ILSB: Indicator-Based LSB Steganography

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 309)


The age-old LSB steganography is one of the easiest and most commonly used data-hiding techniques. Although higher payload delivery can be achieved, it has poor acceptance due to the perceivable impact it leaves on the cover media. Our proposed algorithm strengthens the LSB encoding by not only minimizing the perceivable distortion but also making original message reconstruction by an attacker highly impossible, due to vast key-space. The bit replacement process is guided by a selected indicator color channel, and the embedding sequence is controlled by an indicator pattern table value indexed by the secret message bits. For efficient extraction at the receiver end, the indicator and other metadata are hidden inside the same cover in the form of a header. Encryption of data and header by RC4 cipher adds another layer of security.


Information security LSB Indicator StegoRect Header Metric of distortion LSB enhancement Neighborhood Pixel difference PoV 


  1. 1.
    Raja, K.B., Chowdary, C.R., Venugopal, K.R., Patnaik, L.M.: A secure image steganography using lsb, dct and compression techniques on raw images. In: 3rd International Conference on Intelligent Sensing and Information Processing (ICISIP), pp. 171–176 (2005)Google Scholar
  2. 2.
    Bailey, K., Curran, K.: An evaluation of image based steganography methods using visual inspection and automated detection techniques. Multimedia Tools Appl. 30(1), 55–88 (2006)CrossRefGoogle Scholar
  3. 3.
    Gutub, A., Ankeer, M., Abu-Ghalioun, M., Shaheen, A., Alvi, A.: Pixel indicator high capacity technique for RGB image based steganography. In: 5th IEEE International Workshop on Signal Processing and its Applications (WoSPA), University of Sharjah, Sharjah, U.A.E (2008)Google Scholar
  4. 4.
    Parvez, M.T., Gutub, A.A.: RGB intensity based variable-bits image steganography. In: Proceedings of 3rd IEEE Asia-Pacific Services Computing Conference (APSCC), Yilan, Taiwan (2008)Google Scholar
  5. 5.
    Gutub, A., Al-Qahtani, A., Tabakh, A.: Triple-A: Secure RGB image steganography based on randomization. In: ACS International Conference on Computer Systems and Applications, pp. 400–403. Rabat, Morocco (2009)Google Scholar
  6. 6.
    Bagchi, N.: Secure BMP image steganography using dual security model (I.D.E.A, image intensity and bit randomization) and max-bit algorithm. Int. J. Comput. Appl. 1(21), 18–22 (2010)Google Scholar
  7. 7.
    Hossain, M., Haque, S.A., Sharmin, F.: Variable rate steganography in gray scale digital images using neighborhood pixel information. In: Proceedings of 12th International Conference on Computer and Information Technology (ICCIT 2009), Dhaka, Bangladesh (2009)Google Scholar
  8. 8.
    Karim, S.M.M., Rahman, M.S., Hossain, M.I.: A new approach for LSB based image steganography using secret key. In: 14th International Conference on Computer and Information Technology (ICCIT 2011), Dhaka, Bangladesh (2011)Google Scholar
  9. 9.
    Sun, H.M., Wang, K.H.: A LSB substitution compatible steganography. In: IEEE region 10 conference (TENCON 2007) (2007)Google Scholar
  10. 10.
    Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Information Hiding, LNCS, vol. 1768. Springer, Heidelberg (1999)Google Scholar
  11. 11.
    Westfeld, A.: Detecting low embedding rates. In: F.A.P. Petitcolas (ed.), Information Hiding. 5th International Workshop, pp. 324–339. Springer, Berlin (2003)Google Scholar
  12. 12.
    Zhang, T., Ping, X.: Reliable detection of LSB steganography based on the difference image histogram. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 03), vol. 3 (2003)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringNational Institute of Technology AgartalaAgartalaIndia

Personalised recommendations