Skip to main content

Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform

  • Conference paper
Security and Privacy in Communication Networks (SecureComm 2013)

Abstract

Steganography is the science of hiding a message signal in a host signal, without any perceptual distortion of the host signal. Using steganography, information can be hidden in the carrier items such as images, videos, sounds files, text files, while performing data transmission. In image steganography field, it is a major concern of the researchers how to improve the capacity of hidden data into host image without causing any statistically significant modification. In this work, we propose a reversible steganography scheme which can hide large amount of information without affecting the imperceptibility aspect of the stego-image and at the same time, it increases the security level of the system through using different method for embedding based on distinct type of transform, called Mix Column Transform. Our experimental results prove the ability of our proposed scheme in balancing among the three critical properties: capacity, security, and imperceptibility.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hernandez-Chamorro, A., Espejel-Trujillo, A., Lopez-Hernandez, J., Nakano-Miyatake, M., Perez-Meana, H.: A Methodology of Steganalysis for Images. In: IEEE CONIELECOMP 2009, Cholula, Puebla, Mexico, pp. 102–106 (2009)

    Google Scholar 

  2. Li, B., He, J., Huang, J., Shi, Y.Q.: A Survey on Image Steganography and Steganalysis. Journal of Information Hiding and Multimedia Signal Processing 2(2), 142–172 (2011)

    Google Scholar 

  3. Lin, C.-C.: An information hiding scheme with minimal image distortion. Computer Standards & Interfaces 33(5), 477–484 (2011)

    Article  Google Scholar 

  4. Swain, G., Lenka, S.K.: A Better RGB Channel Based Image Steganography Technique. In: Krishna, P.V., Babu, M.R., Ariwa, E. (eds.) ObCom 2011, Part II. CCIS, vol. 270, pp. 470–478. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  5. Swain, G., Lenka, S.K.: LSB Array Based Image Steganography Technique by Exploring the Four Least Significant Bits. In: Krishna, P.V., Babu, M.R., Ariwa, E. (eds.) ObCom 2011, Part II. CCIS, vol. 270, pp. 479–488. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  6. Pandian, N., Thangavel, R.: A Hybrid Embedded Steganography Technique: Optimum Pixel Method and Matrix Embedding. In: Proceedings of the International Conference on Advances in Computing, Communications and Informatics, pp. 1123–1130. ACM (2012)

    Google Scholar 

  7. Al-Hunaity, M.F., Najim, S.A., El-Emary, I.M.: Colored Digital Image Watermarking using the Wavelet Technique. American Journal of Applied Sciences 4(9), 658–662 (2007)

    Article  Google Scholar 

  8. Liu, Q.: Steganalysis of DCT-Embedding Based Adaptive Steganography and YASS. In: The 13th ACM Multimedia Workshop on Multimedia and Security, pp. 77–85. ACM (2011)

    Google Scholar 

  9. Rabie, T.: Digital Image Steganography: An FFT Approach. In: Benlamri, R. (ed.) NDT 2012, Part II. CCIS, vol. 294, pp. 217–230. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  10. Sajedi, H., Jamzad, M.: Using contourlet transform and cover selection for secure steganography. International Journal of Information Security 9(5), 337–352 (2010)

    Article  Google Scholar 

  11. Stallings, W.: Cryptography and Network Security Principles and Practice. Prentice Hall, USA (2006)

    Google Scholar 

  12. Li, H., Friggstad, Z.: An Efficient Architecture for the AES Mix Columns Operation. In: Proceeding of ISCAS 2005, Kobe, Japan, pp. 4637–4640 (2005)

    Google Scholar 

  13. Addition and Multiplication Tables in Galois Fields GF(2^m), http://www.ee.unb.ca/cgi-bin/tervo/galois3.pl (last accessed May 30, 2013)

  14. Yua, Y.-H., Chang, C.-C., Lin, I.-C.: A new steganographic method for color and grayscale image hiding. Computer Vision and Image Understanding 107(3), 183–194 (2007)

    Article  Google Scholar 

  15. Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image Quality Assessment: From Error Visibility to Structural Similarity. IEEE Transactions on Image Processing 13(4), 600–612 (2004)

    Article  Google Scholar 

  16. Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: The SSIM Index for Image Quality Assessment, http://www.cns.nyu.edu/~lcv/ssim/ (last accessed: May 19, 2013)

  17. Roussos, A., Maragos, P.: Vector-Valued Image Interpolation by an Anisotropic Diffusion-Projection PDE. In: Sgallari, F., Murli, A., Paragios, N. (eds.) SSVM 2007. LNCS, vol. 4485, pp. 104–115. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  18. Upreti, K., Verma, K., Sahoo, A.: Variable Bits Secure System for Color Images. In: Proceedings of the 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies, pp. 105–107. IEEE (2010)

    Google Scholar 

  19. Lee, C.-F., Chen, H.-L., Tso, H.-K.: Embedding capacity raising in reversible data hiding based on prediction of difference expansion. Journal of Systems and Software 83(10), 1864–1872 (2010)

    Article  Google Scholar 

  20. Salomon, D.: Coding for Data and Computer Communications, p. 345. Springer (April 12, 2005) ISBN-13: 978-0387212456

    Google Scholar 

  21. MATLAB: The Language of Technical Computing, http://www.mathworks.com/products/matlab/ (last accessed May 30, 2013)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Abduallah, W.M., Rahma, A.M.S., Pathan, AS.K. (2013). Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform. In: Zia, T., Zomaya, A., Varadharajan, V., Mao, M. (eds) Security and Privacy in Communication Networks. SecureComm 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 127. Springer, Cham. https://doi.org/10.1007/978-3-319-04283-1_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04283-1_26

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04282-4

  • Online ISBN: 978-3-319-04283-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics