Abstract
This work proposes a spanking new technique, Modular Distance Technique, to implement Variable Least Significant Bits Stegnography, in spatial domain, providing twofold security. It is an overriding and secure data embedding technique having low data hiding capacity of with least distortion. This is much immune to Steganalysis providing a large Key Size. This technique can be implemented with Euclidean, Chess Board and City Block distances with same data hiding capacity for each and contributing significantly to the key size. The key size of modular distance technique is almost 27 times of the size of the square of cover image. Low distortion made it difficult for intruder to detected hidden information and large key size make it difficult to extract the hidden information. This technique is contributing a data hiding capacity of 12.5–56.25 % with SNR ranging from 29.7 to 8 db. The hiding capacity and SNR varies with changing reference pixel, base of Mod and type of distance.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Moon SK, Kawitkar RS (2007) Data security using data hiding, International conference on computational intelligence and multimedia applications 2007, pp 247–251
Dumitrescu S, Wu WX, Memon N (2002) On steganalysis of random LSB embedding in continuous-tone images. In: Proceedings of international conference on image processing, Rochester, pp 641–644
Cedric T, Adi R, Mcloughlin I (2000) Data concealment in audio using a nonlinear frequency distribution of PRBS coded data and frequency-domain LSB insertion. In: Proceedings of IEEE international conference on electrical and electronic technology, Kuala Lumpur, Malaysia, pp 275–278
Kahn D (1967) The codebreakers. Macmillan, New York
Moon SK, Vasnik VN Application of steganography on image file, National conference on recent trends in electronics, pp 179–185
Morkel T, Eloff JHP, Olivier MS An overview of image steganography, information and computer security architecture (ICSA) research group, Department of Computer Science, University of Pretoria
Zheng J-B, Feng DD, Zhao R-C (2005) A multi-channel framework for image watermarking, Proceedings of the fourth international conference on machine learning and cybernetics, Guangzhou, 18–21 Aug 2005
Uccheddu F, Corsini M, Barni M (2004) Wavelet-based blind watermarking of 3D models, Proceedings of ACM multimedia and security workshop, pp 143–154
Mehboob B, Faruqui RA (2008) A stegnography implementation. IEEE 2008
Swanson MD, Kobayashi M, Tewfii AH (1998) Multimedia data embedding and watermarking technologies. Proc IEEE 86(6):1064–1087
Anderson R (ed.) (1996) Informalion hiding: first international workshop, Cambridge, Lecture notes in computer science, vol. 1174, Springer-Verlag, Berlin Heidelberg, New York, 1996
Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding, IBM systems journal, vol. 35, no. 3k4. MIT Media Lab, pp 313–336
Ogihara T, Nakamura D, Yokoya N Data embedding into pictorial images with less distortion using discrete cosine transform
Ker A (2004) Improved detection of LSB steganography in grayscale images. Proceedings of 6th information hiding workshop. vol. 3200, Springer LNCS, pp 97–115
Fridrich J, Goljan M, Du R (2001) Detecting, LSB Stegnography in color and gray –scale images, Magazine of IEEE multimedia, Special issue on security, Oct-Nov issue, 2001, pp 22–28
Habes A (2006) Information transmissions in computer network. Information hiding in bmp image implementation analysis and evaluation (Jan 2006)
Moon SK, Kawitkar RS, Data security using data hiding international conference on computational intelligence and multimedia applications 2007
Khan S, Haroon Yousaf M (2011) Variable least significant bits stegnography. Accepted for publication in IJCSI vol. 8, Issue 5, Sept 2011
Khan S, Haroon Yousaf M (2011) Implementation of variable least significant bits stegnography using decreasing distance decreasing bits algorithm. Accepted for publication in IJCSI, vol. 8, Issue 6, Nov 2011
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this paper
Cite this paper
Khan, S., Yousaf, M.H. (2013). Implementation of VLSB Stegnography Using Modular Distance Technique. In: Elleithy, K., Sobh, T. (eds) Innovations and Advances in Computer, Information, Systems Sciences, and Engineering. Lecture Notes in Electrical Engineering, vol 152. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-3535-8_43
Download citation
DOI: https://doi.org/10.1007/978-1-4614-3535-8_43
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-3534-1
Online ISBN: 978-1-4614-3535-8
eBook Packages: EngineeringEngineering (R0)