Advertisement

Perspective Based Variable Key Encryption in LSB Steganography

  • Rajib Biswas
  • Gaurav Dutta Chowdhury
  • Samir Kumar Bandhyopadhyay
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 28)

Abstract

We have explored a new dimension in image steganography and propose a deft method for image– secret data – keyword (steg key) based sampling, encryption and embedding the former with a variable bit retrieval function. The keen association of the image, secret data and steg key, varied with a pixel dependant embedding results in a highly secure, reliable L.S.B. substitution. Meticulous statistical analyses have been provided to emphasize the strong immunity of the algorithm to the various steganalysis methods in the later sections of the paper.

Keywords

Steganography Steganalysis Pixel Sampling Encryption Decryption Steg key LSB Substitution 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ker, A.D.: Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters 12(6), 441–444 (2005)CrossRefGoogle Scholar
  2. 2.
    Chan, C.-K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recognition 37(3), 469–474 (2004)CrossRefMATHGoogle Scholar
  3. 3.
    Hetzl, S., Mutzel, P.: A Graph–Theoretic Approach to Steganography. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol. 3677, pp. 119–128. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  4. 4.
    Cummins, J., Diskin, P., Lau, S., Parlett, R.: Steganography and Digital Watermarking. School of Computer Science. The University of BirminghamGoogle Scholar
  5. 5.
    Cachin, C.: An information-theoretic model for steganography. Information and Computation 192, 41–56 (2004)MathSciNetCrossRefMATHGoogle Scholar
  6. 6.
    Pfitzmann, B.: Information hiding terminology. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 347–350. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  7. 7.
    Chandramouli, R., Kharrazi, M., Memon, N.: Image Steganography and Steganalysis: Concepts and Practice. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 35–49. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  8. 8.
    Chandramouli, R., Memon, N.: Analysis of LSB based image steganography techniques. In: IEEE International Conference on Image Processing, pp. 1019–1022 (2001)Google Scholar
  9. 9.
    Fridrich, J., Goljan, M., Dui, R.: Reliable Detection of LSB Steganography in Color and Grayscale Images. In: Proceedings of the ACM Workshop on Multimedia and Security, pp. 27–30 (2001)Google Scholar
  10. 10.
    Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 355–372. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  11. 11.
    Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 218–239. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  12. 12.
    Vanmathi, C., Prabu, S.: A Survey of State of the Art techniques of Steganography. International Journal of Engineering and Technology 5(1), 376–379 (2013)Google Scholar
  13. 13.
    Trivedi, S., Chandramouli, R.: Secret key estimation in sequential steganography. IEEE Transactions on Signal Processing 53(2), 746–757 (2005)MathSciNetCrossRefGoogle Scholar
  14. 14.
    Hamdaqa, M., Tahvildari, L.: ReLACK: A Reliable VoIP Steganography Approach. In: Fifth International Conference on Secure Software Integration and Reliability Improvement, pp. 189–197 (2011)Google Scholar
  15. 15.
    Fridrich, J., Lisonek, P.: Grid Colorings in Steganography. IEEE Transactions on Information Theory 53(4), 1547–1549 (2007)MathSciNetCrossRefMATHGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Rajib Biswas
    • 1
  • Gaurav Dutta Chowdhury
    • 2
  • Samir Kumar Bandhyopadhyay
    • 3
  1. 1.Department of Information TechnologyHeritage Institute of TechnologyKolkataIndia
  2. 2.C-DAC KolkataKolkataIndia
  3. 3.Department of Computer Science and EngineeringUniversity of CalcuttaKolkataIndia

Personalised recommendations