Skip to main content

Efficient Multi-bit Image Steganography in Spatial Domain

  • Conference paper
Information Systems Security (ICISS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8303))

Included in the following conference series:

Abstract

An LSB-based image steganography algorithm hides information in the least significant bits of the pixel intensities of a cover image. But such a method has a very low embedding capacity compared to a multi-bit embedding scheme. The latter is very challenging in the sense that the possibility of a large change in the pixel value of the cover image becomes very high and only a few algorithms based on multi-bit embedding exist in the literature. In this paper, we improve the multi-bit embedding technique of Park et al. (2005), and achieve higher capacity of embedding (at most 5 bits per pixel) and higher embedding efficiency (at most 5.33) into an image with lower distortion. We compare our performance with existing techniques and support our claim with theoretical and experimental results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Paul, G., Davidson, I., Mukherjee, I., Ravi, S.S.: Keyless Steganography in Spatial Domain using Energetic Pixels. In: Venkatakrishnan, V., Goswami, D. (eds.) ICISS 2012. LNCS, vol. 7671, pp. 134–148. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  2. Zhang, X., Wang, S., Zhou, Z.: Multibit Assignment Steganography in Palette Images. IEEE Signal Processing Letters 15 (2008)

    Google Scholar 

  3. Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S.: Image steganographic scheme based on pixel value differencing and LSB replacement method. In: IEEE Proceedings on Vision, Image and Signal Processing, vol. 152(5), pp. 611–615 (2005)

    Google Scholar 

  4. Park, Y., Kang, H., Shin, S., Kwon, K.: An Image Steganography Using Pixel Characteristics. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 581–588. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Mandal, J.K., Das, D.: Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain. International Journal of Information Sciences and Techniques (IJIST) 2(4) (July 2012)

    Google Scholar 

  6. Kahn, D.: The History of Steganography. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 1–17. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  7. Gutub, A.A.: Pixel Indicator Technique for RGB Image Steganography. Journal of Emerging Technologies in Web Intelligence 2(1), 56–64 (2010)

    Google Scholar 

  8. Bailey, K., Curran, K.: An evaluation of image based steganography methods. Journal of Multimedia Tools and Applications 30(1), 55–88 (2006)

    Article  Google Scholar 

  9. Neeta, D., Snehal, K., Jacobs, D.: Implementation of LSB Steganography and Its Evaluation for Various Bits. In: 1st International Conference on Digital Information Management, pp. 173–178 (December 2006)

    Google Scholar 

  10. Kejgir, S., Kokare, M.: Optimization of Bit Plane Combination for Efficient Digital Image Watermarking. International Journal of Computer Science and Information Security (IJCSIS) 4 (August 2009)

    Google Scholar 

  11. Provos, N.: Defending against Statistical Steganalysis. In: Tenth USENIX Security Symposium, pp. 325–335 (2001)

    Google Scholar 

  12. Provos, N., Honeyman, P.: Detecting Steganographic Content on the Internet. In: ISOC NDSS 2002, San Diego, CA (February 2002)

    Google Scholar 

  13. Dumitrescu, S., Wu, X., Memon, N.: On Steganalysis of Random LSB Embedding in Continuous-tone Images. In: IEEE ICIP 2002, New York, USA, vol. III, pp. 641–644 (September 2002)

    Google Scholar 

  14. Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  15. Fridrich, J., Goljan, M., Dui, R.: Reliable Detection of LSB Steganography in Color and Grayscale Images. In: Proceedings of the ACM Workshop on Multimedia and Security, Ottawa, CA, pp. 27–30 (October 5, 2001)

    Google Scholar 

  16. Fridrich, J., Lisoněk, P.: Grid Colorings in Steganography. IEEE Trans. on Information Theory 53(4), 1547–1549 (2007)

    Article  MATH  Google Scholar 

  17. Fridrich, J., Lisoněk, P., Soukal, D.: On Steganographic Embedding Efficiency. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 282–296. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  18. http://www.webshots.com

  19. http://221bakerstreet.org

  20. http://www.petitcolas.net/fabien/watermarking/stirmark

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mukherjee, I., Paul, G. (2013). Efficient Multi-bit Image Steganography in Spatial Domain. In: Bagchi, A., Ray, I. (eds) Information Systems Security. ICISS 2013. Lecture Notes in Computer Science, vol 8303. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-45204-8_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-45204-8_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-45203-1

  • Online ISBN: 978-3-642-45204-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics