Skip to main content

Using Least-Significant Bit and Random Pixel Encoding with Encryption for Image Steganography

  • Conference paper
  • First Online:
National Cyber Summit (NCS) Research Track 2020 (NCS 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1271))

Included in the following conference series:

Abstract

Steganography is the process of hiding data inside audio, video, and image sources using various encoding methods. This paper presents a novel steganography algorithm that hides files in images using a combination of strong symmetric AES encryption, random pixel selection, and encoding in least-significant bits. The algorithm is implemented in Python 3 and made publicly available as part of a steganography tool, BPStegano. An evaluation using five steganalysis techniques shows that the new algorithm is effective and secure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Kaur, H., Rani, J.: A survey on different techniques of steganography. In: MATEC Web of Conferences, vol. 57, p. 02003 (2016). https://doi.org/10.1051/matecconf/20165702003

  2. Muyco, S.D., Hernandez, A.A.: A modified hash based least significant bits algorithm for steganography. In: Proceedings of the 2019 4th International Conference on Big Data and Computing, Series ICBDC 2019, pp. 215–220. ACM, New York (2019). https://doi.org/10.1145/3335484.3335514

  3. Meshram, A.G., Patil, R.: Secure secret key transfer using modified hash based LSB method. Int. J. Comput. Sci. Inf. Technol. 5, 3 (2014)

    Google Scholar 

  4. Dasgupta, K., Mandal, J.K., Dutta, P.: Hash based least significant bit technique for video steganography HLSB. Int. J. Secur. Priv. Trust Manag. (IJSPTM) 1(2), 11 (2014)

    Google Scholar 

  5. Joshi, K., Gill, S., Yadav, R.: A new method of image steganography using 7th bit of a pixel as indicator by introducing the successive temporary pixel in the gray scale image. J. Comput. Netw. Commun. 2018, 10. https://www.hindawi.com/journals/jcnc/2018/9475142/

  6. Al-Husainy, M., Uliyan, D.: A secret-key image steganography technique using random chain codes. Int. J. Technol. 10, 731–740 (2019)

    Article  Google Scholar 

  7. Kaur, G., Kochhar, A.: A steganography implementation based on LSB & DCT. Int. J. Sci. Emerging Technol. Latest Trends 4, 7 (2012)

    Google Scholar 

  8. Abed, S., Al-Mutairi, M., Al-Watyan, A., Al-Mutairi, O., AlEnizy, W., Al-Noori, A.: An automated security approach of video steganography-based LSB using FPGA implementation. J. Circuits Syst. Comput. 28(05), 1950083 (2019). https://doi.org/10.1142/S021812661950083X

    Article  Google Scholar 

  9. Alia, M.A., Maria, K.A., Alsarayreh, M.A., Maria, E.A., Almanasra, S.: An improved video steganography: using random key-dependent. In: 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), pp. 234–237, April 2019

    Google Scholar 

  10. Islam, S., Modi, M.R., Gupta, P.: Edge-based image steganography. EURASIP J. Inf. Secur. 2014(1), 8 (2014)

    Article  Google Scholar 

  11. Mukherjee, S., Roy, S., Sanyal, G.: Image steganography using mid position value technique. Proc. Comput. Sci. 132, 461–468. http://www.sciencedirect.com/science/article/pii/S1877050918308949

  12. Zin, W.W., Soe, T.N.: Implementation and analysis of three steganographic approaches. In: 2011 3rd International Conference on Computer Research and Development, vol. 2, pp. 456–460, March 2011

    Google Scholar 

  13. Cybertruck. https://www.tesla.com/cybertruck

  14. Space shuttle project—NASA image and video library. https://images.nasa.gov/details-8898508

  15. imgonline-com-ua. https://www.imgonline.com.ua/eng/difference-between-two-images.php

  16. Online image diff - website for easy online image comparison. https://online-image-comparison.com/faq

  17. Online image diff - website for easy online image comparison. https://online-image-comparison.com/result

  18. Horé, A., Ziou, D.: Image quality metrics: PSNR vs. SSIM. In: 2010 20th International Conference on Pattern Recognition, pp. 2366–2369, August 2010

    Google Scholar 

  19. Kaur, H., Sohi, N.: A study for applications of histogram in image enhancement. Int. J. Eng. Sci. 06, 59–63 (2017)

    Article  Google Scholar 

  20. Tapan, S.: TapanSoni/BPStegano. original-date: 2019-12-07T03:23:31Z. https://github.com/TapanSoni/BPStegano

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Tapan Soni , Richard Baird , Andrea Lobo or Vahid Heydari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Soni, T., Baird, R., Lobo, A., Heydari, V. (2021). Using Least-Significant Bit and Random Pixel Encoding with Encryption for Image Steganography. In: Choo, KK.R., Morris, T., Peterson, G.L., Imsand, E. (eds) National Cyber Summit (NCS) Research Track 2020. NCS 2020. Advances in Intelligent Systems and Computing, vol 1271. Springer, Cham. https://doi.org/10.1007/978-3-030-58703-1_9

Download citation

Publish with us

Policies and ethics