Skip to main content
Log in

An evaluation of image based steganography methods

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

A Publisher's Erratum to this article was published on 04 November 2006

Abstract

Steganography is a process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for example by civil rights organisations in repressive states to communicate their message to the outside world without their own government being aware of it. Less virtuously it can be used by terrorists to communicate with one another without anyone else’s knowledge. In both cases the objective is not to make it difficult to read the message as cryptography does, it is to hide the existence of the message in the first place possibly to protect the courier. The initial aim of this study was to investigate steganography and how it is implemented. Based on this work a number of common methods of steganography could then be implemented and evaluated. The strengths and weaknesses of the chosen methods can then be analysed. To provide a common frame of reference all of the steganography methods implemented and analysed used GIF images. Seven steganography methods were implemented. The methods were chosen for their different strengths in terms of resistance to different types of steganalysis or their ability to maximise the size of the message they could store. All of the methods used were based on the manipulation of the least significant bits of pixel values or the rearrangement of colours to create least significant bit or parity patterns, which correspond to the message being hidden.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 5.1
Fig. 5.2
Fig. 5.3
Fig. 5.4
Fig. 5.8
Fig. 5.5
Fig. 5.12
Fig. 5.13
Fig. 5.22
Fig. 5.23
Fig. 5.24
Fig. 5.32
Fig. 5.33
Fig. 5.30
Fig. 5.31
Fig. 5.34
Fig. 5.41
Fig. 5.42
Fig. 5.43
Fig. 5.44
Fig. 5.45
Fig. 5.46
Fig. 5.47

Similar content being viewed by others

References

  1. Brown A (1994) S-Tools for Windows, Shareware. ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools3.zip(version 3)

  2. Fridrich Jiri (1999) A new steganographic method for palette-based images. Center for Intelligent Systems, SUNY Binghamton, Binghamton, New York. IS&T’s PICS Conference, pp 285–289

  3. Fridrich Jiri, Rui Du (2000, September/October) Secure steganographic methods for palette images. Center for Intelligent Systems, Dept. of SS&IE, SUNY Binghamton, Binghamton, New York. Information Hiding, Proceedings of the Third International Workshop, IH’99 Dresden Germany, Computer Science 1768, pp 47–60

  4. Hansmann F (1996) Steganos. Deus Ex Machina Communications. http://www.steganography.com

  5. Johnson Neil F, Sushil Jajodia (1998, April) Steganalysis of images created using current steganography software, Centre for Secure Information Systems, George Mason University, Fairfax, Virginia, Information Hiding, Second International Workshop, IH’98 Portland, Oregon, pp 273–289

  6. Johnson Neil F, Zoran Duric, Sushil Jajodia (2001) Information hiding, and watermarking—attacks & countermeasures. Kluwer

  7. Nelson Mark (1989, October) LZW data compression, Dr Dobbs Journal

  8. Pfitzmann Birgit (1996, May–June) Information hiding terminology. First International Workshop, Cambridge, UK, Proceedings, Computer Science 1174, pp 347–350

  9. Wayner Peter (2002) Disappearing cryptography, information hiding: steganography and watermarking (2nd edition). Morgan Kaufmann

  10. Westfield Andreas, Pfitzmann Andreas (1999 October ) Attacks on steganographic systems. Third International Workshop, IH’99 Dresden Germany, Proceedings, Computer Science 1768, pp 61–76

  11. Zollner J, Federrath H, Klimant H, Pfitzmann A, Piotraschke R, Westfeld A, Wicke G, Wolf G (1998, April) Modelling the security of steganographic systems, Information Hiding, 2nd International Workshop, IH’98 Portland, Oregon, Computer Science 1525, pp 344–354

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Karen Bailey.

Additional information

An erratum to this article can be found at http://dx.doi.org/10.1007/s11042-006-0047-x

Rights and permissions

Reprints and permissions

About this article

Cite this article

Bailey, K., Curran, K. An evaluation of image based steganography methods. Multimed Tools Appl 30, 55–88 (2006). https://doi.org/10.1007/s11042-006-0008-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-006-0008-4

Keywords

Navigation