Skip to main content

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

  • Conference paper
  • First Online:

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 63))

Abstract

Steganography is a widely used approach to embed tremendous amount of secret message while maintaining satisfactory visual quality. Least-significant-bit (LSB) substitution is one of the famous techniques applied in steganography, which makes modifications to the cover image by simply substituting secret bits for the LSBs of the cover pixel. This paper presents a novel data hiding scheme based on LSB substitution in which binary secret data can directly be concealed into the cover image. To enhance the embedding capacity, as much as 2 secret bits can be embedded into each cover pixel by modifying 3 LSBs with the guidance of a reference table. Experimental results confirm that the proposed scheme outperforms the related schemes in terms of embedding capacity and visual quality.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn.: Information hiding a survey. Proceedings of the IEEE, Vol. 87, No. 7, pp. 1062–1078 (1999)

    Google Scholar 

  2. N. N. EL-Emam.: Hiding a large amount of data with high security using steganography algorithm. Journal of Computer Science, Vol. 3, No. 4, pp. 223–232 (2007)

    Google Scholar 

  3. A. Ioannidoua, S. T. Halkidisb and G. Stephanidesb.: A novel technique for image steganography based on a high payload method and edge detection. Expert Systems with Application, Vol. 39, No. 14, pp. 11517–11524 (2012)

    Google Scholar 

  4. H. R. Kanan and B. Nazeri.: A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Systems with Application, Vol. 39, No. 14, pp. 11517–11524 (2014)

    Google Scholar 

  5. K. H. Jung and K. Y. Yoo.: Steganographic method based on interpolation and LSB substitution of digital images. Multimedia Tools and Applications, Vol. 74, No. 6, pp. 2143–2155 (2015)

    Google Scholar 

  6. C. H. Yang.: Inverted pattern approach to improve image quality of information hiding by LSB substitution. Pattern Recognition, Vol. 41, No. 8, pp. 2674–2683 (2008)

    Google Scholar 

  7. X. Liao, Q. Y. Wen and J. Zhang.: A steganographic method for digital images with four-pixel differencing and modified LSB substitution. Journal of Visual Communication and Image Representation, Vol. 22, No. 1, pp. 1–8 (2011)

    Google Scholar 

  8. J. Mielikainen.: LSB matching revisited. IEEE Signal Processing Letters, Vol. 13, No. 5, pp. 285–287 (2006)

    Google Scholar 

  9. S. Y. Shen and L. H. Huang.: A data hiding scheme using pixel value differencing and improving exploiting modification directions. Computer and Security, Vol. 48, pp. 131–141 (2015)

    Google Scholar 

  10. K. H. Jung and K. Y. Yoo.: High-capacity index based data hiding method. Multimedia Tools and Applications, Vol. 74, No. 6, pp. 2179–2193 (2015)

    Google Scholar 

  11. C. C. Chen and C. C. Chang.: LSB-based steganography using reected gray code. IEICE Transactions on Information and Systems, Vol. E91-D, No. 4, pp. 1110–1116 (2008)

    Google Scholar 

  12. M. Schwartz and T. Etzion.: The structure of single-track gray codes. IEEE Transactions on Information theory, Vol. 45, No. 7, pp. 2383–2396 (1999)

    Google Scholar 

  13. C. C. Chang, C. C. Lin and Y. H. Chen.: A secure data embedding scheme using gray-code computation and SMVQ encoding. Information Hiding and Applications, Vol. 227, pp. 63–74 (2009)

    Google Scholar 

  14. X. Y. Luo, F. L. Liu, C. F. Yang, S. G. Lian and Y. Zeng.: Steganalysis of adaptive image steganography in multiple gray code bit-planes. Multimedia Tools and Applications, Vol. 57, No. 3, pp. 651–667 (2012)

    Google Scholar 

  15. N. Maleki, M. Jalali and M. V. Jahan.: Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function. Egyptian Informatics Journal, Vol. 15, No. 2, pp. 115–127 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yanjun Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Liu, Y., Chang, CC., Chien, TY. (2017). A Revisit to LSB Substitution Based Data Hiding for Embedding More Information. In: Pan, JS., Tsai, PW., Huang, HC. (eds) Advances in Intelligent Information Hiding and Multimedia Signal Processing. Smart Innovation, Systems and Technologies, vol 63. Springer, Cham. https://doi.org/10.1007/978-3-319-50209-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-50209-0_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-50208-3

  • Online ISBN: 978-3-319-50209-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics