Abstract
With the increase of communication over Internet, the issue of security has become an important factor. Steganography is a consequence of the increasing degradation of reliability. The roots of steganography lie in ancient Greek civilization. With time, steganography has moved a long way in the path of advancement. It started off with least significant bit (LSB) embedding which mainly focussed on data security. With time, many algorithms have been designed using multi-bit steganography which takes into account both security and capacity of data embedded. In this paper, a new technique has been introduced where various parameters determine the number of bits embedded. This helps to improve the robustness of this method. We show empirically that our method withstands the statistical attacks and benchmark.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cipra, B.: An introduction to the Ising model. Am. Math. Mon. 94(10), 937–959 (1987)
Ghosh, U., Maity, S., Mukherjee, I.: Statistical attack resistant multi-bit steganography using mobile keypad character encoding. In: International Conference on Telecommunication Technology and Management (ICTTM-2015), IIT Delhi, India, pp. 19, 11–12 Apr 2015. ISBN: 987-0-9926800-5-3
Mandal, J.K., Das, D.: Colour image steganography based on pixel value differencing in spatial domain. Int. J. Inf. Sci. Tech. (IJIST) 2(4), 83–93 (2012)
Mukherjee, I., Podder, A.: DCT based robust multi-bit steganographic algorithm. In: 2nd International Conference on Advanced Computing, Networking and Informatics, vol. 28. Springer (2014)
Paul, G., Davidson, I., Mukherjee, I., Ravi, S.S.: Keyless steganography in spatial domain using energetic pixels. Int. Conf. Inf. Syst. Secur. (ICISS) 7671, 134–148 (2012)
Paul, G., Davidson, I., Mukherjee, I., Ravi, S.S.: Keyless dynamic optimal multi-bit image steganography using energetic pixels. In: Multimedia Tools and Applications, vol. 75, pp. 1–27. Springer (2016). https://doi.org/10.1007/s11042-016-3319-0
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Second International Workshop on Information Hiding, IH98, Portland, Oregon, U.S.A., Proceedings. LNCS 1525, pp. 219–239. Springer (1998). ISBN 3-540-65386-4
Petitcolas, F.A.P.: Watermarking schemes evaluation. IEEE Signal Process. 17(5), 58–64 (2000)
Song, X., Wang, S., Niu, X.: An integer DCT and affine transformation based image steganography method. In: IEEE 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 102–105, 18–20 July 2012
Veron, P.: Code based cryptography and steganography. In: 5th International Conference on Algebraic Informatics. LNCS, vol. 8080, pp. 9–46. Springer (2013). ISBN 978-3-642-40662-1. https://doi.org/10.1007/978-3-642-40663-8_5
Yang, C.H., Tsai, M.H.: Improving histogram-based reversible data hiding by interleaving predictions. IET Image Process. 4(4), 223–234 (2010). https://doi.org/10.1049/iet-ipr.2009.0316
Zhang, X.: Efficient data hiding with plus-minus one or two. IEEE Signal Process. Lett. 17(7), 635–638 (2010)
Zhang, X., Wang, S., Zhou, Z.: Multi-bit assignment steganography in palette images. IEEE Signal Process Lett. 15, 553–556 (2008). https://doi.org/10.1109/LSP.2008.2001117
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ghosh, U., Burman, D., Maity, S., Mukherjee, I. (2018). Adaptive Multi-bit Image Steganography Using Pixel-Pair Differential Approach. In: Saeed, K., Chaki, N., Pati, B., Bakshi, S., Mohapatra, D. (eds) Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, vol 563. Springer, Singapore. https://doi.org/10.1007/978-981-10-6872-0_5
Download citation
DOI: https://doi.org/10.1007/978-981-10-6872-0_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6871-3
Online ISBN: 978-981-10-6872-0
eBook Packages: EngineeringEngineering (R0)