Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 896))

Abstract

Steganography plays an important role in computer science. With the development of technology, steganography technique is used for safe transmission of data in digital media. This technique hides the data in a symbol to prevent its comprehensibility and its solvability, so that it can be safely delivered to the receiver. Steganagrofiq method LSB was used in this study. The gray scaled jpg format was analyzed in the same images, visually unaware, that the data could be stored using the LSB method up to the 4th bit level. It worked on five same jpg but different pixel format images in 1024 × 1024, 512 × 512, 256 × 256, 128 × 128, 64 × 64 pixel sizes. From a visible standpoint, it seems logical in every five views. Histograms were plotted to visualize the differences between the original and the encoded. The rates of different images of the same images were calculated by embedding data, extracting data, comparing the byte and elapsed time, and calculating the distortion rates PSNR, SNR, MSE in the images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://wallpaperscraft.com/download/leopard_color_spotted_predator_big_cat_53087/1024x1024.

References

  1. Haveliya, A.: A new approach for secret concealing in executable file. Int. J. Eng. Res. Appl. 2(2), 1672–1674 (2012)

    Google Scholar 

  2. Agarval, M.: Text steganographic approaches: a comparison. Int. J. Netw. Secur. Its Appl. 5(1) (2013)

    Google Scholar 

  3. Rosziati, I., Kuan, T.S.: Steganography algorithm to hide secret message inside an image. Comput. Technol. Appl. 2, 102–108 (2011)

    Google Scholar 

  4. Seetha, D., Eswaran, P.: A study on steganography to hide secret message inside an image. Int. J. P2P Netw. Trends Technol. 3(5), 33–37 (2013)

    Google Scholar 

  5. Khan, M., Jamil, A., Farman, H., Zubair, M.: A novel image steganographic approach for hiding text in color images using HSI color model. Middle-East J. Sci. Res. 22(5), 647–654 (2014)

    Google Scholar 

  6. Rani, N., Chaudhary, J.: Text steganography techniques: a review. Int. J. Eng. Trends Technol. 4(7), 3013–3015 (2013)

    Google Scholar 

  7. Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) Third International Workshop IH 1999, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)

    Google Scholar 

  8. Tiwari, R. K., Sahoo G.: Some new methodologies for image hiding using steganographic techniques. http://arxiv.org/abs/1211.0377. Accessed 13 Sept 2018

  9. Higgins, D.: Differences between file format. https://www.photoup.net/differences-between-fileformats-raw-dng-tiff-gif-png-jpeg/. Accessed 13 Sept 2018

  10. Manjula, G.R., Danti, A.: Novel hash based least significant bit (2-3-3) image steganography in spatial domain. Int. J. Eng. Trends Technol. 4(1), 11–20 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yucel Inan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Inan, Y. (2019). Comparing Image Distortion of LSB. In: Aliev, R., Kacprzyk, J., Pedrycz, W., Jamshidi, M., Sadikoglu, F. (eds) 13th International Conference on Theory and Application of Fuzzy Systems and Soft Computing — ICAFS-2018. ICAFS 2018. Advances in Intelligent Systems and Computing, vol 896. Springer, Cham. https://doi.org/10.1007/978-3-030-04164-9_14

Download citation

Publish with us

Policies and ethics