Abstract
The paper presents some preliminary results concerning modification of the least significant bit steganography method. Using r - indiscernibility relations one can embed some information in the container in a semi-random way, whereas it can be reconstructed in a deterministic way. The combination of bits of RGB Bytes allows the bits of information to be hidden by means of a fixed mask. Each Byte of a pixel that contains a fixed combination of bits indiscernible in the fixed ratio with the mask may store the bit of information in the least significant bit. The bits indiscernible in other ratios form random gaps that leads to hiding the presence of information. In the paper we have implemented some steganography systems to test our approach by hiding the image in a cover picture.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Artiemjew, L.: “Lost in time” - wooden bas-relief from the collection of Lech Artiemjew artistic activity. https://www.facebook.com/lech.artiemjew
Baluja, S.: Hiding images within images. IEEE Trans. Pattern Anal. Mach. Intell. (2019)
Guillermito: BMP chi-square attack v0.1
Morkel, T., Eloff, J.H., Olivier, M.S.: An overview of image steganography. In: ISSA, pp. 1–11 (2005)
Krenn, R.: Steganography and steganalysis. http://www.krenn.nl/univ/cry/steg/article.pdf
Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. Computer 31(2), 26–34 (1998)
Wang, H., Wang, S.: Cyber warfare: steganography vs. steganalysis. Commun. ACM 47(10), 76–82 (2004)
Silman, J.: Steganography and steganalysis: an overview, Sans Institute. https://www.researchgate.net/publication/242743284_Steganography_and_Steganalysis_An_Overview
Neeta, D., Snehal, K., Jacobs, D.: Implementation of LSB steganography and its evaluation for various bits. In: 1st International Conference on Digital Information Management, Portugal, pp. 173–178, 19–21 September 2006
Partow, A.: C++ Bitmap Library. http://partow.net/programming/bitmap/index.html
Pawlak, Z.: Rough sets. Int. J. Comput. Inf. Sci. 11, 341–356 (1982)
Polkowski, L.: Rough Sets: Mathematical Foundations. Physica Verlag, Heidelberg (2002)
Polkowski, L.: Formal granular calculi based on rough inclusions. In: Proceedings of IEEE 2005 Conference on Granular Computing, GrC 2005, Beijing, China, pp. 57–62. IEEE Press (2005)
Polkowski, L.: Granulation of knowledge in decision systems: the approach based on rough inclusions. The method and its applications. In: Kryszkiewicz, M., Peters, J.F., Rybinski, H., Skowron, A. (eds.) RSEISP 2007. LNCS (LNAI), vol. 4585, pp. 69–79. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73451-2_9
Polkowski, L.: A unified approach to granulation of knowledge and granular computing based on rough mereology: a survey. In: Pedrycz, W., Skowron, A., Kreinovich, V. (eds.) Handbook of Granular Computing, pp. 375–400. Wiley, Chichester (2008)
Polkowski, L.: Approximate Reasoning by Parts: An Introduction to Rough Mereology. Intelligent Systems Reference Library. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22279-5
Polkowski, L., Artiemjew, P.: Granular Computing in Decision Approximation - An Application of Rough Mereology. ISRL. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-12880-1
Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000). https://doi.org/10.1007/10719724_5
Wozniak, M., Polap, D.: Object detection and recognition via clustered features. Neurocomputing 320, 76–84 (2018)
Zadeh, L.A.: Fuzzy sets and information granularity. In: Gupta, M., Ragade, R., Yager, R.R. (eds.) Advances in Fuzzy Set Theory and Applications, pp. 3–18. North-Holland, Amsterdam (1979)
BeFunky’s all-in-one online Creative Platform - Photo Editing and Graphic Design Made for Everyone. https://www.befunky.com/
Acknowledgements
The research has been supported by grant 23.610.007-300 from Ministry of Science and Higher Education of the Republic of Poland.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Artiemjew, P., Kislak-Malinowska, A. (2019). Using r-indiscernibility Relations to Hide the Presence of Information for the Least Significant Bit Steganography Technique. In: Damaševičius, R., Vasiljevienė, G. (eds) Information and Software Technologies. ICIST 2019. Communications in Computer and Information Science, vol 1078. Springer, Cham. https://doi.org/10.1007/978-3-030-30275-7_17
Download citation
DOI: https://doi.org/10.1007/978-3-030-30275-7_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30274-0
Online ISBN: 978-3-030-30275-7
eBook Packages: Computer ScienceComputer Science (R0)