Skip to main content

Data Hiding in Images Using Some Efficient Steganography Techniques

  • Conference paper
Book cover Signal Processing, Image Processing and Pattern Recognition (SIP 2011)

Abstract

Steganography is the art of hiding data in a seemingly innocuous cover medium. For example – any sensitive data can be hidden inside a digital image. Steganography provides better security than cryptography because cryptography hides the contents of the message but not the existence of the message. So no one apart from the authorized sender and receiver will be aware of the existence of the secret data. Steganographic messages are often first encrypted by some traditional means and then a cover image is modified in some way to contain the encrypted message. The detection of steganographically encoded packages is called steganalysis. In this paper, we propose three efficient Steganography techniques that are used for hiding secret messages. They are LSB based Steganography, Steganography using the last two significant bits and Steganography using diagonal pixels of the image. Symmetric and asymmetric key cryptography has been used to encrypt the message.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Johnson, N.F., Jajodia, S.: Exploring Steganography: Seeing the Unseen. Computer 31(2), 26–34 (1998)

    Article  Google Scholar 

  2. Artz, D.: Digital Steganography: Hiding Data within Data. In: IEEE Internet Computing, pp. 75–80 (2001)

    Google Scholar 

  3. Li, X., Wang, J.: A Steganographic Method based Upon JPEG and Particle Swarm Optimization Algorithm. Information Sciences 177(15), 3099–3109 (2007)

    Article  Google Scholar 

  4. Chandramouli, R., Memon, N.D.: Analysis of LSB based image steganography techniques. In: IEEE International Conference on Image Processing, vol. 3, pp. 1019–1022 (2001)

    Google Scholar 

  5. Kutter, M., Hartung, F.: Introduction to Watermarking Techniques in Information Techniques for Steganography and Digital Watermarking. In: Katzenbeisser, S.C. (ed.), pp. 97–119. Artec House (1999)

    Google Scholar 

  6. Mohamed, M., Al-Afari, F., Bamatraf, M.: Data Hiding by LSB Substitution Using Genetic Optimal Key-Permutation. International Arab Journal of e-Technology 2(1), 11–17 (2011)

    Google Scholar 

  7. Wang, R.Z., Lin, C.F., Lin, J.C.: Image Hiding by Optimal LSB Substitution and Genetic Algorithm. Pattern Recognition 34(3), 671–683 (2001)

    Article  MATH  Google Scholar 

  8. Chang, C.C., Hsiaob, J.Y., Chan, C.S.: Finding Optimal Least-Significant-bit Substitution in Image Hiding by Dynamic Programming Strategy. Pattern Recognition 36, 1583–1595 (2003)

    Article  Google Scholar 

  9. Chan, C.K., Cheng, L.M.: Hiding Data in Images by Simple LSB Substitution. Pattern Recognition 37(3), 469–474 (2004)

    Article  MATH  Google Scholar 

  10. Krenn, J.R.: Steganography and Steganalysis. XIDC.NL (2004)

    Google Scholar 

  11. Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Maiti, C., Baksi, D., Zamider, I., Gorai, P., Kisku, D.R. (2011). Data Hiding in Images Using Some Efficient Steganography Techniques. In: Kim, Th., Adeli, H., Ramos, C., Kang, BH. (eds) Signal Processing, Image Processing and Pattern Recognition. SIP 2011. Communications in Computer and Information Science, vol 260. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27183-0_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27183-0_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27182-3

  • Online ISBN: 978-3-642-27183-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics