Image steganography based on LSB using various scanning methods in spatial domain

https://doi.org/10.53730/ijhs.v6nS3.7552

Authors

  • K. S. Suresh Dept. of Computer Science, Rajeswari Vedachalam Government Arts College, Chengalpattu, Research Scholar, VISTAS, Chennai, India
  • T. Kamalakannan Head, Department of Information Technology, School of Computing Sciences, Vels Institute of Science, Technology and Advanced Studies (VISTAS), Chennai, India

Keywords:

steganography, LSB, PVD, stego-image, PSNR, MSE

Abstract

Data security plays a vital role in the field of Information Technology. Cryptography and Steganography methods are widely used to enforce security efficiently. In Spatial Domain, many steganography methods are available such as LSB, PVD etc. These existing methods always suffer from the quality, security trade off. In this paper, we proposed an enhanced LSB method to deal with such tradeoffs. The proposed method achieves the goal by employing variable embedding patterns and the results with optimized PSNR, MSE and entropy values evidently show that the quality and security are well balanced by the proposed method.

Downloads

Download data is not yet available.

References

R. P. V.Tyagi, A.kumar, "Image Steganography Using Least Significant Bit With Cryptography," J. Glob. Res. Comput. Sci. Res. Pap. Available Online www.jgrcs.info IMAGE, vol. 3, no. 3, 2012.

S. Gupta,Ankur Goyal and B. Bhushan, "Information Hiding Using Least Significant Bit Steganography and Cryptography," Int. J. Mod. Educ. Comput. Sci., vol. 4, no. 6, 2012, doi: 10.5815/ijmecs.2012.06.04.

J. Silman, "Steganography and Steganalysis: An Overview," SANS Institute, no. May, 2001.

S. B. Sasi, N. Sivanandam, and Emeritus, "A survey on cryptography using optimisation algorithms in WSNs," Indian J. Sci. Technol., vol. 8, no. 3, 2015, doi: 10.17485/ijst/2015/v8i3/59585.

Y. F. Huang, S. Tang, and Y. Zhang, "Detection of covert voice-over Internet protocol communications using sliding window-based steganalysis," IET Commun., vol. 5, no. 7, 2011, doi: 10.1049/iet-com.2010.0348.

W. Mazurczyk, "VoIP steganography and its detection-a survey," ACM Computing Surveys, vol. 46, no. 2. 2013, doi: 10.1145/2543581.2543587.

V. Raja and S. Rajalakshmi, "Pearl pixel steganographic method for grayscale images using location-array method," Int. J. Eng. Adv. Technol., vol. 8, no. 6, 2019, doi: 10.35940/ijeat.F9049.088619.

H. Kayarkar and S. Sanyal, "A Survey on Various Data Hiding Techniques and their Comparative Analysis," Acta Tech. Corvininesis - Bull. Eng., vol. 5, no. 3, pp. 35-40., 2012, [Online]. Available: http://arxiv.org/abs/1206.1957.

Raja.V and Rajalakshmi.S, "An improved adaptive digital image steganography based on pixel value differencing by rotation of base pixels," Int. J. Pure Appl. Math., vol. 119, no. 15, pp. 649–659, 2018.

M. O. Islam, M. S. Hossain, M. S. H. Siddique, and D. K. Saha, "Improving the non-filtering steganographic algorithm using LSB verification method," 2014, doi: 10.1109/ICEEICT.2014.6919106.

J. C. T. Arroyo and A. J. P. Delima, "LSB image steganography with data compression technique using goldbach G0 code algorithm," Int. J. Emerg. Trends Eng. Res., vol. 8, no. 7, pp. 3259–3264, 2020, doi: 10.30534/ijeter/2020/62872020.

C. K. Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognit., vol. 37, no. 3, pp. 469–474, 2004, doi: 0.1016/j.patcog.2003.08.007.

V. Raja and S. Rajalakshmi, "Divide and Conquer Steganography Model," Int. J. Comput. Appl., vol. 91, no. 15, 2014, doi: 10.5120/15960-5356.

J. R. Jayapandiyan, C. Kavitha, and K. Sakthivel, "Enhanced Least Significant Bit Replacement Algorithm in Spatial Domain of Steganography Using Character Sequence Optimisation," IEEE Access, vol. 8, pp. 136537–136545, 2020, doi: 10.1109/ACCESS.2020.3009234.

J. Sang, H. Xiang, and H. Hu, "Discrete Fourier transform-based information steganography," Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal Huazhong Univ. Sci. Technol. (Natural Sci. Ed., vol. 36, no. 8, 2008.

A. S. Khashandarag, A. H. Navin, M. K. Mirnia, and H. H. Agha Mohammadi, "An optimised color image steganography using LFSR and DFT techniques," in Communications in Computer and Information Science, 2011, vol. 176 CCIS, no. PART 2, doi: 10.1007/978-3-642-21802-6_40.

C. H. Yang, C. Y. Weng, S. J. Wang, and H. M. Sun, "Varied PVD + LSB evading detection programs to spatial domain in data embedding systems," J. Syst. Softw., vol. 83, no. 10, 2010, doi: 10.1016/j.jss.2010.03.081.

C. H. Yang, C. Y. Weng, S. J. Wang, and H. M. Sun, "Adaptive data hiding in edge areas of images with spatial LSB domain systems," IEEE Trans. Inf. Forensics Secur., vol. 3, no. 3, 2008, doi: 10.1109/TIFS.2008.926097.

Z. Li and Y. He, "Steganography with pixel-value differencing and modulus function based on PSO," J. Inf. Secur. Appl., vol. 43, pp. 47–52, 2018, doi: 10.1016/j.jisa.2018.10.006.

M. Hussain, A. W. A. Wahab, Y. I. Bin Idris, A. T. S. Ho, and K. H. Jung, "Image steganography in spatial domain: A survey," Signal Process. Image Commun., vol. 65, 2018, doi: 10.1016/j.image.2018.03.012.

Z. H. Wang, C. C. Chang, and M. C. Li, "Optimising least-significant-bit substitution using cat swarm optimisation strategy," Inf. Sci. (Ny)., vol. 192, 2012, doi: 10.1016/j.ins.2010.07.011.

H. B. Kekre, A. A. Athawale, and U. A. Athawale, "Increased cover capacity using advanced multiple LSB algorithms," 2011, doi: 10.1145/1980022.1980029.

J. Zhang and D. Zhang, "Detection of LSB matching steganography in decompressed images," IEEE Signal Process. Lett., vol. 17, no. 2, pp. 141–144, 2010, doi: 10.1109/LSP.2009.2035379.

S. Sarreshtedari and M. A. Akhaee, "One-third probability embedding: A new ±1 histogram compensating image least significant bit steganography scheme," IET Image Process., vol. 8, no. 2, 2014, doi: 10.1049/iet-ipr.2013.0109.

K. Qazanfari and R. Safabakhsh, "A new steganography method which preserves histogram: Generalisation of LSB++," Inf. Sci. (Ny)., vol. 277, pp. 90–101, Sep. 2014, doi: 10.1016/J.INS.2014.02.007.

P. Sallee, "MODEL-BASED METHODS for STEGANOGRAPHY and STEGANALYSIS," Int. J. Image Graph., vol. 5, no. 1, pp. 167–189, Jan. 2005, doi: 10.1142/S0219467805001719.

T. Zhang and X. Ping, "A new approach to reliable detection of LSB steganography in natural images," Signal Processing, vol. 83, no. 10, pp. 2085–2093, Oct. 2003.

Z. Gao, G. Tang, and S. Wang, "A Novel VoIP Steganography Method Based on Bayesian Network and Matrix Embedding," Jisuanji Yanjiu yu Fazhan/Computer Res. Dev., vol. 55, no. 4, 2018, doi: 10.7544/issn1000-1239.2018.20161042.

A. Alabaichi, M. A. A. K. Al-Dabbas, and A. Salih, "Image steganography using least significant bit and secret map techniques," Int. J. Electr. Comput. Eng., vol. 10, no. 1, pp. 935–946, 2020, doi: 10.11591/ijece.v10i1.pp935-946.

A. K. Sahu, G. Swain, M. Sahu, and J. Hemalatha, "Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP," J. Inf. Secur. Appl., vol. 58, no. March, p. 102808, 2021, doi: 10.1016/j.jisa.2021.102808.

M. Khodaei and K. Faez, "New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing," IET Image Process., vol. 6, no. 6, 2012, doi: 10.1049/iet-ipr.2011.0059.

H. H. Liu, P. C. Su, and M. H. Hsu, "An Improved Steganography Method Based on Least-Significant-Bit Substitution and Pixel-Value Differencing," KSII Trans. Internet Inf. Syst., vol. 14, no. 11, pp. 4537–4556, 2020, doi: 10.3837/tiis.2020.11.016.

Published

18-05-2022

How to Cite

Suresh, K. S., & Kamalakannan, T. (2022). Image steganography based on LSB using various scanning methods in spatial domain. International Journal of Health Sciences, 6(S3), 6820–6834. https://doi.org/10.53730/ijhs.v6nS3.7552

Issue

Section

Peer Review Articles