Skip to main content
Log in

Undetectable least significant bit replacement steganography

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper we propose a novel method based on Inverse Transitions for increasing the security of Least Significant Bit (LSB) replacement steganography. Before hiding data using LSB replacement, cover image is preprocessed using inverse transitions. The preprocessing modifies the LSBs in such a way that the resulting change in pixel values can not occur with LSB replacement. The proposed method ensures \(100\%\) undetectability for payload up to 1.5 bpp in colour images against most accurate length estimation methods for LSB replacement. The proposed method is faster, does not require any additional storage and ensures complete recovery of hidden data in comparison to state of the art steganography methods. The proposed method can be used in resource constrained applications which demand fast and secure data hiding and loss less recovery of hidden data.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Abdulrahman H, Chaumont M, Montesinos M, Magnier B (2015) Color image steganalysis, using correlations between RGB channels. In: Proc Int Conf Avail, Reliab, security, France, pp 448– 454

  2. Chandramouli R, Li G, Memon N (2002) Adaptive steganography. SPIE, San Jose, pp 69–78

    Google Scholar 

  3. Dumitrescu S, Wu X (2005) A new framework of LSB steganalysis of digital media. IEEE Trans Signal Process 53:3936–3947

    Article  MathSciNet  Google Scholar 

  4. Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process 51:1995–2007

    Article  Google Scholar 

  5. Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in colour and grey-scale images. Magazine of IEEE Multimedia 8:22–28

    Article  Google Scholar 

  6. Fridrich J, Kodovsky J (2012) Steganalysis of LSB replacement using parity-aware features. Springer, LNCS, Berkeley, pp 31–45

    Google Scholar 

  7. Fridrich J, Kodovsky J (2013) Multivariate gaussian model for designing additive distortion for steganography. In: Proc IEEE Int Conf Acoust, Speech, Signal process, Canada, pp 2949–2953

  8. Goljan M, Fridrich J, Cogranne R (2014) Rich model for steganalysis of color images. In: Proc IEEE Int workshop on information forensics and security, pp 185–190

  9. Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: Proc IEEE Int workshop Inf Forensics security, Spain, pp 234–239

  10. Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in arbitrary domain, EURASIP. J Inf Security 2014:1–13

    Article  Google Scholar 

  11. Ker A. (2004) Quantitative evaluation of pairs and RS steganalysis. SPIE, San Jose, pp 83–97

    Google Scholar 

  12. Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In: Proc IEEE Int Conf image process, France, pp 4026–4210

  13. Li B, Wang M, Li X, Tan S, Huang J (2015) A strategy of clustering modification directions in spatial image steganography. IEEE Trans Inf Forensics Secur 10:1905–1917

    Article  Google Scholar 

  14. Liao X, Chen G, Li Q, Liu J (2015) Improved WOW adaptive image steganography method. In: IEEE Int Conf on algorithms and architectures for parallel processing, Switzerland, pp 695– 702

  15. Liao X, Chen G, Yin J (2016) Content adaptive steganalysis for color images. Security and Communication Networks 9:5756–5763

    Article  Google Scholar 

  16. Liao X, Ding L (2015) Data hiding in digital image using four pixel-value-differencing and multiple-base notational. In: IEEE Int Conf on intelligent information hiding and multimedia signal processing, pp 76–80

  17. Liao X, Guo S, Yin J, Wang H, Li X, Sangariah AK (2017) New cubic reference table based image steganography. Multimedia Tools and Applications

  18. Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146–156

    Article  Google Scholar 

  19. Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28:21–27

    Article  Google Scholar 

  20. Liu W, Liu G, Dai Y (2014) Syndrome Trellis Codes based on Minimal Span Generator Matrix. Ann Telecommun 69:403–416

    Article  Google Scholar 

  21. Lu P, Luo X, Tang Q, Shen L (2004) An improved sample pairs method for detection of LSB embedding. Springer, LNCS, Canada, pp 116–127

    Google Scholar 

  22. Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13:285–287

    Article  Google Scholar 

  23. Pevny T, Filler T, Bas P (2010) Using high dimensional image models to perform highly undetectable steganography. Springer, LNCS, Canada, pp 161–177

    Google Scholar 

  24. Schaefer G, Stich M (2004) UCID - an uncompressed colour image database. IEEE, San Jose, pp 472–480

    Google Scholar 

  25. Sharp T (2001) An implementation of key-based digital signal steganography. Springer, LNCS, Pittsburgh, pp 13–26

    MATH  Google Scholar 

  26. Shreelekshmi R, Wilscy M, Veni Madhavan CE (2010) Image classification for more reliable steganalysis. Springer , Berlin, pp 66–74

    MATH  Google Scholar 

  27. Shreelekshmi R, Wilscy M, Veni Madhavan CE (2013) Improved LSB steganalysis based on analysis of adjacent pixel pairs. Signal, Image and Video Processing 7:811–816

    Article  Google Scholar 

  28. Tang W, Li B, Luo W, Huang J (2016) Clustering steganographic modification directions for color components. IEEE Signal Process Lett 23:197–201

    Article  Google Scholar 

  29. Tao Z, Xijian P (2003) Reliable Detection of LSB Steganography based on the Difference Image Histogram, 545–548, IEEE

  30. Wu D, Tsai W (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24:1613–1626

    Article  Google Scholar 

  31. Yang CH, Weng CY, Wang SJ, Sun HM (2008) Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans Inf Forensics Secur 3:488–497

    Article  Google Scholar 

  32. Zhang X, Wang S (2004) Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recogn Lett 25:331–339

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the Kerala State Council for Science Technology and Environment [grant number 149/ 2012/ KSCSTE].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Shreelekshmi.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shreelekshmi, R., Wilscy, M. & Madhavan, C.E.V. Undetectable least significant bit replacement steganography. Multimed Tools Appl 78, 10565–10582 (2019). https://doi.org/10.1007/s11042-018-6541-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6541-0

Keywords

Navigation