Skip to main content

Implementation of VLSB Stegnography Using Modular Distance Technique

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 152))

Abstract

This work proposes a spanking new technique, Modular Distance Technique, to implement Variable Least Significant Bits Stegnography, in spatial domain, providing twofold security. It is an overriding and secure data embedding technique having low data hiding capacity of with least distortion. This is much immune to Steganalysis providing a large Key Size. This technique can be implemented with Euclidean, Chess Board and City Block distances with same data hiding capacity for each and contributing significantly to the key size. The key size of modular distance technique is almost 27 times of the size of the square of cover image. Low distortion made it difficult for intruder to detected hidden information and large key size make it difficult to extract the hidden information. This technique is contributing a data hiding capacity of 12.5–56.25 % with SNR ranging from 29.7 to 8 db. The hiding capacity and SNR varies with changing reference pixel, base of Mod and type of distance.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Moon SK, Kawitkar RS (2007) Data security using data hiding, International conference on computational intelligence and multimedia applications 2007, pp 247–251

    Google Scholar 

  2. Dumitrescu S, Wu WX, Memon N (2002) On steganalysis of random LSB embedding in continuous-tone images. In: Proceedings of international conference on image processing, Rochester, pp 641–644

    Google Scholar 

  3. Cedric T, Adi R, Mcloughlin I (2000) Data concealment in audio using a nonlinear frequency distribution of PRBS coded data and frequency-domain LSB insertion. In: Proceedings of IEEE international conference on electrical and electronic technology, Kuala Lumpur, Malaysia, pp 275–278

    Google Scholar 

  4. Kahn D (1967) The codebreakers. Macmillan, New York

    Google Scholar 

  5. Moon SK, Vasnik VN Application of steganography on image file, National conference on recent trends in electronics, pp 179–185

    Google Scholar 

  6. Morkel T, Eloff JHP, Olivier MS An overview of image steganography, information and computer security architecture (ICSA) research group, Department of Computer Science, University of Pretoria

    Google Scholar 

  7. Zheng J-B, Feng DD, Zhao R-C (2005) A multi-channel framework for image watermarking, Proceedings of the fourth international conference on machine learning and cybernetics, Guangzhou, 18–21 Aug 2005

    Google Scholar 

  8. Uccheddu F, Corsini M, Barni M (2004) Wavelet-based blind watermarking of 3D models, Proceedings of ACM multimedia and security workshop, pp 143–154

    Google Scholar 

  9. Mehboob B, Faruqui RA (2008) A stegnography implementation. IEEE 2008

    Google Scholar 

  10. Swanson MD, Kobayashi M, Tewfii AH (1998) Multimedia data embedding and watermarking technologies. Proc IEEE 86(6):1064–1087

    Google Scholar 

  11. Anderson R (ed.) (1996) Informalion hiding: first international workshop, Cambridge, Lecture notes in computer science, vol. 1174, Springer-Verlag, Berlin Heidelberg, New York, 1996

    Google Scholar 

  12. Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding, IBM systems journal, vol. 35, no. 3k4. MIT Media Lab, pp 313–336

    Google Scholar 

  13. http://isse.gmu.edu/~njohnson/steganography

  14. Ogihara T, Nakamura D, Yokoya N Data embedding into pictorial images with less distortion using discrete cosine transform

    Google Scholar 

  15. Ker A (2004) Improved detection of LSB steganography in grayscale images. Proceedings of 6th information hiding workshop. vol. 3200, Springer LNCS, pp 97–115

    Google Scholar 

  16. Fridrich J, Goljan M, Du R (2001) Detecting, LSB Stegnography in color and gray –scale images, Magazine of IEEE multimedia, Special issue on security, Oct-Nov issue, 2001, pp 22–28

    Google Scholar 

  17. Habes A (2006) Information transmissions in computer network. Information hiding in bmp image implementation analysis and evaluation (Jan 2006)

    Google Scholar 

  18. Moon SK, Kawitkar RS, Data security using data hiding international conference on computational intelligence and multimedia applications 2007

    Google Scholar 

  19. Khan S, Haroon Yousaf M (2011) Variable least significant bits stegnography. Accepted for publication in IJCSI vol. 8, Issue 5, Sept 2011

    Google Scholar 

  20. Khan S, Haroon Yousaf M (2011) Implementation of variable least significant bits stegnography using decreasing distance decreasing bits algorithm. Accepted for publication in IJCSI, vol. 8, Issue 6, Nov 2011

    Google Scholar 

  21. http://www.mathworks.com

  22. http://www.math.ucla.edu/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sahib Khan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Khan, S., Yousaf, M.H. (2013). Implementation of VLSB Stegnography Using Modular Distance Technique. In: Elleithy, K., Sobh, T. (eds) Innovations and Advances in Computer, Information, Systems Sciences, and Engineering. Lecture Notes in Electrical Engineering, vol 152. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-3535-8_43

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-3535-8_43

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-3534-1

  • Online ISBN: 978-1-4614-3535-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics