Increased Capacity of Information Hiding in LSB-s Method for Text and Image
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32799
Increased Capacity of Information Hiding in LSB-s Method for Text and Image

Authors: H.B.Kekre, Archana Athawale, Pallavi N.Halarnkar

Abstract:

Steganography, derived from Greek, literally means “covered writing". It includes a vast array of secret communications methods that conceal the message-s very existence. These methods include invisible inks, microdots, character arrangement, digital signatures, covert channels, and spread spectrum communications. This paper proposes a new improved version of Least Significant Bit (LSB) method. The approach proposed is simple for implementation when compared to Pixel value Differencing (PVD) method and yet achieves a High embedding capacity and imperceptibility. The proposed method can also be applied to 24 bit color images and achieve embedding capacity much higher than PVD.

Keywords: Information Hiding, LSB Matching, PVD Steganography.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1070429

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3123

References:


[1] Dr. H. B. Kekre, Ms. Archana A. Athawale, "Information Hiding using LSB Technique with Increased Capacity", International Journal of Cryptography and Security, Special issue on Steganography, 2008.(Accepted for publication).
[2] D. C. Wu and W. H. Tsai, A steganographic method for images by pixel-value differencing," Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1613-1626, 2003.
[3] Johnson,Neil F,"Steganography", 2000: www.jjtc.com/stegdoc/index2.htm
[4] J. Fridrich and M. Goljan, "Practical steganalysis of digital imagesÔÇö State of the art," in Proc. SPIE Security Watermarking Multimedia Contents, vol. 4675, E. J. Delp III and P. W. Wong, Eds., 2002, pp. 1- 13.
[5] N. Provos, "Defending Against Statistical Steganalysis", 10th USENIX Security Symposium, Washington, DC, 2001.
[6] A. Westfeld and A. Pfitzmann, "Attacks on Steganographic Systems," Lecture Notes in Computer Science, vol.1768, Springer-Verlag, Berlin, 2000, pp. 61-75.
[7] W. Dixon, F. Massey: Introduction to Statistical Analysis. McGraw-Hill Book Company, Inc., New York 1957.
[8] A. Ker, "Steganalysis of LSB Matching in Grayscale Images." IEEE Signal Processing Letters, vol. 12(6), pp. 441-444, 2005.
[9] J. Mielikainen, "LSB Matching Revisited," IEEE Signal Processing Letters, vol. 13, NO. 5., MAY 2006
[10] Hung-Min Sun, Yao-Hsin Chen, and King-Hang Wang, "An Image Data Hiding Scheme being Perfectly Imperceptible to Histogram Attacks," Image and Vision Computing New Zealand IVCNZ 2006, November 27- 29, 2006
[11] X. Zhang and S. Wang, "Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security", Pattern Recognition Letters, 2004.
[12] H.C. Wu, N.I Wu, C.S. Tsai and M.S. Hwang, "Image Steganographic scheme based on pixel-value differencing and LSB replacement methods",VISP(152), No. 5, October 2005
[13] Vajiheh Sabeti, Shadrokh Samavi, Mojtaba Mahdavi, Shahram Shirani, "Steganalysis of Pixel-Value Differencing steganographic Method", 2007 IEEE. pp. 292-295
[14] Petitcolas F, Anderson R, Kuhn M: ÔÇÿInformation Hiding - A Survey- Proceedings of the IEEE, Vol. 87. July 1999.
[15] N. Johnson and S. Jajodia, "Exploring steganography: seeing the unseen," IEEE Computer, pp. 26-34, February 1998.
[16] X. Zhang and S. Wang, "Steganography using multiple-base notational system and human vision sensitivity," IEEE Signal Process. Lett., vol. 12, no. 1, pp. 67-70, Jan. 2005.
[17] T. Sharp, "An implementation of key-based digital signal steganography," in Proc. Information Hiding Workshop, vol. 2137, Springer LNCS, 2001, pp. 13-26.
[18] J. Harmsen andW. Pearlman, "Steganalysis of additive-noise modelable information hiding," in Proc. SPIE Security Watermarking Multimedia Contents, vol. 5020, 2003, pp. 131-142
[19] A. Ker, "Steganalysis of LSB matching in greyscale images," IEEE Signal Process Letter, vol. 12, no.6, pp. 441- 444, Jun. 2005.
[20] Chung-Ming Wang , Nan-I Wu, Chwei-Shyong Tsai, Min-Shiang Hwang, "A high quality steganographic method with pixel-value differencing and modulus function" , Science Direct,The Journal of Systems and Software 81 (2008) pp. 150-158
[21] Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Member, IEEE, and Hung-Min Sun, "Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems", IEEE Transactions on Information Forensics and Security, VOL. 3, NO. 3, September 2008 pp. 488-497.
[22] Rehab H. Alwan, Fadhil J. Kadhim, and Ahmad T. Al-Taani, "Data Embedding Based on Better Use of Bits in Image Pixels", International Journal of Signal Processing 2;2 ┬® www.waset.org Spring 2006.
[23] Andrew D. Ker, Member, IEEE, "Steganalysis of Embedding in Two Least-Significant Bits", IEEE Transactions on Information Forensics and Security, Vol. 2, NO. 1, March 2007
[24] Shila P. Hivrale, S. D. Sawarkar, Vijay Bhosale, and Seema Koregaonka, "Statistical Method for Hiding Detection in LSB of Digital Images: An Overview", Proceedings of World Academy of Science, Engineering and Technology Volume 32 August 2008 ISSN 2070-3740.