Skip to main content

Selected Bit Replacement Steganography Over SMQT Preprocessed Digital Image

  • Conference paper
  • First Online:
Proceedings of Fourth International Conference on Soft Computing for Problem Solving

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 336))

Abstract

The current challenge of steganography is to minimize detection accuracy when payload is high. There are powerful stego-detectors by which the presence of a secret embedded in digital images can be found out with high accuracy. The need for this study is to develop a novel steganography scheme that is strong against attacks and large in payload capacity. In view of this, we propose an enhanced image steganography scheme with preprocessed digital cover image through successive mean quantization transform (SMQT) enhancement. It has a preprocessing stage called SMQT before embedding. During the embedding stage, we propose an advanced spatial domain technique, namely selected pixels bit replacement (SPBR). This method helps to choose pixels that are insignificant to the original view of the cover image and embed digital secret inside without eliciting any suspicion. The goal of this proposed scheme is to minimize the detection rate with large payload. An ensemble steganalyzer is used to estimate the embedding capacity of each cover image, and a comparison is done between classical PQ steganography and the proposed SPBR steganography. The imperceptibility of the stego-image is verified with peak signal-to-noise ratio. We present several experiments that show the effectiveness of the proposed steganography scheme in improving the security of stego-images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Stalling, W.: Cryptography and Network Security-Principles and Practice, 4th edn. Pearson Prentice Hall of India P. Ltd, India (2006)

    Google Scholar 

  2. Shih, Y.F.: Digital Watermarking and Steganography Fundamentals and Technique. CRC Press, Taylor & Francis Group, Boca Raton, London (2008)

    Google Scholar 

  3. Petitcolas, F., Katzenbeisser, S.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech house, inc., Norwood (2000)

    Google Scholar 

  4. Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE J. Sel. Areas in Commun. 16(4), 474–481 (1998) (Special Issue on Copyright and Privacy Protection)

    Google Scholar 

  5. Chan, C.K., Chen, L.M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  6. Chang, C.C., Pai, P.Y., Yeh, C.M. , Chan, Y.K.: A high payload frequency-based reversible image hiding method. Inf. Sci. 180, 2286–2298 (2010)

    Google Scholar 

  7. Nilsson, M., Dahl, M., Claesson, I.: The successive mean quantization transform. In: Proceeding of International Conference on Acoustics, Speech, and Signal Processing, pp. 429–432 (2005)

    Google Scholar 

  8. Lie, W.N., Chang, L.C.: Data hiding in images with adaptive numbers of least significant bits based on the human visual system. In: Proceedings of IEEE International Conference on Image Processing, vol. 1, pp. 286–290 (1999)

    Google Scholar 

  9. Chang, C.C., Lin, C.Y., Wang, Y.Z.: A high payload VQ steganography method for binary images. In: Proceedings of the 6th International Workshop on Digital Watermarking, pp. 467–481 (2006)

    Google Scholar 

  10. Hsieh, Yi-Pei, Chang, Chin-Chen, Liu, Li-Jen: A two-codebook combination and three-phase block matching based image-hiding scheme with high embedding capacity. Pattern Recogn. 41(10), 3104–3113 (2008)

    Article  MATH  Google Scholar 

  11. Lou, D.C. et.al.: A novel adaptive steganography based on local complexity and human vision sensitivity. J. Sys. Softw. 83, 1236–1248 (2010)

    Google Scholar 

  12. Cheddad, A., Condell, J., Curran, K., Kevitt, P.M.: Digital image steganography: survey and analysis of current methods. Sig. Process. 90(3), 727–752 (2010)

    Article  MATH  Google Scholar 

  13. Kodovský, J., Fridrich, J., Holub, V.: Ensemble Classifiers for Steganalysis of Digital Media. IEEE, New York

    Google Scholar 

  14. Dietterich, T.G.: Ensemble methods in machine learning. Multiple Classifier Systems. LNCS, vol. 1857, pp. 1–15. Springer, Berlin (2001)

    Google Scholar 

  15. Munteanu, C., Rosa, A.: Towards automatic image enhancement using genetic algorithms. In: Proceedings of the 2000 Congress on Evolutionary Computation, vol. 2, pp. 1535–1542 (2000)

    Google Scholar 

  16. Wang, C.M., Wu, N.I., Tsai, C.S., Hwang, M.S.: A high quality steganography method with pixel-value differencing and modulus function. J. Syst. Softw. 81(1), 150–158 (2008)

    Article  Google Scholar 

  17. Thien, C.C., Lin, J.C.: A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recogn. 36(11), 2875–2881 (2003)

    Article  MATH  Google Scholar 

  18. Chang, C.C., .Lin, C.Y., Wang, Y.Z.: New image steganographic methods using run-length approach. Inf. Sci. 176, 3393–3408 (2006)

    Google Scholar 

  19. www.mathworks.com/help/images/ref/impixelinfoval.html

  20. Dong, Y., Han, K.: Boosting SVM classifiers by ensemble. In: Proceeding of 14th International ACM Conference on World Wide Web, pp. 1072–1073 (2005)

    Google Scholar 

  21. Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography with wet paper codes. In: Proceeding of ACM Multimedia Workshop, Germany (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Jithesh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Jithesh, K., Anto, P.B., Reshma, P.K., Aravindhan, M. (2015). Selected Bit Replacement Steganography Over SMQT Preprocessed Digital Image. In: Das, K., Deep, K., Pant, M., Bansal, J., Nagar, A. (eds) Proceedings of Fourth International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 336. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2220-0_43

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2220-0_43

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2219-4

  • Online ISBN: 978-81-322-2220-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics