Abstract
In this paper a new LSB (least significant bit) array based image steganographic technique using encryption by RSA algorithm is proposed. In the image each pixel is 8 bits. The four arrays, namely the LSB, LSB1, LSB2 and LSB3 are formulated separately by collecting the bits from the 8th (LSB), 7th, 6th and 5th bit locations of the pixels respectively. The cipher text is divided into four blocks. The first block is mapped and slided over the LSB array and embedded at maximum matching portion of LSB array. Similarly the second, third and fourth blocks are embedded at maximum matching portion of LSB1, LSB2 and LSB3 arrays respectively. Where the blocks are embedded, the start indices are captured and embedded at a separate place in the image. The retrieving process at the receiver is the reverse of the sender. The performance of this technique is compared with other techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cheddad, A., Condell, J., Curran, K., Kevitt, P.M.: Digital Image Steganography: Survey and Analysis of Current Methods. Signal Processing 90, 727–752 (2010)
Jain, Y.K., Ahirwal, R.R.: A Novel Image Steganography Method with Adaptive Number of Least Significant Bits Modification Based on Private Stego Keys. International Journal of Computer Science and Security 4(1), 40–49 (2010)
Marvel, L.M.: Spread Spectrum Image Steganography. IEEE Transactions on Image Processing 8(8), 1075–1083 (1999)
Martin, A., Sapiro, G., Seroussi, G.: Is Image Steganography Natural. IEEE Transactions on Image Processing 14(12), 2040–2050 (2005)
Wang, R., Chen, Y.: High Payload Image Steganography Using Two-Way Block Matching. IEEE Signal Processing Letters 13(3), 161–164 (2006)
Kumar, P.M., Roopa, D.: An Image Steganography Framework with Improved Tamper Proofing. Asian Journal of Information Technology 6(10), 1023–1029 (2007)
Zhang, W., Zhang, X., Wang, S.: A Double Layered Plus-Minus One Data Embedding Scheme. IEEE Signal Processing Letters 14(11), 848–851 (2007)
Motameni, H., Norouzi, M., Jahandar, M., Hatami, A.: Labeling Method in Steganography. Proceedings of World Academy of Science, Engineering and Technology 24, 349–354 (2007)
Swain, G., Lenka, S.K.: A Hybrid Approach to Steganography Embedding at Darkest and Brightest Pixels. In: Proceedings of the International Conference on Communication and Computational Intelligence (INCOCCI 2010), pp. 529–534 (2010)
Al-Husainy, M.A.F.: Image Steganography by mapping Pixels to Letters. Journal of Computer Science 5(1), 33–38 (2009)
Wu, D.C., Tsai, W.H.: A Steganograhic Method for Images by Pixel Value Differencing. Pattern Recognition Letters 24(9-10), 1613–1626 (2003)
Zhang, X., Wang, S.: Vulnerability of Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security. Pattern Recognition Letters 25, 331–339 (2004)
Chang, C.C., Tseng, H.W.: A Steganographic Method for Digital Images Using Side Match. Pattern Recognition Letters 25(12), 1431–1437 (2004)
Juneja, M., Sandhu, P.S.: Designing of Robust Steganography Technique Based on LSB Insertion and Encryption. In: Proceedings of International Conference on Advances in Recent Technologies in Communication and Computing, pp. 302–305 (2009)
Li, B., He, J., Huang, J., She, Y.Q.: A Survey on Image Steganography and Steganalysis. Journal of Information hiding and Multimedia Signal Processing 2(2), 142–172 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Swain, G., Lenka, S.K. (2012). LSB Array Based Image Steganography Technique by Exploring the Four Least Significant Bits. In: Krishna, P.V., Babu, M.R., Ariwa, E. (eds) Global Trends in Information Systems and Software Applications. ObCom 2011. Communications in Computer and Information Science, vol 270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29216-3_52
Download citation
DOI: https://doi.org/10.1007/978-3-642-29216-3_52
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29215-6
Online ISBN: 978-3-642-29216-3
eBook Packages: Computer ScienceComputer Science (R0)