Abstract
Recent developments in computer security have shown that steganography rather than cryptography is the better method of securing data. A commonly used technique in steganography is the least significant bits (LSB) method, which is, however, vulnerable to attacks due to its simplicity. Nonetheless, it would be difficult or impractical to discern encrypted data if a stego key is added. In this chapter, we show how a carrier image is used to hide another image and present a modified approach for embedding a stego key within it. A 24-bit color carrier image is used to hide the secret image and the same is further used to hide the stego key. We compare the peak signal-to-noise ratio (PSNR) and mean squared error (MSE) and conduct a histogram analysis to determine to what level the stego image is blurred in the carrier image.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Nani, Koduri 2011. Information security through image steganography using least significant bit algorithm. M.Sc. dissertation, University of East London.
Sharma, Vipul, and Sunny Kumar. 2013. A New Approach to Hide Text in Images Using Steganography. International Journal of Advanced Research in Computer Science and Software Engineering 3 (4): 701–708.
Aniket, G., and Meshram, Rahul Patil. 2014. Secure secret key transfer using modified hash based LSB method. International Journal of Computer Science and Information Technologies, 5 (6): 7683–7685.
Kumar, Arvind, and Km. Pooja. 2010. Steganography-A Data Hiding Technique. International Journal of Computer Applications, 9 (7), 19–23.
Rejani, R., D. Murugan, and Deepu V. Krishnan. 2015. Pixel pattern based steganography on images. ICTACT Journal on Image and Video Processing Communication Technology 5 (3): 991–997. https://doi.org/10.21917/ijivp.2015.0146.
Nagaraj, V., V. Vijayalakshmi, and G. Zayaraz. 2011. Modulo based image steganography technique against statistical and histogram analysis. IJCA Special Issue on Network Security and Cryptography 4: 34–39. https://doi.org/10.5120/4347-046.
Rawat, Deepesh, and Vijaya Bhandari. 2013. A steganography technique for hiding image in an image using LSB method for 24 bit color image. International Journal of Computer Applications 64 (20): 15–19. https://doi.org/10.5120/10749-5625.
Tiwari, Anjali, Seema Rani Yadav, and N.K. Mittal. 2014. A review on different image steganography techniques. International Journal of Engineering and Innovative Technology, 3 (7): 121–124.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Kini, N.G., Vishwas G. Kini, Gautam (2019). A Secured Steganography Algorithm for Hiding an Image in an Image. In: Krishna, A., Srikantaiah, K., Naveena, C. (eds) Integrated Intelligent Computing, Communication and Security. Studies in Computational Intelligence, vol 771. Springer, Singapore. https://doi.org/10.1007/978-981-10-8797-4_54
Download citation
DOI: https://doi.org/10.1007/978-981-10-8797-4_54
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8796-7
Online ISBN: 978-981-10-8797-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)