Skip to main content

LSB Array Based Image Steganography Technique by Exploring the Four Least Significant Bits

  • Conference paper
Global Trends in Information Systems and Software Applications (ObCom 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 270))

Included in the following conference series:

Abstract

In this paper a new LSB (least significant bit) array based image steganographic technique using encryption by RSA algorithm is proposed. In the image each pixel is 8 bits. The four arrays, namely the LSB, LSB1, LSB2 and LSB3 are formulated separately by collecting the bits from the 8th (LSB), 7th, 6th and 5th bit locations of the pixels respectively. The cipher text is divided into four blocks. The first block is mapped and slided over the LSB array and embedded at maximum matching portion of LSB array. Similarly the second, third and fourth blocks are embedded at maximum matching portion of LSB1, LSB2 and LSB3 arrays respectively. Where the blocks are embedded, the start indices are captured and embedded at a separate place in the image. The retrieving process at the receiver is the reverse of the sender. The performance of this technique is compared with other techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cheddad, A., Condell, J., Curran, K., Kevitt, P.M.: Digital Image Steganography: Survey and Analysis of Current Methods. Signal Processing 90, 727–752 (2010)

    Article  MATH  Google Scholar 

  2. Jain, Y.K., Ahirwal, R.R.: A Novel Image Steganography Method with Adaptive Number of Least Significant Bits Modification Based on Private Stego Keys. International Journal of Computer Science and Security 4(1), 40–49 (2010)

    Google Scholar 

  3. Marvel, L.M.: Spread Spectrum Image Steganography. IEEE Transactions on Image Processing 8(8), 1075–1083 (1999)

    Article  Google Scholar 

  4. Martin, A., Sapiro, G., Seroussi, G.: Is Image Steganography Natural. IEEE Transactions on Image Processing 14(12), 2040–2050 (2005)

    Article  Google Scholar 

  5. Wang, R., Chen, Y.: High Payload Image Steganography Using Two-Way Block Matching. IEEE Signal Processing Letters 13(3), 161–164 (2006)

    Article  Google Scholar 

  6. Kumar, P.M., Roopa, D.: An Image Steganography Framework with Improved Tamper Proofing. Asian Journal of Information Technology 6(10), 1023–1029 (2007)

    Google Scholar 

  7. Zhang, W., Zhang, X., Wang, S.: A Double Layered Plus-Minus One Data Embedding Scheme. IEEE Signal Processing Letters 14(11), 848–851 (2007)

    Article  Google Scholar 

  8. Motameni, H., Norouzi, M., Jahandar, M., Hatami, A.: Labeling Method in Steganography. Proceedings of World Academy of Science, Engineering and Technology 24, 349–354 (2007)

    Google Scholar 

  9. Swain, G., Lenka, S.K.: A Hybrid Approach to Steganography Embedding at Darkest and Brightest Pixels. In: Proceedings of the International Conference on Communication and Computational Intelligence (INCOCCI 2010), pp. 529–534 (2010)

    Google Scholar 

  10. Al-Husainy, M.A.F.: Image Steganography by mapping Pixels to Letters. Journal of Computer Science 5(1), 33–38 (2009)

    Article  Google Scholar 

  11. Wu, D.C., Tsai, W.H.: A Steganograhic Method for Images by Pixel Value Differencing. Pattern Recognition Letters 24(9-10), 1613–1626 (2003)

    Article  MATH  Google Scholar 

  12. Zhang, X., Wang, S.: Vulnerability of Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security. Pattern Recognition Letters 25, 331–339 (2004)

    Article  Google Scholar 

  13. Chang, C.C., Tseng, H.W.: A Steganographic Method for Digital Images Using Side Match. Pattern Recognition Letters 25(12), 1431–1437 (2004)

    Article  Google Scholar 

  14. Juneja, M., Sandhu, P.S.: Designing of Robust Steganography Technique Based on LSB Insertion and Encryption. In: Proceedings of International Conference on Advances in Recent Technologies in Communication and Computing, pp. 302–305 (2009)

    Google Scholar 

  15. Li, B., He, J., Huang, J., She, Y.Q.: A Survey on Image Steganography and Steganalysis. Journal of Information hiding and Multimedia Signal Processing 2(2), 142–172 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Swain, G., Lenka, S.K. (2012). LSB Array Based Image Steganography Technique by Exploring the Four Least Significant Bits. In: Krishna, P.V., Babu, M.R., Ariwa, E. (eds) Global Trends in Information Systems and Software Applications. ObCom 2011. Communications in Computer and Information Science, vol 270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29216-3_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29216-3_52

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29215-6

  • Online ISBN: 978-3-642-29216-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics