Skip to main content

An Efficient Lossless Modulus Function Based Data Hiding Method

  • Conference paper
  • First Online:
  • 878 Accesses

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 44))

Abstract

Data hiding methods are useful for secure communication over the internet. Important data is hidden in cover data that is used as decoy. A lossless data hiding method is judged by the maximum size of secret data that can be hidden without distortion and similarity between the original cover image and stego image. In this work, module based least significant bit substitution methods are studied and a new enhancement is proposed to improve the quality of stego image. The new method divides the cover and secret images in several blocks and compressed secret block is hidden into corresponding cover block using modulo operation. The extra data is stored in the free space that is generated after compression. The quality of stego image in proposed method is better than that of existing methods that hides the secret data using modulo operation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Cheddad, A.A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Process. 90(3), 727–752 (2010)

    Google Scholar 

  2. Atawneh, S., Almomani1, A., Sumari, P.: Steganography in digital images: common approaches and tools. IETE Tech. Rev. 30(4), 344 (2013)

    Google Scholar 

  3. Cheng-Hsing, Y., et al.: Adaptive data hiding in edge areas of images with spatial LSB domain systems. In: IEEE Trans. Inf. Forensics Secur. 3(3), 488–497 (2008)

    Google Scholar 

  4. Jin, H.L., Fujiyoshi, M., Kiya, H.: Lossless data hiding in the spatial domain for high quality images. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90(4), 771–777 (2007)

    Google Scholar 

  5. Akhtar, N., Johri, P., Khan, S.: Enhancing the security and quality of LSB based image steganography. In: IEEE International Conference on Computational Intelligence and Computer Networks (CICN), Mathura, India. 27–29 Sept 2013

    Google Scholar 

  6. Pan, F., Li, J., Yang, X.: International Conference on Electronics, Communications and Control (ICECC), Zhejiang, pp. 282–284, 9–11 Sept 2011

    Google Scholar 

  7. Chen, S.-K.: A module-based LSB substitution method with lossless secret data compression. Comput. Stan. Interfaces 33, 367–371 (2011)

    Google Scholar 

  8. Thien, C.C., Lin, J.C.: A simple and high-hiding capacity method for hiding digit-by digit data in images based on modulus function. Pattern Recogn. 36, 2875–2881 (2003)

    Article  MATH  Google Scholar 

  9. Akhtar, N., Bano, A., Islam, F.: An improved module based substitution steganography method. In: Fourth IEEE International Conference on Communication Systems and Network Technologies (CSNT), pp 695–699 (2014)

    Google Scholar 

  10. Chang, C.-C., Hsiao, J.-Y., Chan, C.-S.: Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognit. 36(7), 1583–1595 (2003)

    Google Scholar 

  11. http://sipi.usc.edu/database/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nadeem Akhtar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Akhtar, N. (2016). An Efficient Lossless Modulus Function Based Data Hiding Method. In: Nagar, A., Mohapatra, D., Chaki, N. (eds) Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics. Smart Innovation, Systems and Technologies, vol 44. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2529-4_29

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2529-4_29

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2528-7

  • Online ISBN: 978-81-322-2529-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics