Advertisement

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

  • Yanjun LiuEmail author
  • Chin-Chen Chang
  • Tzu-Yi Chien
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 63)

Abstract

Steganography is a widely used approach to embed tremendous amount of secret message while maintaining satisfactory visual quality. Least-significant-bit (LSB) substitution is one of the famous techniques applied in steganography, which makes modifications to the cover image by simply substituting secret bits for the LSBs of the cover pixel. This paper presents a novel data hiding scheme based on LSB substitution in which binary secret data can directly be concealed into the cover image. To enhance the embedding capacity, as much as 2 secret bits can be embedded into each cover pixel by modifying 3 LSBs with the guidance of a reference table. Experimental results confirm that the proposed scheme outperforms the related schemes in terms of embedding capacity and visual quality.

Keywords

Steganography least-significant-bit (LSB) embedding capacity visual quality 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn.: Information hiding a survey. Proceedings of the IEEE, Vol. 87, No. 7, pp. 1062–1078 (1999)Google Scholar
  2. 2.
    N. N. EL-Emam.: Hiding a large amount of data with high security using steganography algorithm. Journal of Computer Science, Vol. 3, No. 4, pp. 223–232 (2007)Google Scholar
  3. 3.
    A. Ioannidoua, S. T. Halkidisb and G. Stephanidesb.: A novel technique for image steganography based on a high payload method and edge detection. Expert Systems with Application, Vol. 39, No. 14, pp. 11517–11524 (2012)Google Scholar
  4. 4.
    H. R. Kanan and B. Nazeri.: A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Systems with Application, Vol. 39, No. 14, pp. 11517–11524 (2014)Google Scholar
  5. 5.
    K. H. Jung and K. Y. Yoo.: Steganographic method based on interpolation and LSB substitution of digital images. Multimedia Tools and Applications, Vol. 74, No. 6, pp. 2143–2155 (2015)Google Scholar
  6. 6.
    C. H. Yang.: Inverted pattern approach to improve image quality of information hiding by LSB substitution. Pattern Recognition, Vol. 41, No. 8, pp. 2674–2683 (2008)Google Scholar
  7. 7.
    X. Liao, Q. Y. Wen and J. Zhang.: A steganographic method for digital images with four-pixel differencing and modified LSB substitution. Journal of Visual Communication and Image Representation, Vol. 22, No. 1, pp. 1–8 (2011)Google Scholar
  8. 8.
    J. Mielikainen.: LSB matching revisited. IEEE Signal Processing Letters, Vol. 13, No. 5, pp. 285–287 (2006)Google Scholar
  9. 9.
    S. Y. Shen and L. H. Huang.: A data hiding scheme using pixel value differencing and improving exploiting modification directions. Computer and Security, Vol. 48, pp. 131–141 (2015)Google Scholar
  10. 10.
    K. H. Jung and K. Y. Yoo.: High-capacity index based data hiding method. Multimedia Tools and Applications, Vol. 74, No. 6, pp. 2179–2193 (2015)Google Scholar
  11. 11.
    C. C. Chen and C. C. Chang.: LSB-based steganography using reected gray code. IEICE Transactions on Information and Systems, Vol. E91-D, No. 4, pp. 1110–1116 (2008)Google Scholar
  12. 12.
    M. Schwartz and T. Etzion.: The structure of single-track gray codes. IEEE Transactions on Information theory, Vol. 45, No. 7, pp. 2383–2396 (1999)Google Scholar
  13. 13.
    C. C. Chang, C. C. Lin and Y. H. Chen.: A secure data embedding scheme using gray-code computation and SMVQ encoding. Information Hiding and Applications, Vol. 227, pp. 63–74 (2009)Google Scholar
  14. 14.
    X. Y. Luo, F. L. Liu, C. F. Yang, S. G. Lian and Y. Zeng.: Steganalysis of adaptive image steganography in multiple gray code bit-planes. Multimedia Tools and Applications, Vol. 57, No. 3, pp. 651–667 (2012)Google Scholar
  15. 15.
    N. Maleki, M. Jalali and M. V. Jahan.: Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function. Egyptian Informatics Journal, Vol. 15, No. 2, pp. 115–127 (2014)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Department of Information Engineering and Computer ScienceFeng Chia UniversityTaichungTaiwan, ROC
  2. 2.Department of Information Engineering and Computer ScienceNational Chung Cheng UniversityChiayiTaiwan, ROC

Personalised recommendations