Abstract
Steganography is the process of hiding data inside audio, video, and image sources using various encoding methods. This paper presents a novel steganography algorithm that hides files in images using a combination of strong symmetric AES encryption, random pixel selection, and encoding in least-significant bits. The algorithm is implemented in Python 3 and made publicly available as part of a steganography tool, BPStegano. An evaluation using five steganalysis techniques shows that the new algorithm is effective and secure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kaur, H., Rani, J.: A survey on different techniques of steganography. In: MATEC Web of Conferences, vol. 57, p. 02003 (2016). https://doi.org/10.1051/matecconf/20165702003
Muyco, S.D., Hernandez, A.A.: A modified hash based least significant bits algorithm for steganography. In: Proceedings of the 2019 4th International Conference on Big Data and Computing, Series ICBDC 2019, pp. 215–220. ACM, New York (2019). https://doi.org/10.1145/3335484.3335514
Meshram, A.G., Patil, R.: Secure secret key transfer using modified hash based LSB method. Int. J. Comput. Sci. Inf. Technol. 5, 3 (2014)
Dasgupta, K., Mandal, J.K., Dutta, P.: Hash based least significant bit technique for video steganography HLSB. Int. J. Secur. Priv. Trust Manag. (IJSPTM) 1(2), 11 (2014)
Joshi, K., Gill, S., Yadav, R.: A new method of image steganography using 7th bit of a pixel as indicator by introducing the successive temporary pixel in the gray scale image. J. Comput. Netw. Commun. 2018, 10. https://www.hindawi.com/journals/jcnc/2018/9475142/
Al-Husainy, M., Uliyan, D.: A secret-key image steganography technique using random chain codes. Int. J. Technol. 10, 731–740 (2019)
Kaur, G., Kochhar, A.: A steganography implementation based on LSB & DCT. Int. J. Sci. Emerging Technol. Latest Trends 4, 7 (2012)
Abed, S., Al-Mutairi, M., Al-Watyan, A., Al-Mutairi, O., AlEnizy, W., Al-Noori, A.: An automated security approach of video steganography-based LSB using FPGA implementation. J. Circuits Syst. Comput. 28(05), 1950083 (2019). https://doi.org/10.1142/S021812661950083X
Alia, M.A., Maria, K.A., Alsarayreh, M.A., Maria, E.A., Almanasra, S.: An improved video steganography: using random key-dependent. In: 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), pp. 234–237, April 2019
Islam, S., Modi, M.R., Gupta, P.: Edge-based image steganography. EURASIP J. Inf. Secur. 2014(1), 8 (2014)
Mukherjee, S., Roy, S., Sanyal, G.: Image steganography using mid position value technique. Proc. Comput. Sci. 132, 461–468. http://www.sciencedirect.com/science/article/pii/S1877050918308949
Zin, W.W., Soe, T.N.: Implementation and analysis of three steganographic approaches. In: 2011 3rd International Conference on Computer Research and Development, vol. 2, pp. 456–460, March 2011
Cybertruck. https://www.tesla.com/cybertruck
Space shuttle project—NASA image and video library. https://images.nasa.gov/details-8898508
imgonline-com-ua. https://www.imgonline.com.ua/eng/difference-between-two-images.php
Online image diff - website for easy online image comparison. https://online-image-comparison.com/faq
Online image diff - website for easy online image comparison. https://online-image-comparison.com/result
Horé, A., Ziou, D.: Image quality metrics: PSNR vs. SSIM. In: 2010 20th International Conference on Pattern Recognition, pp. 2366–2369, August 2010
Kaur, H., Sohi, N.: A study for applications of histogram in image enhancement. Int. J. Eng. Sci. 06, 59–63 (2017)
Tapan, S.: TapanSoni/BPStegano. original-date: 2019-12-07T03:23:31Z. https://github.com/TapanSoni/BPStegano
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Soni, T., Baird, R., Lobo, A., Heydari, V. (2021). Using Least-Significant Bit and Random Pixel Encoding with Encryption for Image Steganography. In: Choo, KK.R., Morris, T., Peterson, G.L., Imsand, E. (eds) National Cyber Summit (NCS) Research Track 2020. NCS 2020. Advances in Intelligent Systems and Computing, vol 1271. Springer, Cham. https://doi.org/10.1007/978-3-030-58703-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-58703-1_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-58702-4
Online ISBN: 978-3-030-58703-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)