Skip to main content

Zero Distortion Technique: An Approach to Image Steganography Using Strength of Indexed Based Chaotic Sequence

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 467))

Abstract

Steganography is an art of hiding information. There are several existing approaches, of which LSB is the popular known technique. While performing image steganography, there are certain limitations, in terms of time, robustness, distortion, quantity of data to hide etc. A common major limitation involved in these approaches is: altering the pixel value of the image which leads to distortion in the cover image. It can be easily detected by histogram and PSNR value. Zero Distortion Technique (ZDT) is proposed to overcome the limitation, as no changes are reflected in the histogram and PSNR value of the cover and the stego image. Experimental results on certain images shows that the proposed algorithm gives refine results. The proposed technique is robust, fast and helpful in providing security to our confidential data.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Stalling, W.: Cryptography and network security: Principles and Practices, 4th edn. Prentice (2006), ISBN – 978-81-775-8774-6

    Google Scholar 

  2. Das, S., Bandyopadhyay, P., Paul, S.: A New Introduction towards Invisible Image Watermarking on Color Images. In: IEEE International Advance Computing Conference (IACC 2009) (2009)

    Google Scholar 

  3. Neeta, D., Snehal, K., Jacob, D.: Implementation of LSB Steganography and its evaluation for various bits

    Google Scholar 

  4. Juneja, M., Sandu, P.S.: Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption. In: International Conference on Advances in Recent Technologies in Communication and Computing (2009)

    Google Scholar 

  5. Alam, S., Zakariya, S.M., Rafiq, M.Q.: Analysis of modified LSB Approaches of Hiding Information in Digital Images. In: 5th International Conference on Computational Intelligence and Communication Networks 2013 (2013)

    Google Scholar 

  6. Acharya, A.K.: Image Encryption Using A Chaos Base Encryption Algorithm. In: International Conference on Commmunication, Computing and Security (ICCCS 2011) (2011), http://dl.acm.org/citation.cfm?id=1948060

  7. Batham, S., Acharya, A.K., Yadav, V.K., Paul, R.: A New Video Encryption Algorithm Based on Index Based Chaotic Sequence. In: Confluence 2013 (2013)

    Google Scholar 

  8. Soni, A., Acharya, A.K.: A Novel Image Encryption Approach Using an Index Based Chaos and DNA Encoding and its Performance Analysis. IJCA (0975-8887) 47(23) (June 2012)

    Google Scholar 

  9. Altaay, A.A.J., Sahib, S.B., Zamani, M.: An Introduction to Image Steganography Techniques. In: International Conference on Advanced Computer Science Applications and Technologies 2012 (2012)

    Google Scholar 

  10. Gupta, S., Goyal, A., Bhushan, B.: Information Hiding Using Least Significant Bit Steganography and Crptography. I. J. MECS 2012 (2012)

    Google Scholar 

  11. Paul, R., Acharya, A., Yadav, V.K., Batham, S.: Hiding Large Amount of Data using a New Approach of Video Steganography. In: CONFLUENCE 2013, IET digital library (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sharma, S., Yadav, V.K., Batham, S. (2014). Zero Distortion Technique: An Approach to Image Steganography Using Strength of Indexed Based Chaotic Sequence. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds) Security in Computing and Communications. SSCC 2014. Communications in Computer and Information Science, vol 467. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44966-0_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-44966-0_40

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-44965-3

  • Online ISBN: 978-3-662-44966-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics