Skip to main content

Adaptive Multi-bit Image Steganography Using Pixel-Pair Differential Approach

  • Conference paper
  • First Online:
Book cover Progress in Advanced Computing and Intelligent Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 563))

Abstract

With the increase of communication over Internet, the issue of security has become an important factor. Steganography is a consequence of the increasing degradation of reliability. The roots of steganography lie in ancient Greek civilization. With time, steganography has moved a long way in the path of advancement. It started off with least significant bit (LSB) embedding which mainly focussed on data security. With time, many algorithms have been designed using multi-bit steganography which takes into account both security and capacity of data embedded. In this paper, a new technique has been introduced where various parameters determine the number of bits embedded. This helps to improve the robustness of this method. We show empirically that our method withstands the statistical attacks and benchmark.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cipra, B.: An introduction to the Ising model. Am. Math. Mon. 94(10), 937–959 (1987)

    Google Scholar 

  2. Ghosh, U., Maity, S., Mukherjee, I.: Statistical attack resistant multi-bit steganography using mobile keypad character encoding. In: International Conference on Telecommunication Technology and Management (ICTTM-2015), IIT Delhi, India, pp. 19, 11–12 Apr 2015. ISBN: 987-0-9926800-5-3

    Google Scholar 

  3. Mandal, J.K., Das, D.: Colour image steganography based on pixel value differencing in spatial domain. Int. J. Inf. Sci. Tech. (IJIST) 2(4), 83–93 (2012)

    Google Scholar 

  4. Mukherjee, I., Podder, A.: DCT based robust multi-bit steganographic algorithm. In: 2nd International Conference on Advanced Computing, Networking and Informatics, vol. 28. Springer (2014)

    Google Scholar 

  5. Paul, G., Davidson, I., Mukherjee, I., Ravi, S.S.: Keyless steganography in spatial domain using energetic pixels. Int. Conf. Inf. Syst. Secur. (ICISS) 7671, 134–148 (2012)

    Google Scholar 

  6. Paul, G., Davidson, I., Mukherjee, I., Ravi, S.S.: Keyless dynamic optimal multi-bit image steganography using energetic pixels. In: Multimedia Tools and Applications, vol. 75, pp. 1–27. Springer (2016). https://doi.org/10.1007/s11042-016-3319-0

  7. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Second International Workshop on Information Hiding, IH98, Portland, Oregon, U.S.A., Proceedings. LNCS 1525, pp. 219–239. Springer (1998). ISBN 3-540-65386-4

    Google Scholar 

  8. Petitcolas, F.A.P.: Watermarking schemes evaluation. IEEE Signal Process. 17(5), 58–64 (2000)

    Google Scholar 

  9. Song, X., Wang, S., Niu, X.: An integer DCT and affine transformation based image steganography method. In: IEEE 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 102–105, 18–20 July 2012

    Google Scholar 

  10. Veron, P.: Code based cryptography and steganography. In: 5th International Conference on Algebraic Informatics. LNCS, vol. 8080, pp. 9–46. Springer (2013). ISBN 978-3-642-40662-1. https://doi.org/10.1007/978-3-642-40663-8_5

  11. Yang, C.H., Tsai, M.H.: Improving histogram-based reversible data hiding by interleaving predictions. IET Image Process. 4(4), 223–234 (2010). https://doi.org/10.1049/iet-ipr.2009.0316

  12. Zhang, X.: Efficient data hiding with plus-minus one or two. IEEE Signal Process. Lett. 17(7), 635–638 (2010)

    Google Scholar 

  13. Zhang, X., Wang, S., Zhou, Z.: Multi-bit assignment steganography in palette images. IEEE Signal Process Lett. 15, 553–556 (2008). https://doi.org/10.1109/LSP.2008.2001117

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Uttiya Ghosh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ghosh, U., Burman, D., Maity, S., Mukherjee, I. (2018). Adaptive Multi-bit Image Steganography Using Pixel-Pair Differential Approach. In: Saeed, K., Chaki, N., Pati, B., Bakshi, S., Mohapatra, D. (eds) Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, vol 563. Springer, Singapore. https://doi.org/10.1007/978-981-10-6872-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6872-0_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6871-3

  • Online ISBN: 978-981-10-6872-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics