An LSB Substitution with Bit Inversion Steganography Method

Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 43)

Abstract

Several works have been proposed and implemented for image Steganography using LSB substitution. In this paper, a module based LSB substitution method is implemented, which is further improved by using a novel bit inversion technique. The substitution method hides the message data after compressing smoother areas of the image in a lossless way, resulting in fewer number of modified cover image pixels. After this, a bit inversion technique is applied. In the bit inversion technique, certain LSBs of pixels of cover image are changed if they occur with a particular pattern. In this way, less number of pixels is modified. So PSNR of stego-image is improved. For correct de-steganography, the bit patterns for which LSBs has inverted needs to be stored within the stego-image somewhere.

Keywords

LSB substitution Bit inversion Steganography PSNR Image quality 

References

  1. 1.
    Sencar, H.T., Ramkumar, M., Akansu, A.N.: Data hiding fundamentals and applications: content security in digital multimedia. Access Online via Elsevier (2004)Google Scholar
  2. 2.
    Cox, I., et al.: Digital watermarking and steganography. Morgan Kaufmann (2007)Google Scholar
  3. 3.
    Chan, C.K., Cheng, L.M.: Hiding data in image by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)MATHCrossRefGoogle Scholar
  4. 4.
    Chang, C.-C., Tseng, H.W.: Data hiding in images by hybrid LSB substitution. In: International Conference on Multimedia and Ubiquitous Engineering. IEEE (2009)Google Scholar
  5. 5.
    Akhtar, N., Johri, P., Khan, S.: Enhancing the security and quality of LSB based image steganography. In: IEEE International Conference on Computational Intelligence and Computer Networks (CICN), Mathura, India, 27–29 Sept. 2013Google Scholar
  6. 6.
    Mohamed, M., Afari, F., Bamatraf, M.: Data hiding by LSB substitution using genetic optimal key-permutation. Int. Arab J. e-Technol. 2.1, 11–17 (2011)Google Scholar
  7. 7.
    Kessler, C.: Steganography: hiding data within data. An edited version of this paper with the title “Hiding Data in Data”. Windows & .NET Magazine. http://www.garykessler.net/library/steganography.html (2001)
  8. 8.
    Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: 3rd International Workshop on Information Hiding (IHW 99), pp. 61–76 (1999)Google Scholar
  9. 9.
    Fridrich, J., Goljan, M., Du, R.: Detecting LSB Steganography in color and gray images. Magazine of IEEE Multimedia (Special Issue on Security), Oct.-Nov. 22–28 (2001)Google Scholar
  10. 10.
    Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. Springer LNCS 2578, 355–372 (2003)Google Scholar
  11. 11.
    Chen, S.-K.: A module-based LSB substitution method with lossless secret data compression. Comput. Stand. Interf. 33(4), 367–371 (2011)MATHCrossRefGoogle Scholar
  12. 12.
    Cheddad, A., et al.: Digital image steganography: survey and analysis of current methods. Signal Process. 90.3, 727–752 (2010)Google Scholar
  13. 13.
    Akhtar, N., Bano, A., Islam, F.: An improved module based substitution steganography method. In: Fourth IEEE International Conference on Communication Systems and Network Technologies (CSNT), pp. 695–699 (2014)Google Scholar
  14. 14.
    The USC-SIPI Image Database http://sipi.usc.edu/database/

Copyright information

© Springer India 2016

Authors and Affiliations

  1. 1.Department of Computer EngineeringZakir Husain College of Engineering & Technology, Aligarh Muslim UniversityAligarhIndia

Personalised recommendations