Skip to main content

Enhancing Embedding Capacity of JPEG Images in Smartphones by Selection of Suitable Cover Image

  • Conference paper
  • First Online:
ICDSMLA 2019

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 601))

  • 53 Accesses

Abstract

Popularity and dependency of smartphones in a day to day lives originated the demand to invent the methods to secure the private and business data stored in them. Image steganography is one of the methods adopted to enhance their security by hiding the sensitive information behind the image. It is applied in a manner that there are no visible visual or statistical changes in the cover image. Undetectability and robustness are the major requirements of any image steganography algorithm. Another parameter that plays an important role is embedding capacity-the amount of data that can be hidden in the image. The most common image format in smartphones is jpeg. Jpeg images undergo lossy compression and as a result, their size is small as compared to other image formats undergoing lossless compression. It is a challenge to hide high message payload in jpeg images. This research paper focuses on finding out various methods to increase the embedding capacity of jpeg images. It firstly probes and compares compression algorithms and tries to find out how they can help in increasing the amount of data that can be hidden inside the image. Secondly, it discusses the various statistical parameters which can be exploited in order to select suitable cover image before applying image steganography. Thirdly, it proposes a new algorithm which calculates payload capacity of an image which helps in selection of a suitable cover image. It uses MSE, PSNR and SSIM image quality metrics to validate the algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. La Polla M, Martinelli F, Sgandurra D (2013) A survey on security for mobile devices. IEEE Commun Surv Tutor 15(1):446–471

    Article  Google Scholar 

  2. Botha R, Furnell S, Clarke N (2009) From desktop to mobile: examining the security experience. Comput Secur 28(3–4):130–137

    Article  Google Scholar 

  3. Caviglione L, Coccoli M (2011) Privacy problems with Web 2.0. Comput Fraud Secur 2011(10):16–19

    Google Scholar 

  4. Blelloch E (2002) Introduction to data compression. In: Computer science department. Carnegie Mellon University

    Google Scholar 

  5. Huffman DA (1952) A method for the construction of minimum redundancy codes. Proc Inst Radio Eng 40(9):1098–1101

    Google Scholar 

  6. Munirajan et al (2004) Transform domain steganography detection using fuzzy inference systems. In: The IEEE sixth international symposium on multimedia software engineering, pp 286–291

    Google Scholar 

  7. Zhang T, Ping X (2003) A fast and effective steganalytic technique against jsteg-like algorithms. In: Proceedings of the 8th ACM symposium, applied computing. ACM Press

    Google Scholar 

  8. Provos N (2001) Defending against statistical steganalysis. In: Proceedings of the 10th USENIX security symposium, vol 10, pp 323–335

    Google Scholar 

  9. Westfeld A (2001) F5-a steganographic algorithm. In: International workshop on information hiding. Springer, Berlin, Heidelberg

    Google Scholar 

  10. Tejashwini H, Shailesh ML (2013) Improving colour image steganographic capacity based on modified quantization table. In: Proceedings of international conference on ERCICA 2013. Elesevier Publications, ISBN 9789351071020

    Google Scholar 

  11. Gope et al (2010) An enhanced JPEG steganography scheme with encryption system. Int J Comput Electr Eng 2(5):1793–8163

    Google Scholar 

  12. Antony J et al (2016) Method to enhance the capacity of embedding data in JPEG images. Int J Res Comp Commun Technol 5(2):47–50

    Google Scholar 

  13. Attaby AA et al (2017) Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3. Ain Shams Eng J. http://dx.doi.org/10.1016/j.asej.2017.02.003

  14. Kamal AHM, Islam MM (2016) Enhancing embedding capacity and stego image quality by employing multi predictors. J Inf Secur Appl. https://doi.org/10.1016/j.jisa.2016.08.005

  15. Bajpai S, Saxena K (2014) Enhancing embedding capacity by compartmentalizing pixels using LSB techniques in steganography. Int J Eng Sci 10. ISSN: 2229-6913 (Print), ISSN: 2320-0332 (Online)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dipti Watni .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Watni, D., Chawla, S. (2020). Enhancing Embedding Capacity of JPEG Images in Smartphones by Selection of Suitable Cover Image. In: Kumar, A., Paprzycki, M., Gunjan, V. (eds) ICDSMLA 2019. Lecture Notes in Electrical Engineering, vol 601. Springer, Singapore. https://doi.org/10.1007/978-981-15-1420-3_22

Download citation

Publish with us

Policies and ethics