Abstract
In this paper, we present an image steganography method based on spread spectrum technique. In the proposed method, cover image is decomposed into RGB planes. The extracted R, G, and B image planes are converted into orthogonal image planes. Message to be embedded is encrypted with RC4 using key and modulated with orthogonal red image plane using key. Modulated message is embedded into orthogonal blue image plane, generating stego image. Orthogonal red image plane is encrypted using key. Dot product property of orthogonal images is used to extract the secret message. Proposed image steganography method is blind image steganography method, and cover image is not needed to extract the message from the stego image. The recipient only requires keys and encrypted orthogonal red image plane to extract the hidden information. Receiver can extract secret message without cover image, and the proposed image steganography method is not a cover escrow scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(4), 313–336 (1996)
Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3–4), 313–336 (1996). doi:10.1147/sj.353.0313
Bhatia, M., Muttoo, S.K., Bhatia, M.P.S.: Steganography based secure communication. In: Proceedings of the Second International Springer Conference on Soft Computing for Problem Solving (SocProS 2012), India (2012)
Bhatia, M., Muttoo, S.K., Bhatia, M.P.S.: Secure group communication protocol. Int. J. Adv. Eng. Sci. Technol. 11(1), 221–225 (2011)
Bhatia, M., Muttoo, S.K., Bhatia, M.P.S.: Secure group communication with hidden group key. Inf. Secur. J. Glob. Perspect. 22(1), 21–34 (2013)
Cox, J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for images, audio and video. In: Proceedings of IEEE International Conference on Image Processing, vol. 111, pp. 243–246, Lausanne, Switzerland, Sept 1996
Fridrich, J.: Symmetric ciphers based on two dimensional chaotic maps. Int. J. Bifurcat. Chaos 8(6), 1259–1284 (1998)
Gander, W.: Algorithms for the QR decomposition. Res. Rep. 80(02), 1251–1268 (1980)
Gutub, A., Ankeer, M., Abu-Ghalioun, M., Shaheen, A., Alvi, A.: Pixel indicator high capacity technique for RGB image based steganography. In: Proceedings of the 5th IEEE International Workshop on Signal Processing and its Applications, pp. 18–21, Sharjah, UAE, 18–20 Mar 2008
Keshari, S., Modani, S.G.: Image encryption algorithm based on chaotic map lattice and Arnold cat map for secure transmission. IJCST 2(1), 132–135 (2011)
Kumar, V., Muttoo, S.K.: A graph theoretic approach to sustainable steganography. MIS Rev. Int. J. 17(1), 19–37 (2011)
Lian, S., Sun, J., Wang, Z.: A block cipher based on a suitable use of the chaotic standard map. Chaos, Solitons Fractals 26, 117–129 (2005)
Muttoo, S.K., Kumar, V.: Hiding message in map along pre Hamiltonian path. Int. J. Inf. Secur. Priv. 4(4), 21–34 (2010). doi:10.4018/jisp.2010100102
Muttoo, S.K., Kumar, V.: Hamiltonian graph approach to steganography. Int. J. Electron. Secur. Digit. Forensic 3(4), 311–332 (2010). doi:10.1504/IJESDF.2010.038612
Smith, J.R., Comisky, B.O.: Modulation and information hiding in images. In: Information Hiding. First International Workshop. Lecture Notes in Computer Science. Springer, Berlin (1996)
Stalling, W.: Cryptography and Network Security: Principles and Practice. Prentice Hall, New York (1999)
Staples, T., Weinman, L.: Adobe Photoshop CS2 for the Web: Hands-on Training. Peachpit Press, San Francisco (2005)
Wang, R.Z., Lin, C.F., Lin, J.C.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn. 34, 671–683 (2000). doi:10.1016/S0031-3203(00)00015-7
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Bhatia, M.P.S., Muttoo, S.K., Bhatia, M. (2015). An Image Steganography Method Using Spread Spectrum Technique. In: Das, K., Deep, K., Pant, M., Bansal, J., Nagar, A. (eds) Proceedings of Fourth International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 336. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2220-0_18
Download citation
DOI: https://doi.org/10.1007/978-81-322-2220-0_18
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2219-4
Online ISBN: 978-81-322-2220-0
eBook Packages: EngineeringEngineering (R0)