Abstract
We present here a novel steganographic method based on Huffman coding and the least significant bit substitution in order to provide high embedding capacity, a strong security and imperceptible visual quality to secret message. Every eight bits of the secret image are first encoded by building a Huffman tree. After that those encoded bits of secret image are divided into 4 groups. Each part has a decimal value between 0 to 3. These decimal values determine the location where to embed the message in a particular pixel of cover image. To embed the message we just put a one in the corresponding location in a pixel of the cover image which identified by the decimal values of the secret image. Since Huffman Table reduces the size of the original image, an attacker cannot easily recover from the stego image those fine details of the original image that would enable him to mount a reliable attack. We have got comparable visual quality as the Peak Signal to Noise Ratio values lie between 30 dB to 31 dB.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cheddad, A., Condell, J., Curran, K., McKevitt, P.: Digital image steganography: Survey and analysis of current methods. Signal Processing 90, 727–752 (2010)
Nag, A., Biswas, S., Sarkar, D., Sarkar, P.P.: A novel technique for image steganography based on block-DCT and Huffman encoding. International Journal of Computer Science and Information Technology 2(3), 103–111 (2010)
Nag, A., Biswas, S., Sarkar, D., Sarkar, P.P.: A novel technique for image steganography based on DWT and Huffman encoding. International Journal of Computer Science and Security 4(5), 561–570 (2010)
Bender, D.W., Gruhl, N.M., Lu, A.: Techniques for data hiding. IBM Systems Journal 35, 313–316 (1996)
Wang, R.Z., Lin, C.F., Lin, J.C.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition 34(3), 671–683 (2001)
Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S.: Image steganographic scheme based on pixel-value differencing and lsb replacement methods. Images Signal Processing 152(5), 611–615 (2005)
Park, Y.-R., Kang, H.-H., Shin, S.-U., Kwon, K.-R.: A steganographic scheme in digital images using information of neighboring pixels. In: Wang, L., Chen, K., Ong, Y.S. (eds.) ICNC 2005. LNCS, vol. 3612, pp. 962–967. Springer, Heidelberg (2005)
Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recognition Letters 24(9-10), 1613–1626 (2003)
Chang, C.C., Tseng, H.W.: A steganographic method for digital images using side match. Pattern Recognition Letters 25(12), 1431–1437 (2004)
Wang, C.-M., Wu, N.-I., Tsai, C.-S., Hwang, M.-S.: A high quality steganographic method with pixel-value differencing and modulus function. Journal of System Software 81, 150–158 (2008)
Yang, C.-H., Weng, C.-Y., Wang, S.-J., Sun, H.-M.: Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Transactions on Information Forensics and Security 3(3), 488–497 (2008)
Liao, X., Wen, Q.-Y., Zhang, J.: A steganographic method for digital images with four-pixel differencing and modified lsb substitution. Journal Visual Communication and Image Representation 22, 1–8 (2011)
McIntyre, D.R., Pechura, M.A.: Data compression using static Huffman code-decode tables. Communications of ACM 28, 612–616 (1985)
Jeong, J.C., Jo, J.M.: Adaptive huffman coding of 2-d dct coefficients for image sequence compression. SP:IC 7(1), 1–11 (1995)
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key crypto-systems. Communications of the ACM 21(2), 120–126 (1978)
Stallings, W.: Cryptography and Network Security: Principles and Practices, 4th edn. Pearson Education Pvt. Ltd., India (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Nag, A., Singh, J.P., Biswas, S., Sarkar, D., Sarkar, P.P. (2014). A Huffman Code Based Image Steganography Technique. In: Gupta, P., Zaroliagis, C. (eds) Applied Algorithms. ICAA 2014. Lecture Notes in Computer Science, vol 8321. Springer, Cham. https://doi.org/10.1007/978-3-319-04126-1_22
Download citation
DOI: https://doi.org/10.1007/978-3-319-04126-1_22
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-04125-4
Online ISBN: 978-3-319-04126-1
eBook Packages: Computer ScienceComputer Science (R0)