Advertisement

A Novel Method for Distributed Image Steganography

  • Bismita Choudhury
  • Rig Das
  • Themrichon Tuithung
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 315)

Abstract

Distributed Image Steganography (DIS) is a new method of concealing secret information in several host images, leaving smaller traces than conventional steganographic techniques and requiring a collection of affected images for secret information retrieval. DIS, compared to other conventional steganographic techniques, can improve security and information hiding capacity because DIS leaves reduced signatures of hidden information in host images. This paper presents a novel technique for Distributed Image Steganography based on Shamir’s (k, n) threshold based secret sharing scheme. An 8-bit, gray level, Secret Image of size P × Q is divided into several sections and embedded inside n-Cover Images of size M × N and only k-Stego Images (k ≤ n) are required to retrieve the secret image. The size of the secret image is also embedded inside every cover images, so that the stego images become standalone information to the receiver. Experimental result shows that the proposed novel method has high capacity and good invisibility.

Keywords

Steganography Distributed image steganography PSNR Shamir’s secret sharing scheme 

References

  1. 1.
    Jhonson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. In: IEEE Paper of February (1998)Google Scholar
  2. 2.
    Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Secur. Priv. 1(3), 32–44 (2003)CrossRefGoogle Scholar
  3. 3.
    Filler, T., Fridrich, J.: Gibbs construction in steganography. In: IEEE Transactions on Information Forensics and Security (2010)Google Scholar
  4. 4.
    Bai, L., Biswas, S., Blasch, E.P.: An estimation approach to extract multimedia information in distributed steganographic images. In: 10th International Conference on Information Fusion, 9-12 July 2007, Quebec, Canada (2007)Google Scholar
  5. 5.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)CrossRefzbMATHMathSciNetGoogle Scholar
  6. 6.
    Thien, C.C., Lin, J.C.: Secret Image Sharing. J. Comput. Graph. 26(5), 765–770 (2002)CrossRefGoogle Scholar
  7. 7.
    Das, R., Tuithung, T.: A novel steganography method for image based on Huffman encoding. In: 3rd IEEE National Conference on Emerging Trends and Applications in Computer Science (NCETACS), Shillong, India (2012)Google Scholar
  8. 8.
    Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. J. Sign. Process. 90, 727–752 (2010)Google Scholar
  9. 9.
    Li, B., He, J., Huang, J., Shi, Y.Q.: A survey on image steganography and steganalysis. J. Inf. Hiding Multimed. Sign. Process. 2(2), 142–172 (2011)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Bismita Choudhury
    • 1
  • Rig Das
    • 2
  • Themrichon Tuithung
    • 3
  1. 1.Department of Computer Science and Engineering and Information TechnologyDon Bosco College of Engineering and TechnologyGuwahatiIndia
  2. 2.Department of Computer Science and EngineeringNational Institute of TechnologyRourkelaIndia
  3. 3.Department of Computer Science and EngineeringNorth Eastern Regional Institute of Science and Technology (Deemed University)ItanagarIndia

Personalised recommendations