Skip to main content

Secure Image Steganography Through Pre-processing

  • Conference paper
  • First Online:
Soft Computing: Theories and Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 742))

Abstract

The security of information is required by internet technologies and its application during transmission over the nonsecured communication channel. Steganography means is to hide secret data into another media file. In the spatial domain, Least Significant Bit (LSB) is used. LSB is the most common approach because of its easiness and hiding capacity. Preprocessing is required for better security but all current techniques of Image Steganography mainly concentrate on the hiding strategy and less concern about encryption of secret image. For digital Image Steganography security, a unique technique based on the Data Encryption Standard (DES) is introduced in this paper. Plaintext with a block size of 64 bit and 56 bits of the secret key is used by DES. Better security and a high level of secrecy are achieved by pre-processing as it is not possible to extract the image without knowledge of the S-Box mapping rules and a secret key of the function. The discussion shows that the Steganographic technique with pre-processing is better than LSB steganography algorithms directly.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Moerland, T.: Steganography and Steganalysis. Leiden Institute of Advanced Computing Science. www.liacs.nl/home/trnoerl/privtech.pdf

  2. Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Secur. Priv. 32–44 (2003)

    Google Scholar 

  3. Babu, K.S., Raja, K.B., Kiran, K.K., Devi T.H.M., Venugopal, K.R., Pathnaik, L.M.: Authentication of secrete information in image steganography. IEEE Trans. 13

    Google Scholar 

  4. Schaefer, E.F.: A Simplified Data Encryption Standard Algorithm. Cryptologia, January 1996

    Google Scholar 

  5. Mielikainen, J.: LSB matching revisited. IEEE Signal Process. Lett. 13(5), 285–287 (2006)

    Article  Google Scholar 

  6. Khosravirad, S.R., Eghlidos, T., Ghaemmaghami, S.: Higher order statistical of random LSB steganography. IEEE Trans. 629–632 (2009)

    Google Scholar 

  7. Ge, H., Huang, M., Wang, Q.: Steganography and steganalysis based on digital image. IEEE Transaction on International Congress on Image and Signal Processing, pp. 252–255 (2011)

    Google Scholar 

  8. Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2), 201–214 (2010)

    Article  Google Scholar 

  9. Zhu, G., Wang, W.: Digital image encryption algorithm based on pixel. In: ICIS—2010 IEEE International Conference, pp. 29–31 Oct 2010, pp. 769–772

    Google Scholar 

  10. Cosic, J., Bacai, M.: Steganography and steganalysis does local web site contain “Stego” contain. In: 52th IEEE Transaction International Symposium ELMAR-2010, Zadar, Croatia, pp. 85–88 (2009)

    Google Scholar 

  11. Yun-peng, Z., Wei, L.: Digital image encryption algorithm based on chaos and improved DES. In: IEEE International Conference on System, Man and Cybernatics (SMC 2009), pp. 474–479, 11–14 Oct 2009

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Indu Maurya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Maurya, I., Gupta, S.K. (2019). Secure Image Steganography Through Pre-processing. In: Ray, K., Sharma, T., Rawat, S., Saini, R., Bandyopadhyay, A. (eds) Soft Computing: Theories and Applications. Advances in Intelligent Systems and Computing, vol 742. Springer, Singapore. https://doi.org/10.1007/978-981-13-0589-4_13

Download citation

Publish with us

Policies and ethics