Skip to main content

An SVM Based Secural Image Steganography Algorithm for IoT

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11983))

Included in the following conference series:

Abstract

With the fast development of IoT network, there are more and more images generated by sensors and other devices, which increases the transmission expenses. By adopting image steganography, the images can deliver more information than they could. Therefore, the transmission expenses could be significantly reduced. However, the safety and quality of steganographic algorithms is not promising nowadays. To improve this situation, we propose an SVM-based steganography algorithm. The algorithm takes advantage of four features, including the variance of the image, the overall difference, the shape context matching and the smoothness. The analysis and experimental results show that the information hiding algorithm can effectively optimize the information steganography and anti-steganography analysis, which could be used in IoT.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Menon, N., Vaithiyanathan: A survey on image steganography. In: 2017 International Conference on Technological Advancements in Power and Energy (TAP Energy), Kollam, pp. 1–5 (2017)

    Google Scholar 

  2. Jois, A., Tejaswini, L., et al.: Survey on LSB data hiding techniques. In: 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, pp. 656–660 (2016)

    Google Scholar 

  3. Lin, Q., Liu, J., Guo, Z.: Local ternary pattern based on path integral for steganalysis. In: 2016 IEEE International Conference on Image Processing (ICIP), pp. 2737–2741 (2016)

    Google Scholar 

  4. Teng, D., Shi, R., Zhao, X.: DCT image watermarking technique based on the mix of time-domain. In: 2010 IEEE International Conference on Information Theory and Information Security (ICITIS), pp. 826–830 (2010)

    Google Scholar 

  5. Kaur, H., Kakkar, A.: Comparison of different image formats using LSB Steganography. In: 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC), IEEE, pp. 97–101 (2017)

    Google Scholar 

  6. Nagaraj, V., Vijayalakshmi, V., Zayaraz, G.: RS steganalysis on block based octal pair pixel value differencing method. In: 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), IEEE (2016)

    Google Scholar 

  7. Chang, C.C., Chuang, J.C., Hu, Y.C.: Spatial domain image hiding scheme using pixel-values differencing. Fundamenta Informaticae 171–184 (2006). IOS Press

    Google Scholar 

  8. Singh, A., Rawat, M., Shukla, A.K., Kumar, A., Singh, B.: An overview of pixel value differencing based data hiding techniques. In: 2018 Eleventh International Conference on Contemporary Computing (IC3), Noida, pp. 1–3 (2018)

    Google Scholar 

  9. Tan, S., Li, B.: Targeted steganalysis of adaptive pixel-value differencing steganography. In: 2012 19th IEEE International Conference on Image Processing, Orlando, FL, pp. 1129–1132 (2012)

    Google Scholar 

  10. Tyagi, A., Roy, R., Changder, S.: High capacity image steganography based on pixel value differencing and pixel value sum. In: 2015 Second International Conference on Advances in Computing and Communication Engineering, Dehradun, pp. 488–493 (2015)

    Google Scholar 

  11. Talabani, H., Avci, E.: Impact of various kernels on support vector machine classification performance for treating wart disease. In: 2018 International Conference on Artificial Intelligence and Data Processing (IDAP), Malatya, Turkey, pp. 1–6 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weifeng Sun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sun, W., Jia, M., Yu, S., Dong, B., Li, X. (2019). An SVM Based Secural Image Steganography Algorithm for IoT. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11983. Springer, Cham. https://doi.org/10.1007/978-3-030-37352-8_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37352-8_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37351-1

  • Online ISBN: 978-3-030-37352-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics