Skip to main content

A Huffman Code Based Image Steganography Technique

  • Conference paper
Applied Algorithms (ICAA 2014)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 8321))

Included in the following conference series:

Abstract

We present here a novel steganographic method based on Huffman coding and the least significant bit substitution in order to provide high embedding capacity, a strong security and imperceptible visual quality to secret message. Every eight bits of the secret image are first encoded by building a Huffman tree. After that those encoded bits of secret image are divided into 4 groups. Each part has a decimal value between 0 to 3. These decimal values determine the location where to embed the message in a particular pixel of cover image. To embed the message we just put a one in the corresponding location in a pixel of the cover image which identified by the decimal values of the secret image. Since Huffman Table reduces the size of the original image, an attacker cannot easily recover from the stego image those fine details of the original image that would enable him to mount a reliable attack. We have got comparable visual quality as the Peak Signal to Noise Ratio values lie between 30 dB to 31 dB.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cheddad, A., Condell, J., Curran, K., McKevitt, P.: Digital image steganography: Survey and analysis of current methods. Signal Processing 90, 727–752 (2010)

    Article  MATH  Google Scholar 

  2. Nag, A., Biswas, S., Sarkar, D., Sarkar, P.P.: A novel technique for image steganography based on block-DCT and Huffman encoding. International Journal of Computer Science and Information Technology 2(3), 103–111 (2010)

    Article  Google Scholar 

  3. Nag, A., Biswas, S., Sarkar, D., Sarkar, P.P.: A novel technique for image steganography based on DWT and Huffman encoding. International Journal of Computer Science and Security 4(5), 561–570 (2010)

    Google Scholar 

  4. Bender, D.W., Gruhl, N.M., Lu, A.: Techniques for data hiding. IBM Systems Journal 35, 313–316 (1996)

    Article  Google Scholar 

  5. Wang, R.Z., Lin, C.F., Lin, J.C.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition 34(3), 671–683 (2001)

    Article  MATH  Google Scholar 

  6. Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S.: Image steganographic scheme based on pixel-value differencing and lsb replacement methods. Images Signal Processing 152(5), 611–615 (2005)

    Article  Google Scholar 

  7. Park, Y.-R., Kang, H.-H., Shin, S.-U., Kwon, K.-R.: A steganographic scheme in digital images using information of neighboring pixels. In: Wang, L., Chen, K., Ong, Y.S. (eds.) ICNC 2005. LNCS, vol. 3612, pp. 962–967. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  8. Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recognition Letters 24(9-10), 1613–1626 (2003)

    Article  MATH  Google Scholar 

  9. Chang, C.C., Tseng, H.W.: A steganographic method for digital images using side match. Pattern Recognition Letters 25(12), 1431–1437 (2004)

    Article  Google Scholar 

  10. Wang, C.-M., Wu, N.-I., Tsai, C.-S., Hwang, M.-S.: A high quality steganographic method with pixel-value differencing and modulus function. Journal of System Software 81, 150–158 (2008)

    Article  Google Scholar 

  11. Yang, C.-H., Weng, C.-Y., Wang, S.-J., Sun, H.-M.: Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Transactions on Information Forensics and Security 3(3), 488–497 (2008)

    Article  Google Scholar 

  12. Liao, X., Wen, Q.-Y., Zhang, J.: A steganographic method for digital images with four-pixel differencing and modified lsb substitution. Journal Visual Communication and Image Representation 22, 1–8 (2011)

    Article  Google Scholar 

  13. McIntyre, D.R., Pechura, M.A.: Data compression using static Huffman code-decode tables. Communications of ACM 28, 612–616 (1985)

    Article  Google Scholar 

  14. Jeong, J.C., Jo, J.M.: Adaptive huffman coding of 2-d dct coefficients for image sequence compression. SP:IC 7(1), 1–11 (1995)

    Google Scholar 

  15. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key crypto-systems. Communications of the ACM 21(2), 120–126 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  16. Stallings, W.: Cryptography and Network Security: Principles and Practices, 4th edn. Pearson Education Pvt. Ltd., India (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Nag, A., Singh, J.P., Biswas, S., Sarkar, D., Sarkar, P.P. (2014). A Huffman Code Based Image Steganography Technique. In: Gupta, P., Zaroliagis, C. (eds) Applied Algorithms. ICAA 2014. Lecture Notes in Computer Science, vol 8321. Springer, Cham. https://doi.org/10.1007/978-3-319-04126-1_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04126-1_22

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04125-4

  • Online ISBN: 978-3-319-04126-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics