Skip to main content

Stego with Color Cue

  • Conference paper
  • First Online:
  • 2074 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 324))

Abstract

The ontogenesis of technology has paved way for an upsurge in cyber-crime too. In fact, the rate at which this happens overheads even the Moore’s law. Steganography is a tool which supports us in elucidating the above facts. Here, we have proposed four methodologies in image steganography. First method deals with gray image, and the subsequent methods encounter color image. Pixel indicator technique is used for selecting the plane of embedding for color images. Embedding is done in block segmentation fashion. We have devised a novel mod4 methodology which tells us about the order of embedding, number of bits to be embedded in each pixel as well as about indicator channel in PIT and also tremendously escalates the randomization. OPAP technique reduces error for an enhanced image quality. MSE, PSNR, and the brute-force attack values of the above proposed methodologies have been simulated and displayed.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. A. Gutub, Pixel indicator technique for RGB image steganography. J. Emerg. Technol. Web Intell. 2(1), 56–64 (2010)

    Google Scholar 

  2. B. Schneier, Applied Cryptography Protocols, Algorithm and Source Code in C (wiley, New Jersey, 2007)

    Google Scholar 

  3. C.K. Chan, L.M. Chen, Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  4. S. Katzenbeisser, F.A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking (Artech House, London, 2000)

    Google Scholar 

  5. L.M. Marvel, C.G. Boncelet Jr, C.T. Retter, Spread spectrum image steganography. IEEE Trans. Image Process. 8(8), 1075–1083 (1999)

    Article  Google Scholar 

  6. J. Mielikainen, LSB Matching Revisited. IEEE Sig. Process. Lett. 13(5), 285–287 (2006)

    Article  Google Scholar 

  7. F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, Information hiding-A survey. Proc. IEEE 87(7), 1062–1078 (1999)

    Google Scholar 

  8. N. Provos, P. Honeyman, Hide and seek: an introduction to steganography. IEEE Secur. Priv. Mag. 1(3), 32–44 (2003)

    Article  Google Scholar 

  9. R. Gonzalez, R. Woods, Digital image processing (2002)

    Google Scholar 

  10. C.C. Thien, J.C. Lin, A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recogn. 36(11), 2875–2881 (2003)

    Article  MATH  Google Scholar 

  11. T.-C. Lu, S.-R. Liao, P.-L. Chen, C.-C. Chang, Z.-H. Wang, Information hiding technology based on block-segmentation strategy, in ISECS International Colloquium on Computing, Communication, Control, and Management (2009), pp. 500–506

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. R. Raajan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Raajan, N.R., Balasubraminayan, G., Barath Krishna, B., Ramya, S., Malligaraj, M., Karthikeyan, K. (2015). Stego with Color Cue. In: Suresh, L., Dash, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, vol 324. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2126-5_48

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2126-5_48

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2125-8

  • Online ISBN: 978-81-322-2126-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics