Undetectable least significant bit replacement steganography

  • 180 Accesses

  • 1 Citations


In this paper we propose a novel method based on Inverse Transitions for increasing the security of Least Significant Bit (LSB) replacement steganography. Before hiding data using LSB replacement, cover image is preprocessed using inverse transitions. The preprocessing modifies the LSBs in such a way that the resulting change in pixel values can not occur with LSB replacement. The proposed method ensures \(100\%\) undetectability for payload up to 1.5 bpp in colour images against most accurate length estimation methods for LSB replacement. The proposed method is faster, does not require any additional storage and ensures complete recovery of hidden data in comparison to state of the art steganography methods. The proposed method can be used in resource constrained applications which demand fast and secure data hiding and loss less recovery of hidden data.

This is a preview of subscription content, log in to check access.

Access options

Buy single article

Instant unlimited access to the full article PDF.

US$ 39.95

Price includes VAT for USA

Subscribe to journal

Immediate online access to all issues from 2019. Subscription will auto renew annually.

US$ 199

This is the net price. Taxes to be calculated in checkout.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10


  1. 1.

    Abdulrahman H, Chaumont M, Montesinos M, Magnier B (2015) Color image steganalysis, using correlations between RGB channels. In: Proc Int Conf Avail, Reliab, security, France, pp 448– 454

  2. 2.

    Chandramouli R, Li G, Memon N (2002) Adaptive steganography. SPIE, San Jose, pp 69–78

  3. 3.

    Dumitrescu S, Wu X (2005) A new framework of LSB steganalysis of digital media. IEEE Trans Signal Process 53:3936–3947

  4. 4.

    Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process 51:1995–2007

  5. 5.

    Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in colour and grey-scale images. Magazine of IEEE Multimedia 8:22–28

  6. 6.

    Fridrich J, Kodovsky J (2012) Steganalysis of LSB replacement using parity-aware features. Springer, LNCS, Berkeley, pp 31–45

  7. 7.

    Fridrich J, Kodovsky J (2013) Multivariate gaussian model for designing additive distortion for steganography. In: Proc IEEE Int Conf Acoust, Speech, Signal process, Canada, pp 2949–2953

  8. 8.

    Goljan M, Fridrich J, Cogranne R (2014) Rich model for steganalysis of color images. In: Proc IEEE Int workshop on information forensics and security, pp 185–190

  9. 9.

    Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: Proc IEEE Int workshop Inf Forensics security, Spain, pp 234–239

  10. 10.

    Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in arbitrary domain, EURASIP. J Inf Security 2014:1–13

  11. 11.

    Ker A. (2004) Quantitative evaluation of pairs and RS steganalysis. SPIE, San Jose, pp 83–97

  12. 12.

    Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In: Proc IEEE Int Conf image process, France, pp 4026–4210

  13. 13.

    Li B, Wang M, Li X, Tan S, Huang J (2015) A strategy of clustering modification directions in spatial image steganography. IEEE Trans Inf Forensics Secur 10:1905–1917

  14. 14.

    Liao X, Chen G, Li Q, Liu J (2015) Improved WOW adaptive image steganography method. In: IEEE Int Conf on algorithms and architectures for parallel processing, Switzerland, pp 695– 702

  15. 15.

    Liao X, Chen G, Yin J (2016) Content adaptive steganalysis for color images. Security and Communication Networks 9:5756–5763

  16. 16.

    Liao X, Ding L (2015) Data hiding in digital image using four pixel-value-differencing and multiple-base notational. In: IEEE Int Conf on intelligent information hiding and multimedia signal processing, pp 76–80

  17. 17.

    Liao X, Guo S, Yin J, Wang H, Li X, Sangariah AK (2017) New cubic reference table based image steganography. Multimedia Tools and Applications

  18. 18.

    Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146–156

  19. 19.

    Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28:21–27

  20. 20.

    Liu W, Liu G, Dai Y (2014) Syndrome Trellis Codes based on Minimal Span Generator Matrix. Ann Telecommun 69:403–416

  21. 21.

    Lu P, Luo X, Tang Q, Shen L (2004) An improved sample pairs method for detection of LSB embedding. Springer, LNCS, Canada, pp 116–127

  22. 22.

    Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13:285–287

  23. 23.

    Pevny T, Filler T, Bas P (2010) Using high dimensional image models to perform highly undetectable steganography. Springer, LNCS, Canada, pp 161–177

  24. 24.

    Schaefer G, Stich M (2004) UCID - an uncompressed colour image database. IEEE, San Jose, pp 472–480

  25. 25.

    Sharp T (2001) An implementation of key-based digital signal steganography. Springer, LNCS, Pittsburgh, pp 13–26

  26. 26.

    Shreelekshmi R, Wilscy M, Veni Madhavan CE (2010) Image classification for more reliable steganalysis. Springer , Berlin, pp 66–74

  27. 27.

    Shreelekshmi R, Wilscy M, Veni Madhavan CE (2013) Improved LSB steganalysis based on analysis of adjacent pixel pairs. Signal, Image and Video Processing 7:811–816

  28. 28.

    Tang W, Li B, Luo W, Huang J (2016) Clustering steganographic modification directions for color components. IEEE Signal Process Lett 23:197–201

  29. 29.

    Tao Z, Xijian P (2003) Reliable Detection of LSB Steganography based on the Difference Image Histogram, 545–548, IEEE

  30. 30.

    Wu D, Tsai W (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24:1613–1626

  31. 31.

    Yang CH, Weng CY, Wang SJ, Sun HM (2008) Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans Inf Forensics Secur 3:488–497

  32. 32.

    Zhang X, Wang S (2004) Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recogn Lett 25:331–339

Download references


This work was supported by the Kerala State Council for Science Technology and Environment [grant number 149/ 2012/ KSCSTE].

Author information

Correspondence to R. Shreelekshmi.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Shreelekshmi, R., Wilscy, M. & Madhavan, C.E.V. Undetectable least significant bit replacement steganography. Multimed Tools Appl 78, 10565–10582 (2019) doi:10.1007/s11042-018-6541-0

Download citation


  • Steganography
  • LSB replacement
  • Undetectability
  • Security