Skip to main content

An Image Steganography Method Using Spread Spectrum Technique

  • Conference paper
  • First Online:
Proceedings of Fourth International Conference on Soft Computing for Problem Solving

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 336))

Abstract

In this paper, we present an image steganography method based on spread spectrum technique. In the proposed method, cover image is decomposed into RGB planes. The extracted R, G, and B image planes are converted into orthogonal image planes. Message to be embedded is encrypted with RC4 using key and modulated with orthogonal red image plane using key. Modulated message is embedded into orthogonal blue image plane, generating stego image. Orthogonal red image plane is encrypted using key. Dot product property of orthogonal images is used to extract the secret message. Proposed image steganography method is blind image steganography method, and cover image is not needed to extract the message from the stego image. The recipient only requires keys and encrypted orthogonal red image plane to extract the hidden information. Receiver can extract secret message without cover image, and the proposed image steganography method is not a cover escrow scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(4), 313–336 (1996)

    Google Scholar 

  2. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3–4), 313–336 (1996). doi:10.1147/sj.353.0313

    Article  Google Scholar 

  3. Bhatia, M., Muttoo, S.K., Bhatia, M.P.S.: Steganography based secure communication. In: Proceedings of the Second International Springer Conference on Soft Computing for Problem Solving (SocProS 2012), India (2012)

    Google Scholar 

  4. Bhatia, M., Muttoo, S.K., Bhatia, M.P.S.: Secure group communication protocol. Int. J. Adv. Eng. Sci. Technol. 11(1), 221–225 (2011)

    Google Scholar 

  5. Bhatia, M., Muttoo, S.K., Bhatia, M.P.S.: Secure group communication with hidden group key. Inf. Secur. J. Glob. Perspect. 22(1), 21–34 (2013)

    Article  Google Scholar 

  6. Cox, J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for images, audio and video. In: Proceedings of IEEE International Conference on Image Processing, vol. 111, pp. 243–246, Lausanne, Switzerland, Sept 1996

    Google Scholar 

  7. Fridrich, J.: Symmetric ciphers based on two dimensional chaotic maps. Int. J. Bifurcat. Chaos 8(6), 1259–1284 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  8. Gander, W.: Algorithms for the QR decomposition. Res. Rep. 80(02), 1251–1268 (1980)

    Google Scholar 

  9. Gutub, A., Ankeer, M., Abu-Ghalioun, M., Shaheen, A., Alvi, A.: Pixel indicator high capacity technique for RGB image based steganography. In: Proceedings of the 5th IEEE International Workshop on Signal Processing and its Applications, pp. 18–21, Sharjah, UAE, 18–20 Mar 2008

    Google Scholar 

  10. Keshari, S., Modani, S.G.: Image encryption algorithm based on chaotic map lattice and Arnold cat map for secure transmission. IJCST 2(1), 132–135 (2011)

    Google Scholar 

  11. Kumar, V., Muttoo, S.K.: A graph theoretic approach to sustainable steganography. MIS Rev. Int. J. 17(1), 19–37 (2011)

    Google Scholar 

  12. Lian, S., Sun, J., Wang, Z.: A block cipher based on a suitable use of the chaotic standard map. Chaos, Solitons Fractals 26, 117–129 (2005)

    Article  MATH  Google Scholar 

  13. Muttoo, S.K., Kumar, V.: Hiding message in map along pre Hamiltonian path. Int. J. Inf. Secur. Priv. 4(4), 21–34 (2010). doi:10.4018/jisp.2010100102

    Article  Google Scholar 

  14. Muttoo, S.K., Kumar, V.: Hamiltonian graph approach to steganography. Int. J. Electron. Secur. Digit. Forensic 3(4), 311–332 (2010). doi:10.1504/IJESDF.2010.038612

    Article  Google Scholar 

  15. Smith, J.R., Comisky, B.O.: Modulation and information hiding in images. In: Information Hiding. First International Workshop. Lecture Notes in Computer Science. Springer, Berlin (1996)

    Google Scholar 

  16. Stalling, W.: Cryptography and Network Security: Principles and Practice. Prentice Hall, New York (1999)

    Google Scholar 

  17. Staples, T., Weinman, L.: Adobe Photoshop CS2 for the Web: Hands-on Training. Peachpit Press, San Francisco (2005)

    Google Scholar 

  18. Wang, R.Z., Lin, C.F., Lin, J.C.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn. 34, 671–683 (2000). doi:10.1016/S0031-3203(00)00015-7

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. P. S. Bhatia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Bhatia, M.P.S., Muttoo, S.K., Bhatia, M. (2015). An Image Steganography Method Using Spread Spectrum Technique. In: Das, K., Deep, K., Pant, M., Bansal, J., Nagar, A. (eds) Proceedings of Fourth International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 336. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2220-0_18

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2220-0_18

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2219-4

  • Online ISBN: 978-81-322-2220-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics