Skip to main content

Classification of Image Steganography in Substitution Technique

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1187))

Abstract

The science of communicating secret data using multimedia cover like audio, image, video files, etc. is called steganography. The technique steganography is used for hiding a secret data from unauthorized access or user. Steganography technique can be implemented using many different file formats, or in other words we can use different file formats as cover media but here we would talk about Digital Image-based Steganography for its obvious advantages. Also, we know that rapid and unimaginable developments in digital image processing methods make researcher work even more harder to achieve the ultimate objectives of steganography like robustness, security, resistance to different attacks, and payload capacity. The steganography method also confirms that the methodology or technique also increases the quality of the stego image keeping secure the secret data. The quality measures are PSNR and MSE. Through the following paper, we will study various states of art methods for steganography and compare the same so that it would be a great and ready reference material for the research scholars who are working on Digital Image Steganography.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. N.G. Kini, V.G.A. Kini, A secured steganography algorithm for hiding an image in an image. In Integrated Intelligent Computing, Communication and Security (Springer, Singapore, 2018), pp. 539–546

    Google Scholar 

  2. D. Ghosh, A.K. Chattopadhyay, A. Nag, A novel approach of image steganography with encoding and location selection, in Proceedings of International Ethical Hacking Conference 2018 (Springer, Singapore, 2018), pp. 115–124

    Google Scholar 

  3. P. Agrawal, A. Upadhyay, An implementation of text and color image steganography technique using cryptographic algorithm. Asian J. Comput. Sci. Technol. (2018)

    Google Scholar 

  4. M. Mohamed, F. Al-Afari, M.A. Bamatraf, Data hiding by LSB substitution using genetic optimal key-permutation. Int. Arab J. e-Technol 2(1), 11–17 (2011)

    Google Scholar 

  5. R. Bhuvanya, K. Vijayalakshmi, S. Uma, A. Suresh, Secret data sharing using steganography and image processing (2018)

    Google Scholar 

  6. H. Kaur, J. Rani, A survey on different techniques of steganography, in MATEC Web of Conferences. EDP Sciences, vol. 57 (2016), p. 02003

    Google Scholar 

  7. N.G. Kini, V.G. Kini, A parallel algorithm to hide an image in an image for secured steganography, in Integrated Intelligent Computing, Communication and Security (Springer, Singapore, 2018), pp. 585–594

    Google Scholar 

  8. P. Gupta, J. Bhagat, Image steganography using LSB substitution facilitated by shared password, in International Conference on Innovative Computing and Communications (Springer, Singapore, 2018), pp. 369–376

    Google Scholar 

  9. A. Cheddad, J. Condell, K. Curran, P. Mc Kevitt, Biometric inspired digital image steganography, in 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (2008) (IEEE, 2008), pp. 159–168

    Google Scholar 

  10. T. Kumari, K. Singh, A review on information hiding methods. Int. J. Eng. Sci. Comput. 17474 (2018)

    Google Scholar 

  11. M.S. Subhedar, V.H. Mankar, Current status and key issues in image steganography: a Survey. Comput. Sci. Rev. 13, 95–113 (2014)

    Article  Google Scholar 

  12. A.K. Agrahari, M. Sheth, N. Praveen, Comprehensive survey on image steganography using LSB with AES. Int. J. Appl. Eng. Res. 13(8), 5841–5844 (2018)

    Google Scholar 

  13. S. Bhattaryya, A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier. J. Global Res. Comput. Sci. 2(4) (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Krishna Vaidya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Vaidya, K., Kargathara, A., Kumbharana, C.K. (2021). Classification of Image Steganography in Substitution Technique. In: Rathore, V.S., Dey, N., Piuri, V., Babo, R., Polkowski, Z., Tavares, J.M.R.S. (eds) Rising Threats in Expert Applications and Solutions. Advances in Intelligent Systems and Computing, vol 1187. Springer, Singapore. https://doi.org/10.1007/978-981-15-6014-9_29

Download citation

Publish with us

Policies and ethics