Skip to main content

An Optimized Color Image Steganography Using LFSR and DFT Techniques

  • Conference paper
Advanced Research on Computer Education, Simulation and Modeling (CESM 2011)

Abstract

A color image steganography method to conceal a secret data into the cover image in the frequency domain is suggested. In this method, Lempel–Ziv–Welch (LZW) compression is used to obtain a low bit rate; Also Linear Feedback Shift Register (LFSR) technique is used to enhance the security of the scheme. In the embedding process, an Adaptive Phase Modulation (APM) mechanism and Discrete Fourier Transform (DFT) are used for secret data embedding. Abilities of the proposed method are high speed and security, because of using hardware element LFSR and Data Encryption Standard (DES) cryptography.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wang, R.Z., Lin, C.F., Lin, J.C.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition Society (2001); Published by Elsevier Science Ltd. All rights reserved

    Google Scholar 

  2. Marvel, L.M., Boncelet Jr., C.G., Retter, C.T.: Spread spectrum image steganography. IEEE Transactions on Image Processing 8(8), 1075–1083 (1999)

    Article  Google Scholar 

  3. Chandramoul, R., Kharrazi, M.N.: Image Steganography and Steganalysis: Concepts and Practice Memon. Springer, Heidelberg (2004)

    Google Scholar 

  4. Lin, C.C., Tsai, W.H.: Secret image sharing with steganography and authentication. The Journal of System and Software 73, 405–414 (2004)

    Article  Google Scholar 

  5. Mcbride, B.T., Peterson, G.L., Gustafson, S.C.: A new blind method for detecting novel steganography. Digital Investigation 2, 50–70 (2005)

    Article  Google Scholar 

  6. Cetin, O., Ozcerit, A.T.: A new steganography algorithm based on color histograms for data embedding into raw video streams (2009), Published by Elsevier Ltd., doi:10.1016/j.cose.2009.04.002

    Google Scholar 

  7. Ni, R., Ruan, Q., Cheng, H.D.: Secure semi-blind watermarking based on iteration mapping and image features. Pattern Recognition 38(3), 357–368 (2005)

    Article  MATH  Google Scholar 

  8. Chen, W.Y., Chen, C.H.: A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection. Pattern Recognition 38(4), 587–598 (2005)

    Article  Google Scholar 

  9. Wu, D.-C., Tsai, W.-H.: A steganographic method for images by pixel-value differencing. Pattern Recognition Letters 24, 1613–1626 (2003); 0167-8655/03/$ - see front matter _ 2002 Elsevier Science B.V. All rights reserved, doi:10.1016/S0167-8655(02)00402-6

    Article  MATH  Google Scholar 

  10. Besdok, E.: Hiding information in multispectral spatial images (2005), Elsevier GmbH. All rights reserved, doi:10.1016/j.aeue.2004.11.040

    Google Scholar 

  11. Younes, M.A.B., Jantan, A.: A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion. IJCSNS International Journal of Computer Science and Network Security 8(6) (June 2008)

    Google Scholar 

  12. Hou, Y.C., Chiao, Y.F.: Steganography: an efficient data hiding method. Journal of Technology 15(3), 363–372 (2000)

    Google Scholar 

  13. Chen, W.-Y.: Color image steganography scheme using set partitioning in hierarchical trees coding. In: Digital Fourier Transform and Adaptive Phase Modulatio. Elsevier, Amsterdam (2006), doi:10.1016/j.amc.2006.07.041

    Google Scholar 

  14. Khashandarag, A.S., Ebrahimian, N.: A new method for color image steganography using SPIHT and DFT, sending with JPEG format, 978-0-7695-3892-1/09 $26.00 © 2009 IEEE DOI 10.1109/ICCTD.2009.14

    Google Scholar 

  15. http://en.wikipedia.org/wiki/Data_Encryption_Standard

  16. http://en.wikipedia.org/wiki/Linear_feedback_shift_registe

  17. http://en.wikipedia.org/wiki/Lempel_Ziv_Welch

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Khashandarag, A.S., Navin, A.H., Mirnia, M.K., Agha Mohammadi, H.H. (2011). An Optimized Color Image Steganography Using LFSR and DFT Techniques. In: Lin, S., Huang, X. (eds) Advanced Research on Computer Education, Simulation and Modeling. CESM 2011. Communications in Computer and Information Science, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21802-6_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21802-6_40

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21801-9

  • Online ISBN: 978-3-642-21802-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics