Image steganography based on LSB using various scanning methods in spatial domain
Keywords:
steganography, LSB, PVD, stego-image, PSNR, MSEAbstract
Data security plays a vital role in the field of Information Technology. Cryptography and Steganography methods are widely used to enforce security efficiently. In Spatial Domain, many steganography methods are available such as LSB, PVD etc. These existing methods always suffer from the quality, security trade off. In this paper, we proposed an enhanced LSB method to deal with such tradeoffs. The proposed method achieves the goal by employing variable embedding patterns and the results with optimized PSNR, MSE and entropy values evidently show that the quality and security are well balanced by the proposed method.
Downloads
References
R. P. V.Tyagi, A.kumar, "Image Steganography Using Least Significant Bit With Cryptography," J. Glob. Res. Comput. Sci. Res. Pap. Available Online www.jgrcs.info IMAGE, vol. 3, no. 3, 2012.
S. Gupta,Ankur Goyal and B. Bhushan, "Information Hiding Using Least Significant Bit Steganography and Cryptography," Int. J. Mod. Educ. Comput. Sci., vol. 4, no. 6, 2012, doi: 10.5815/ijmecs.2012.06.04.
J. Silman, "Steganography and Steganalysis: An Overview," SANS Institute, no. May, 2001.
S. B. Sasi, N. Sivanandam, and Emeritus, "A survey on cryptography using optimisation algorithms in WSNs," Indian J. Sci. Technol., vol. 8, no. 3, 2015, doi: 10.17485/ijst/2015/v8i3/59585.
Y. F. Huang, S. Tang, and Y. Zhang, "Detection of covert voice-over Internet protocol communications using sliding window-based steganalysis," IET Commun., vol. 5, no. 7, 2011, doi: 10.1049/iet-com.2010.0348.
W. Mazurczyk, "VoIP steganography and its detection-a survey," ACM Computing Surveys, vol. 46, no. 2. 2013, doi: 10.1145/2543581.2543587.
V. Raja and S. Rajalakshmi, "Pearl pixel steganographic method for grayscale images using location-array method," Int. J. Eng. Adv. Technol., vol. 8, no. 6, 2019, doi: 10.35940/ijeat.F9049.088619.
H. Kayarkar and S. Sanyal, "A Survey on Various Data Hiding Techniques and their Comparative Analysis," Acta Tech. Corvininesis - Bull. Eng., vol. 5, no. 3, pp. 35-40., 2012, [Online]. Available: http://arxiv.org/abs/1206.1957.
Raja.V and Rajalakshmi.S, "An improved adaptive digital image steganography based on pixel value differencing by rotation of base pixels," Int. J. Pure Appl. Math., vol. 119, no. 15, pp. 649–659, 2018.
M. O. Islam, M. S. Hossain, M. S. H. Siddique, and D. K. Saha, "Improving the non-filtering steganographic algorithm using LSB verification method," 2014, doi: 10.1109/ICEEICT.2014.6919106.
J. C. T. Arroyo and A. J. P. Delima, "LSB image steganography with data compression technique using goldbach G0 code algorithm," Int. J. Emerg. Trends Eng. Res., vol. 8, no. 7, pp. 3259–3264, 2020, doi: 10.30534/ijeter/2020/62872020.
C. K. Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognit., vol. 37, no. 3, pp. 469–474, 2004, doi: 0.1016/j.patcog.2003.08.007.
V. Raja and S. Rajalakshmi, "Divide and Conquer Steganography Model," Int. J. Comput. Appl., vol. 91, no. 15, 2014, doi: 10.5120/15960-5356.
J. R. Jayapandiyan, C. Kavitha, and K. Sakthivel, "Enhanced Least Significant Bit Replacement Algorithm in Spatial Domain of Steganography Using Character Sequence Optimisation," IEEE Access, vol. 8, pp. 136537–136545, 2020, doi: 10.1109/ACCESS.2020.3009234.
J. Sang, H. Xiang, and H. Hu, "Discrete Fourier transform-based information steganography," Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal Huazhong Univ. Sci. Technol. (Natural Sci. Ed., vol. 36, no. 8, 2008.
A. S. Khashandarag, A. H. Navin, M. K. Mirnia, and H. H. Agha Mohammadi, "An optimised color image steganography using LFSR and DFT techniques," in Communications in Computer and Information Science, 2011, vol. 176 CCIS, no. PART 2, doi: 10.1007/978-3-642-21802-6_40.
C. H. Yang, C. Y. Weng, S. J. Wang, and H. M. Sun, "Varied PVD + LSB evading detection programs to spatial domain in data embedding systems," J. Syst. Softw., vol. 83, no. 10, 2010, doi: 10.1016/j.jss.2010.03.081.
C. H. Yang, C. Y. Weng, S. J. Wang, and H. M. Sun, "Adaptive data hiding in edge areas of images with spatial LSB domain systems," IEEE Trans. Inf. Forensics Secur., vol. 3, no. 3, 2008, doi: 10.1109/TIFS.2008.926097.
Z. Li and Y. He, "Steganography with pixel-value differencing and modulus function based on PSO," J. Inf. Secur. Appl., vol. 43, pp. 47–52, 2018, doi: 10.1016/j.jisa.2018.10.006.
M. Hussain, A. W. A. Wahab, Y. I. Bin Idris, A. T. S. Ho, and K. H. Jung, "Image steganography in spatial domain: A survey," Signal Process. Image Commun., vol. 65, 2018, doi: 10.1016/j.image.2018.03.012.
Z. H. Wang, C. C. Chang, and M. C. Li, "Optimising least-significant-bit substitution using cat swarm optimisation strategy," Inf. Sci. (Ny)., vol. 192, 2012, doi: 10.1016/j.ins.2010.07.011.
H. B. Kekre, A. A. Athawale, and U. A. Athawale, "Increased cover capacity using advanced multiple LSB algorithms," 2011, doi: 10.1145/1980022.1980029.
J. Zhang and D. Zhang, "Detection of LSB matching steganography in decompressed images," IEEE Signal Process. Lett., vol. 17, no. 2, pp. 141–144, 2010, doi: 10.1109/LSP.2009.2035379.
S. Sarreshtedari and M. A. Akhaee, "One-third probability embedding: A new ±1 histogram compensating image least significant bit steganography scheme," IET Image Process., vol. 8, no. 2, 2014, doi: 10.1049/iet-ipr.2013.0109.
K. Qazanfari and R. Safabakhsh, "A new steganography method which preserves histogram: Generalisation of LSB++," Inf. Sci. (Ny)., vol. 277, pp. 90–101, Sep. 2014, doi: 10.1016/J.INS.2014.02.007.
P. Sallee, "MODEL-BASED METHODS for STEGANOGRAPHY and STEGANALYSIS," Int. J. Image Graph., vol. 5, no. 1, pp. 167–189, Jan. 2005, doi: 10.1142/S0219467805001719.
T. Zhang and X. Ping, "A new approach to reliable detection of LSB steganography in natural images," Signal Processing, vol. 83, no. 10, pp. 2085–2093, Oct. 2003.
Z. Gao, G. Tang, and S. Wang, "A Novel VoIP Steganography Method Based on Bayesian Network and Matrix Embedding," Jisuanji Yanjiu yu Fazhan/Computer Res. Dev., vol. 55, no. 4, 2018, doi: 10.7544/issn1000-1239.2018.20161042.
A. Alabaichi, M. A. A. K. Al-Dabbas, and A. Salih, "Image steganography using least significant bit and secret map techniques," Int. J. Electr. Comput. Eng., vol. 10, no. 1, pp. 935–946, 2020, doi: 10.11591/ijece.v10i1.pp935-946.
A. K. Sahu, G. Swain, M. Sahu, and J. Hemalatha, "Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP," J. Inf. Secur. Appl., vol. 58, no. March, p. 102808, 2021, doi: 10.1016/j.jisa.2021.102808.
M. Khodaei and K. Faez, "New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing," IET Image Process., vol. 6, no. 6, 2012, doi: 10.1049/iet-ipr.2011.0059.
H. H. Liu, P. C. Su, and M. H. Hsu, "An Improved Steganography Method Based on Least-Significant-Bit Substitution and Pixel-Value Differencing," KSII Trans. Internet Inf. Syst., vol. 14, no. 11, pp. 4537–4556, 2020, doi: 10.3837/tiis.2020.11.016.
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.