Abstract
Now-a-days, Internet becomes a big source for sharing information. When people share the data or information over the internet, they keep two important factors in their minds reliability and security. To achieve these factors, people are always trying to adopt new ideas. Image steganography is one of the famous method that is used to hide the secret data in the carrier image in the way that the carrier image having the secret data/information should not be detectable by human visual system (HVS). So we are going to design an approach for image steganography in which we will use the hash based technique with three Least Significant Bits method in the order of RGB 3-2-3 respectively. Our proposed approach will show the strong capability to read the information from text file and hide it in the image of any format like bmp, gif, jpg, jpeg and tiff without destroying the picture quality of stego image. No distortion in the image quality is detectable by Human Visual System. Experiments show that our proposed approach is providing better imperceptibility rate. So it enhances its security. Our proposed approach works efficiently as it is hash based. Every time it generates random hash key value. So it is not possible for any attacker or unauthorized person to get the hash key value. Hash Techniques improves its performance. Least Significant Bit Method makes it simple. Our proposed technique has also the high embedding capacity rate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cheddad, A.: Digital image steganography: survey and analysis of current methods. Signal process. 90(3), 727–752 (2010)
Ghebleh, M.: A robust chaotic algorithm for digital image steganography. Commun. Nonlinear Sci. Numer. Simul. 19(6), 1898–1907 (2014)
Swain, G.: Digital image steganography using variable length group of bits substitution. Proc. Comput. Sci. 85, 31–38 (2016)
Yogi, N.: A survey on data conceal and protection in digital image (2016)
Garg, N., Kaur, K.: Hybrid information security model for cloud storage systems using hybrid data security scheme. Int. Res. J. Eng. Technol. (IRJET) 3, 2194–2196 (2016)
Kanan, H.R.: A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst. Appl. 41(14), 6123–6130 (2014)
Jafari, R.: Increasing image compression rate using steganography. Expert Syst. Appl. 40(17), 6918–6927 (2013)
Manjula, G.R.: A novel hash based least significant bit (2-3-3) image steganography in spatial domain. arXiv preprint arXiv:1503.03674 (2015)
Cheong, S.N.: Secure encrypted steganography graphical password scheme for near field communication smartphone access control system. Expert Syst. Appl. 41(7), 3561–3568 (2014)
Mao, Q.: A fast algorithm for matrix embedding steganography. Digit. Signal Proc. 25, 248–254 (2014)
Roy, R.: Chaos based edge adaptive image steganography. Proc. Technol. 10, 138–146 (2013)
Nagaraj, V.: Color image steganography based on pixel value modification method using modulus function. IERI Proc. 4, 17 (2013)
Cao, L., Jung, C.: Combining visual saliency and pattern masking for image steganography. In: 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 320–323. IEEE (2015)
Mohapatra, C.: A review on current methods and application of digital image steganography. Int. J. Multidiscip. Approach Stud., 2(2). (2015)
Jain, M.: A review of digital image steganography using LSB and LSB array. Int. J. Appl. Eng. Res. 11(3), 1820–1824 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Aqeel, I., Raheel, M. (2019). Digital Image Steganography by Using a Hash Based LSB (3-2-3) Technique. In: Bajwa, I., Kamareddine, F., Costa, A. (eds) Intelligent Technologies and Applications. INTAP 2018. Communications in Computer and Information Science, vol 932. Springer, Singapore. https://doi.org/10.1007/978-981-13-6052-7_61
Download citation
DOI: https://doi.org/10.1007/978-981-13-6052-7_61
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-6051-0
Online ISBN: 978-981-13-6052-7
eBook Packages: Computer ScienceComputer Science (R0)