Skip to main content

Abstract

The rapid advances of network technologies and digital devices make information exchange fast and easy. However, distributing digital data over public networks such as the Internet is not really secure due to copy violation, counterfeiting, forgery, and fraud. The paper presents a study and analysis on Multi-Level Steganography (MLS) which defines a new concept for hidden communication in telecommunication networks. In MLS, at least two steganographic methods are utilized simultaneously, in such a way that one method (called the upper-level) serves as a carrier for the second one (called the lower-level). In our work we have used two steganographic algorithms. This paper presents a steganographic algorithm based on the spatial domain, Selected Least Significant Bits (SLSB) and Least Significant Bits (LSB). This method is further exploited to do a 3-level re-steganography to enhance security. We have performed some simulations by using MATLAB software on different possible combination of the SLSB and LSB. Finally in our analysis we have concluded the LSB–LSB –LSB combination result best than rest of the combinations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rodriguez, B., Petersons, G.: Detecting steganography using multi-class classification. In: Craiger, P., Shenoi, S. (eds.) Advances in Digital Forensics III. IFIP, vol. 242, pp. 193–204. Springer, Boston (2007)

    Chapter  Google Scholar 

  2. Pan, X., Yan, B., Niu, K.: Multiclass Detect of Current Steganographic Methods for JPEG Format Based Re-stegnography. In: 2nd International Conference on Advanced Computer Control (ICACC), Shenyang, pp. 79–82. IEEE (2007)

    Google Scholar 

  3. Wang, R.-Z., Lin, C.-F., Lina, J.-C.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition 34(3), 671–683 (2001)

    Article  MATH  Google Scholar 

  4. Chang, C.C., Hsiao, J.Y., Chan, C.S.: Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition 36, 1583–1595 (2003)

    Article  Google Scholar 

  5. Wang, C.-M., Wu, N.-I., Tsai, C.-S., Hwang, M.-S.: A high quality steganographic method with pixel-value differencing and modulus function. Journal of Systems and Software, 1–8 (2007)

    Google Scholar 

  6. Lou, D.C., Hu, M.C., Liu, J.L.: Multiple layer data hiding scheme for medical images. Computer Standards and Interfaces 31(2), 329–335 (2009)

    Article  Google Scholar 

  7. Fraczek, W., Mazurczyk, W., Szczypiorski, K.: Multi-Level Steganography: Improving Hidden Communication in Networks. In: arXiv:1101.4789v3 [cs.CR], CUL, pp. 1–8 (2012)

    Google Scholar 

  8. Neeta, D., Kesselman, K.S., Jacobs, D.: Implementation of LSB Steganography and Its Evaluation for Various Bits. In: 1st International Conference on Digital Information Management, Banglore, pp. 173–178. IEEE (2006)

    Google Scholar 

  9. Roque, J.J., Minguet, J.M.: SLSB: Improving the Steganographic Algorithm LSB. In: WOSIS, pp. 57–66. INSTICC Press (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajesh Duvvuru .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Duvvuru, R., Rao, P.J., Singh, S.K., Suman, R.R., Singh, S.N., Mahato, P. (2014). Performance Analysis of Multi-class Steganographic Methods Based on Multi-Level Re-stegnography. In: Satapathy, S., Avadhani, P., Udgata, S., Lakshminarayana, S. (eds) ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II. Advances in Intelligent Systems and Computing, vol 249. Springer, Cham. https://doi.org/10.1007/978-3-319-03095-1_57

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-03095-1_57

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-03094-4

  • Online ISBN: 978-3-319-03095-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics