Image Steganography Using LSB Substitution: A Comparative Analysis on Different Color Models

  • Avneesh Nolkha
  • Sunil KumarEmail author
  • V. S. Dhaka
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 141)


Information hiding for secure communication has been used for a long time. Steganography is a very popular technique of hiding secret information in other media. The object used to hide the secret information is called the cover object. Different types of cover objects like text, audio, image, and video are used, but image is the most popular among all cover objects. Nowadays color image processing is widely utilized in multimedia, graphics and computer vision applications. Color image can hold a large amount of secret data as compared to the grey image since they have different color components. One of the popular approaches is the substitution of the least significant bits of the cover image by the secret information. Different color models, namely, RGB, YCbCr, YUV, YIQ, CMY, HIS, HSV are used to represent the color image. We have proposed a LSB substitution based algorithm and its performance has been compared for different color models (RGB, YCbCr, YUV, and CMY).


Color models Steganography Data hiding Stego image LSB PSNR 


  1. 1.
    Morkel, T., Eloff, J.H., and Olivier, M.S.: An overview of image steganography. In: ISSA, pp. 1–11 (2005)Google Scholar
  2. 2.
    Chandramouli, R., Memon, N.: Analysis of LSB based image steganography techniques. In: Proceedings 2001 International Conference on Image Processing, vol. 3, pp. 1019–1022. IEEE (2001)Google Scholar
  3. 3.
    Wu, D.-C., Tsai, W.-H.: A steganographic method for images by pixel-value differencing. Pattern Recogn. Lett. 24(9–10), 1613–1626 (2003)CrossRefGoogle Scholar
  4. 4.
    Parvez, M.T., Gutub, A.A.A.: RGB intensity based variable-bits image steganography. In: IEEE Asia Pacific Services Computing Conference, pp 1322–1327 (2008)Google Scholar
  5. 5.
    Gutab, A., Tabakh, A., Qahtani, A.: Triple-A: secure RGB image steganography based on randomization. In: IEEE/ACS international conference on computer system and application, pp 400–403 (2009)Google Scholar
  6. 6.
    Gutub, A.A.-A.: Pixel indicator technique for RGB image steganography. J. Emerg. Technol. Web Intell. 2 (2010)Google Scholar
  7. 7.
    Das, P., Kar, N.: ILSB: indicator-based LSB steganography. Adv. Intell. Syst. Comput. 309, 489–495 (2015)Google Scholar
  8. 8.
    Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Security 5(2), 201–214 (2010)CrossRefGoogle Scholar
  9. 9.
    Liao, X., Wen, Q.Y., Zhang, J.: A steganographic method for digital images with fourpixel differencing and modified LSB substitution. J. Vis. Commun. Image Represent. 22(1), 1 − 8 (2011)CrossRefGoogle Scholar
  10. 10.
    Swain, G., Lenka, S.K.: “A Better RGB Based Image Steganography Technique. Communications in Computer and Information Science, vol. 270, pp. 470–478. Springer, Berlin (2012)Google Scholar
  11. 11.
    Dagar, S: RGB based dual key image steganography. In: IEEE Conference, the Next Generation Information Technology Summit, pp. 316–320 (2013)Google Scholar
  12. 12.
    Bairagi, A.K., Mondal, S. Debnath, R.: A robust RGB channel based image steganography technique using a secret key. In: IEEE 16th International Conference on Computer and Information Technology, pp. 81–87 (2014)Google Scholar
  13. 13.
    Bedwal, T., Kumar, M.: An enhanced and secure image stenographic technique using RGB–BOX mapping. In: 4th International Conference the Next Generation Information Technology Summit (2014)Google Scholar
  14. 14.
    Badhan, S., Juneja, M.: A novel approach for data hiding in color images using LSB based steganography with improved capacity and resistance to statistical attacks. In: Advances in Intelligent Systems and Computing, vol. 309, pp. 183–190 (2015)Google Scholar
  15. 15.
    Jain, M., Lenka, S.K.: Diagonal queue medical image steganography with Rabin cryptosystem. Brain Inform. 3(1), 39–51 (2016). SpringerCrossRefGoogle Scholar
  16. 16.
    Muhammad, K., Ahmad, J., Rehman, N.U., Jan, Z., Sajjad, M.: CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimed. Tools Appl. 76(6), pp. 8597–8626 (2017)CrossRefGoogle Scholar
  17. 17.
    Parah, S.A., Sheikh, J.A., Akhoon, J.A., Loan, N.A., Bhat, G.M.: Information hiding in edges: a high capacity information hiding technique using hybrid edge detection. Multimed. Tools Appl. 77(1), 185–207 (2018)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Department of Computer and Communication Engineering, SCITManipal University JaipurJaipurIndia

Personalised recommendations