Advertisement

A Novel Image Hiding Technique Based on Stratified Steganography

  • M. Radhika ManiEmail author
  • G. Suryakala Eswari
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 77)

Abstract

In current Web-based era, the security is becoming crucial factor for exchange of digital data. Other than cryptography, steganography is widely used due to its applications to multimedia information. Among various multimedia content, images are considered for steganography due to its large amount of redundant space availability. In steganography, bit stream-based information can be hidden in any carrier. The present paper proposes a novel algorithm for hiding gray image in the input cover image called as “Logical Stratified Steganography Technique.” The proposed algorithm uses OR operation to combine the cover and hidden images. To test the integrity and robustness, the proposed method is applied on various images like human faces, textures, and medical images. Various performance measures are used to compare the quality of the proposed method. The strength of the proposed method is clearly exhibited with the evaluated results.

Keywords

Quality Shift Pixel and quality measures 

References

  1. 1.
    Kaushik, A., Kumar, A., Barnela, M.: Block encryption standard for transfer of data. In: International Conference on Networking and Information Technology, pp. 381–385 (2010)Google Scholar
  2. 2.
    Fuqiang, D., Minqing, Z., Jia, L.: Virus-evolutionary genetic algorithm based selective ensemble for steganalysis. In: Ninth International Conference on Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp. 553–558 (2014)Google Scholar
  3. 3.
    Daneshkhah, A., Aghaeinia, H., Seyedi, S.H.: A more secure steganography method in spatial domain. In: Second International Conference on Intelligent Systems, Modelling and Simulation, pp. 189–194 (2011)Google Scholar
  4. 4.
    Dagar, E., Dagar, S.: LSB based image steganography using X-Box mapping. In: International Conference on Advances in Computing, Communications and Informatics, pp. 351–355 (2014)Google Scholar
  5. 5.
    Al-Hadidi, B.: A novel data hiding algorithm for all types of file based on Injection process. In: International Conference on Control, Decision and Information Technologies (CoDIT), pp. 872–875 (2013)Google Scholar
  6. 6.
    Bobate, R.V., Khobragade, A.S.: Optimal implementation of digital steganography in an true color images for the secrete communication. In: 3rd International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2011), pp. 91–95 (2011)Google Scholar
  7. 7.
    Singla, D., Juneja, M.: An analysis of edge based image steganography techniques in spatial domain. In: Recent Advances in Engineering and Computational Sciences (RAECS), pp. 1–5 (2014)Google Scholar
  8. 8.
    Diouf, B., Diop, I., Keita, K.W., Farssi, S.M., Khouma, O., Diouf, M., Tall, K.: Adaptive linear programming of polar codes to minimize additive distortion in steganography. In: SAI Computing Conference (SAI), pp. 1086–1092 (2016)Google Scholar
  9. 9.
    Guan, Q., Dong, J., Tan, T.: Evaluation of feature sets for steganalysis of JPEG image. In: IEEE Youth Conference on Information Computing and Telecommunications (YC-ICT), pp. 359–362 (2010)Google Scholar
  10. 10.
    Lee, C.-F., Li, K.-T.: VQ-based image embedding scheme using adaptive codeword grouping strategy. In: 5th International Conference on Future Information Technology, pp. 1–6 (2010)Google Scholar
  11. 11.
    Wang, H., Fei, R.: Hiding data in indexed images. In: IEEE International Conference on Software Engineering and Service Science (ICSESS), pp. 833–836 (2013)Google Scholar
  12. 12.
    Chen, G., Cao, M., Fu, D., Ma, Q.: Research on an steganographic algorithm based on image edge. In: International Conference on Internet Technology and Applications (iTAP), pp. 1–4 (2011)Google Scholar
  13. 13.
    Vegh, L., Miclea, L.: Securing communication in cyber-physical systems using steganography and cryptography. In: 10th International Conference on Communications (COMM), pp. 1–4 (2014)Google Scholar
  14. 14.
    Kumar, B.V., Mani, M.R., NesaKumari, G.R., Kumar, D.V.V.: A new marginal color image watermarking method based on logical operators. Int. J. Secur. Appl. 3(4), 1–8 (2009)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of CSEPragati Engineering CollegeSurampalemIndia
  2. 2.Department of ITPragati Engineering CollegeSurampalemIndia

Personalised recommendations