A Novel Image Steganography and Steganalysis Technique Based on Pattern Searching

  • Surya Srivastava
  • Prateek Thakral
  • Vani Bansal
  • Vivek Shandil
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 472)

Abstract

Image steganography is a method, which hides a message into a cover image and generates a stego-image. A secret message is embedded into the image as noise, which is nearly impossible to be detected by human eyes. The stego-image is then sent to the receiver who can extract the message with or without stego-key, which depends on the hidden scheme. Most of the hiding techniques hide the message straight away into the significant bits of the image pixels therefore disturbing the resolution, which degrades the quality of the image and makes the image prone to various types of attacks. A new approach that can make the message more secure and enhance the image quality is proposed here. This approach uses LSB substitution method along with the proposed algorithm. The suggested method hides the secret message based on searching the pattern for {00, 01, 10, 11} and matching the above pattern with last two bits of each pixel in RGB format. The secret message along with two RGB images is then taken as an input where the message is converted into binary form first, and the complete algorithm is applied to hide the secret message within the images. Inversely, using the concept of a dictionary file and applying the algorithm accordingly can retrieve the secret message. The proposed method hides and retrieves the message based on a combination of the two images. The two images work as lock and key and both are necessary for proper retrieval of the message. The quality of the image from which the original message is extracted is not affected at all.

Keywords

Image Steganography Pixel matching LSB PSNR ratio MSE 

References

  1. 1.
    Morkel T, Eloff JHP, Olivier MS (2005) An overview of image steganography. In: Proceedings of the fifth annual information security south Africa conference (ISSA2005), June/JulyGoogle Scholar
  2. 2.
    Kaur S, Bansal S, Bansal RK (2014) Steganography and classification of image steganography techniques. In: International conference on computing for sustainable global developmentGoogle Scholar
  3. 3.
    Al-Shatnawi AM (2012) A new method in image steganography with improved image quality. Appl Math Sci 6(79):3907–3915Google Scholar
  4. 4.
    Kumar JNVRS, Vemali C (2014) A novel secure image hiding on indexed images using pixel-matching technique, India 7(3):358–362. ISSN: 0974-6471Google Scholar
  5. 5.
    Tulasidasu M, Lakshmisirisha B, Rasool Reddy K (2015) Steganography based secret image sharing using block division technique. In: IEEE international conference on computation intelligence and communication network IEEE.  https://doi.org/10.1109/CICN.2015.227
  6. 6.
    Alaa A, Altaay J, Sahib SB, Zamani M (2012) An introduction to image steganography techniques. In: International conference on advanced computer science applications and technologiesGoogle Scholar
  7. 7.
    Thangadurai K, Sudha Devi G (2014) An analysis of LSB based image steganography techniques. In: 2014 International conference on computer communication and informatics (ICCCI-2014), 03–05 JanGoogle Scholar
  8. 8.
    Eloff JHP, Olivier MS, Morkel T (2005) An overview of image steganography. In: Proceedings of the fifth annual information security South Africa conference (ISSA 2005), June/JulyGoogle Scholar
  9. 9.
    Nagar P, Mohammad N, Kumar N, Sharma N (2014) A secure implementation and analysis of image steganographic method for data security in clouds. Int J Adv Res Comput Sci Softw Eng. 4(6). ISSN: 2277 128xGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Surya Srivastava
    • 1
  • Prateek Thakral
    • 1
  • Vani Bansal
    • 1
  • Vivek Shandil
    • 1
  1. 1.National Institute of TechnologyKurukshetraIndia

Personalised recommendations