An Efficient Lossless Modulus Function Based Data Hiding Method

  • Nadeem Akhtar
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 44)


Data hiding methods are useful for secure communication over the internet. Important data is hidden in cover data that is used as decoy. A lossless data hiding method is judged by the maximum size of secret data that can be hidden without distortion and similarity between the original cover image and stego image. In this work, module based least significant bit substitution methods are studied and a new enhancement is proposed to improve the quality of stego image. The new method divides the cover and secret images in several blocks and compressed secret block is hidden into corresponding cover block using modulo operation. The extra data is stored in the free space that is generated after compression. The quality of stego image in proposed method is better than that of existing methods that hides the secret data using modulo operation.


Data hiding Lossless Modulus function Block processing Compression 


  1. 1.
    Cheddad, A.A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Process. 90(3), 727–752 (2010)Google Scholar
  2. 2.
    Atawneh, S., Almomani1, A., Sumari, P.: Steganography in digital images: common approaches and tools. IETE Tech. Rev. 30(4), 344 (2013)Google Scholar
  3. 3.
    Cheng-Hsing, Y., et al.: Adaptive data hiding in edge areas of images with spatial LSB domain systems. In: IEEE Trans. Inf. Forensics Secur. 3(3), 488–497 (2008)Google Scholar
  4. 4.
    Jin, H.L., Fujiyoshi, M., Kiya, H.: Lossless data hiding in the spatial domain for high quality images. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90(4), 771–777 (2007)Google Scholar
  5. 5.
    Akhtar, N., Johri, P., Khan, S.: Enhancing the security and quality of LSB based image steganography. In: IEEE International Conference on Computational Intelligence and Computer Networks (CICN), Mathura, India. 27–29 Sept 2013Google Scholar
  6. 6.
    Pan, F., Li, J., Yang, X.: International Conference on Electronics, Communications and Control (ICECC), Zhejiang, pp. 282–284, 9–11 Sept 2011Google Scholar
  7. 7.
    Chen, S.-K.: A module-based LSB substitution method with lossless secret data compression. Comput. Stan. Interfaces 33, 367–371 (2011)Google Scholar
  8. 8.
    Thien, C.C., Lin, J.C.: A simple and high-hiding capacity method for hiding digit-by digit data in images based on modulus function. Pattern Recogn. 36, 2875–2881 (2003)CrossRefMATHGoogle Scholar
  9. 9.
    Akhtar, N., Bano, A., Islam, F.: An improved module based substitution steganography method. In: Fourth IEEE International Conference on Communication Systems and Network Technologies (CSNT), pp 695–699 (2014)Google Scholar
  10. 10.
    Chang, C.-C., Hsiao, J.-Y., Chan, C.-S.: Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognit. 36(7), 1583–1595 (2003)Google Scholar
  11. 11.

Copyright information

© Springer India 2016

Authors and Affiliations

  1. 1.Department of Computer EngineeringAligarh Muslim UniversityAligarhIndia

Personalised recommendations