Skip to main content

Digital Image Steganography by Using a Hash Based LSB (3-2-3) Technique

  • Conference paper
  • First Online:
Intelligent Technologies and Applications (INTAP 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 932))

Included in the following conference series:

Abstract

Now-a-days, Internet becomes a big source for sharing information. When people share the data or information over the internet, they keep two important factors in their minds reliability and security. To achieve these factors, people are always trying to adopt new ideas. Image steganography is one of the famous method that is used to hide the secret data in the carrier image in the way that the carrier image having the secret data/information should not be detectable by human visual system (HVS). So we are going to design an approach for image steganography in which we will use the hash based technique with three Least Significant Bits method in the order of RGB 3-2-3 respectively. Our proposed approach will show the strong capability to read the information from text file and hide it in the image of any format like bmp, gif, jpg, jpeg and tiff without destroying the picture quality of stego image. No distortion in the image quality is detectable by Human Visual System. Experiments show that our proposed approach is providing better imperceptibility rate. So it enhances its security. Our proposed approach works efficiently as it is hash based. Every time it generates random hash key value. So it is not possible for any attacker or unauthorized person to get the hash key value. Hash Techniques improves its performance. Least Significant Bit Method makes it simple. Our proposed technique has also the high embedding capacity rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cheddad, A.: Digital image steganography: survey and analysis of current methods. Signal process. 90(3), 727–752 (2010)

    Google Scholar 

  2. Ghebleh, M.: A robust chaotic algorithm for digital image steganography. Commun. Nonlinear Sci. Numer. Simul. 19(6), 1898–1907 (2014)

    Google Scholar 

  3. Swain, G.: Digital image steganography using variable length group of bits substitution. Proc. Comput. Sci. 85, 31–38 (2016)

    Google Scholar 

  4. Yogi, N.: A survey on data conceal and protection in digital image (2016)

    Google Scholar 

  5. Garg, N., Kaur, K.: Hybrid information security model for cloud storage systems using hybrid data security scheme. Int. Res. J. Eng. Technol. (IRJET) 3, 2194–2196 (2016)

    Google Scholar 

  6. Kanan, H.R.: A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst. Appl. 41(14), 6123–6130 (2014)

    Google Scholar 

  7. Jafari, R.: Increasing image compression rate using steganography. Expert Syst. Appl. 40(17), 6918–6927 (2013)

    Google Scholar 

  8. Manjula, G.R.: A novel hash based least significant bit (2-3-3) image steganography in spatial domain. arXiv preprint arXiv:1503.03674 (2015)

  9. Cheong, S.N.: Secure encrypted steganography graphical password scheme for near field communication smartphone access control system. Expert Syst. Appl. 41(7), 3561–3568 (2014)

    Google Scholar 

  10. Mao, Q.: A fast algorithm for matrix embedding steganography. Digit. Signal Proc. 25, 248–254 (2014)

    Google Scholar 

  11. Roy, R.: Chaos based edge adaptive image steganography. Proc. Technol. 10, 138–146 (2013)

    Google Scholar 

  12. Nagaraj, V.: Color image steganography based on pixel value modification method using modulus function. IERI Proc. 4, 17 (2013)

    Google Scholar 

  13. Cao, L., Jung, C.: Combining visual saliency and pattern masking for image steganography. In: 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 320–323. IEEE (2015)

    Google Scholar 

  14. Mohapatra, C.: A review on current methods and application of digital image steganography. Int. J. Multidiscip. Approach Stud., 2(2). (2015)

    Google Scholar 

  15. Jain, M.: A review of digital image steganography using LSB and LSB array. Int. J. Appl. Eng. Res. 11(3), 1820–1824 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Imra Aqeel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aqeel, I., Raheel, M. (2019). Digital Image Steganography by Using a Hash Based LSB (3-2-3) Technique. In: Bajwa, I., Kamareddine, F., Costa, A. (eds) Intelligent Technologies and Applications. INTAP 2018. Communications in Computer and Information Science, vol 932. Springer, Singapore. https://doi.org/10.1007/978-981-13-6052-7_61

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-6052-7_61

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-6051-0

  • Online ISBN: 978-981-13-6052-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics