Skip to main content

An Image Steganography Method Using Spread Spectrum Technique

Part of the Advances in Intelligent Systems and Computing book series (AISC,volume 336)

Abstract

In this paper, we present an image steganography method based on spread spectrum technique. In the proposed method, cover image is decomposed into RGB planes. The extracted R, G, and B image planes are converted into orthogonal image planes. Message to be embedded is encrypted with RC4 using key and modulated with orthogonal red image plane using key. Modulated message is embedded into orthogonal blue image plane, generating stego image. Orthogonal red image plane is encrypted using key. Dot product property of orthogonal images is used to extract the secret message. Proposed image steganography method is blind image steganography method, and cover image is not needed to extract the message from the stego image. The recipient only requires keys and encrypted orthogonal red image plane to extract the hidden information. Receiver can extract secret message without cover image, and the proposed image steganography method is not a cover escrow scheme.

Keywords

  • Image steganography
  • Spread spectrum
  • Communication security
  • Orthogonal images
  • Information hiding

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-81-322-2220-0_18
  • Chapter length: 18 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   219.00
Price excludes VAT (USA)
  • ISBN: 978-81-322-2220-0
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   279.99
Price excludes VAT (USA)
Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

References

  1. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(4), 313–336 (1996)

    Google Scholar 

  2. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3–4), 313–336 (1996). doi:10.1147/sj.353.0313

    CrossRef  Google Scholar 

  3. Bhatia, M., Muttoo, S.K., Bhatia, M.P.S.: Steganography based secure communication. In: Proceedings of the Second International Springer Conference on Soft Computing for Problem Solving (SocProS 2012), India (2012)

    Google Scholar 

  4. Bhatia, M., Muttoo, S.K., Bhatia, M.P.S.: Secure group communication protocol. Int. J. Adv. Eng. Sci. Technol. 11(1), 221–225 (2011)

    Google Scholar 

  5. Bhatia, M., Muttoo, S.K., Bhatia, M.P.S.: Secure group communication with hidden group key. Inf. Secur. J. Glob. Perspect. 22(1), 21–34 (2013)

    CrossRef  Google Scholar 

  6. Cox, J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for images, audio and video. In: Proceedings of IEEE International Conference on Image Processing, vol. 111, pp. 243–246, Lausanne, Switzerland, Sept 1996

    Google Scholar 

  7. Fridrich, J.: Symmetric ciphers based on two dimensional chaotic maps. Int. J. Bifurcat. Chaos 8(6), 1259–1284 (1998)

    CrossRef  MATH  MathSciNet  Google Scholar 

  8. Gander, W.: Algorithms for the QR decomposition. Res. Rep. 80(02), 1251–1268 (1980)

    Google Scholar 

  9. Gutub, A., Ankeer, M., Abu-Ghalioun, M., Shaheen, A., Alvi, A.: Pixel indicator high capacity technique for RGB image based steganography. In: Proceedings of the 5th IEEE International Workshop on Signal Processing and its Applications, pp. 18–21, Sharjah, UAE, 18–20 Mar 2008

    Google Scholar 

  10. Keshari, S., Modani, S.G.: Image encryption algorithm based on chaotic map lattice and Arnold cat map for secure transmission. IJCST 2(1), 132–135 (2011)

    Google Scholar 

  11. Kumar, V., Muttoo, S.K.: A graph theoretic approach to sustainable steganography. MIS Rev. Int. J. 17(1), 19–37 (2011)

    Google Scholar 

  12. Lian, S., Sun, J., Wang, Z.: A block cipher based on a suitable use of the chaotic standard map. Chaos, Solitons Fractals 26, 117–129 (2005)

    CrossRef  MATH  Google Scholar 

  13. Muttoo, S.K., Kumar, V.: Hiding message in map along pre Hamiltonian path. Int. J. Inf. Secur. Priv. 4(4), 21–34 (2010). doi:10.4018/jisp.2010100102

    CrossRef  Google Scholar 

  14. Muttoo, S.K., Kumar, V.: Hamiltonian graph approach to steganography. Int. J. Electron. Secur. Digit. Forensic 3(4), 311–332 (2010). doi:10.1504/IJESDF.2010.038612

    CrossRef  Google Scholar 

  15. Smith, J.R., Comisky, B.O.: Modulation and information hiding in images. In: Information Hiding. First International Workshop. Lecture Notes in Computer Science. Springer, Berlin (1996)

    Google Scholar 

  16. Stalling, W.: Cryptography and Network Security: Principles and Practice. Prentice Hall, New York (1999)

    Google Scholar 

  17. Staples, T., Weinman, L.: Adobe Photoshop CS2 for the Web: Hands-on Training. Peachpit Press, San Francisco (2005)

    Google Scholar 

  18. Wang, R.Z., Lin, C.F., Lin, J.C.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn. 34, 671–683 (2000). doi:10.1016/S0031-3203(00)00015-7

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. P. S. Bhatia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Bhatia, M.P.S., Muttoo, S.K., Bhatia, M. (2015). An Image Steganography Method Using Spread Spectrum Technique. In: Das, K., Deep, K., Pant, M., Bansal, J., Nagar, A. (eds) Proceedings of Fourth International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 336. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2220-0_18

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2220-0_18

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2219-4

  • Online ISBN: 978-81-322-2220-0

  • eBook Packages: EngineeringEngineering (R0)