technique for improved payload and SNR. Int. Arab J. Inf. Technol. 13(4), 380–386 (2016)

    Google Scholar 

  21. Bhuiyan, T., Sarower, A.H., Karim, M.R., Hassan, M.M.: An image steganography algorithm using LSB replacement through XOR substitution. In: 2019 International Conference on Information and Communications Technology, ICOIACT, pp. 44–49. IEEE, July 2019

    Google Scholar 

  22. Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recogn. Lett. 24, 1613–1626 (2003)

    Article  Google Scholar 

  23. Mandal J.K., Debashis D.: Colour image steganography based on pixel value differencing in spatial domain, Int. J. Inf. Sci. Tech. (IJIST) 2(4) (2012)

    Google Scholar 

  24. Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S.: Image steganographic scheme based on pixel value differencing and LSB replacement method. In: IEEE Proceedings on Vision, Image and Signal processing, vol. 152, no. 5, pp. 611–615 (2005)

    Google Scholar 

  25. Bharti, P., Soni, R.: A new approach of data hiding in images using cryptography and steganography. IJOCA 58(8), 0975–8887 (2012)

    Google Scholar 

  26. Ali, A.N.: An image steganography method with high hiding capacity based on RGB image. Int. J. Signal Image Process. 1(4), 238–241 (2010)

    Google Scholar 

  27. Ran, Z.W., Chi, F.L., Ja, C.L.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn. Soc. 34, 671–683 (2001)

    Article  Google Scholar 

  28. Li, B., Wang, M., Li, X., Tan, S., Huang, J.: A strategy of clustering modification directions in spatial image steganography. IEEE Trans. Inf. Forensics Secur. 10(9), 1905–1917 (2015)

    Article  Google Scholar 

  29. Karim, S.M., Rahman, M.S., Hossain, M.I.: A new approach for LSB based image steganography using secret key. In: 14th international conference on computer and information technology, ICCIT 2011, pp. 286–291. IEEE, December 2011

    Google Scholar 

  30. Bloisi, D.D., Iocchi, L.: Image based steganography and cryptography. In: VISAPP, no. 1, pp. 127–134 (2007)

    Google Scholar 

  31. Westfeld, A.: F5—a steganographic algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45496-9_21

    Chapter  Google Scholar 

  32. Thangadurai, K., Devi, G.S.: An analysis of LSB based image steganography techniques. In: 2014 International Conference on Computer Communication and Informatics, pp. 1–4. IEEE, January 2014

    Google Scholar 

  33. Zhu, Z., Zhang, T., Wan, B.: A special detector for the edge adaptive image steganography based on LSB matching revisited. In: 2013 10th IEEE International Conference on Control and Automation, ICCA, pp. 1363–1366. IEEE, June 2013

    Google Scholar 

  34. Sarmah, D.K., Bajpai, N.: Proposed system for data hiding using cryptography and steganography. Int. J. Comput. Appl. 8(9), 7–10 (2010)

    Google Scholar 

  35. Gowda, S.N.: Advanced dual layered encryption for block based approach to image steganography. In: 2016 International Conference on Computing, Analytics and Security Trends, CAST, pp. 250–254. IEEE, December 2016

    Google Scholar 

  36. Lokhande, U.: An effective way of using LSB steganography in images along with cryptography. Int. J. Comput. Appl. 88(12), 0975–8887 (2014)

    Google Scholar 

  37. Nakasone, T., Li, Y., Sasaki, Y., Iwamoto, M., Ohta, K., Sakiyama, K.: Key-dependent weakness of AES-based ciphers under clockwise collision distinguisher. In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. LNCS, vol. 7839, pp. 395–409. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-37682-5_28

    Chapter  Google Scholar 

  38. Riasat, R., Bajwa, I.S., Ali, M.Z.: A hash-based approach for colour image steganography. In: International Conference on Computer Networks and Information Technology, pp. 303–307. IEEE, July 2011

    Google Scholar 

  39. Sarkar, A., Karforma, S.: A new pixel selection technique of LSB based steganography for data hiding. Int. Res. J. Comput. Sci. (IRJCS) 5(03), 120–125 (2018)

    Google Scholar 

  40. Aqeel, I., Raheel, M.: Digital image steganography by using a hash based LSB (3-2-3) technique. In: Bajwa, I.S., Kamareddine, F., Costa, A. (eds.) INTAP 2018. CCIS, vol. 932, pp. 713–724. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-6052-7_61

    Chapter  Google Scholar 

  41. Bhardwaj, R., Sharma, V.: Image steganography based on complemented message and inverted bit LSB substitution. Proc. Comput. Sci. 93, 832–838 (2016)

    Article  Google Scholar 

  42. Huang, L., Cai, S., Xiong, X., Xiao, M.: On symmetric color image encryption system with permutation-diffusion simultaneous operation. Opt. Lasers Eng. 115, 7–20 (2019)

    Article  Google Scholar 

  43. Roy, R., Changder, S., Sarkar, A., Debnath, N.C.: Evaluating image steganography techniques: future research challenges. In: 2013 International Conference on Computing, Management and Telecommunications, ComManTel, pp. 309–314. IEEE, January 2013

    Google Scholar 

  44. Jassim, F.A.: A novel steganography algorithm for hiding text in image using five modulus method. arXiv preprint arXiv:1307.0642 (2013)

  45. Hore, A., Ziou, D.: Image quality metrics: PSNR vs. SSIM. In: 2010 20th International Conference on Pattern Recognition, pp. 2366–2369. IEEE, August 2010

    Google Scholar 

  46. Kellman, P., McVeigh, E.R.: Image reconstruction in SNR units: a general method for SNR measurement. Magn. Reson. Med. 54(6), 1439–1447 (2005)

    Article  Google Scholar 

  47. Vora, V.S., Suthar, A.C., Makwana, Y.N., Davda, S.J.: Analysis of compressed image quality assessments. M. Tech Student in E & C Dept, CCET, Wadhwan-Gujarat (2010)

    Google Scholar 

  48. Jain, A., Bhateja, V.: A full-reference image quality metric for objective evaluation in spatial domain. In: 2011 International Conference on Communication and Industrial Application, pp. 1–5. IEEE, December 2011

    Google Scholar 

  49. Liu, Z., Laganière, R.: Phase congruence measurement for image similarity assessment. Pattern Recogn. Lett. 28(1), 166–172 (2007)

    Article  Google Scholar 

  50. Gonzalez, R.C., Woods, R.E., Eddins, S.L.: Digital Image Processing Using MATLAB. Pearson Education India, Chennai (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Md. Maruf Hassan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alam, S.T., Jahan, N., Hassan, M.M. (2020). A New 8-Directional Pixel Selection Technique of LSB Based Image Steganography. In: Bhuiyan, T., Rahman, M.M., Ali, M.A. (eds) Cyber Security and Computer Science. ICONCS 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 325. Springer, Cham. https://doi.org/10.1007/978-3-030-52856-0_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-52856-0_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-52855-3

  • Online ISBN: 978-3-030-52856-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics