Skip to main content

Image Steganography: An Inevitable Need for Data Security

  • Conference paper
  • First Online:
Sustainable Development Through Engineering Innovations

Part of the book series: Lecture Notes in Civil Engineering ((LNCE,volume 113))

Abstract

With the advent of growing terrorism in the world and the availability of the internet, data integrity is being endangered. Hence ensuring the security of the messages is paramount. Steganography is used—the process of hiding information in image, video, etc. Steganography is not any novel technique, it had been used too earlier where they use to shave the head and embed the message on to it and then wait for the hair to grow in ancient Greece; it was also used in war times. The methodology carried out here is of least significant bit technique and random pixel technique. A brief analysis of various algorithms is done and a histogram is also plotted. The image steganography methodology is performed using MATLAB/Simulink. It is also vindicated as to where to hide the message in the image so that, it is barely noticed by any observer, keeping in view the quality, size, and resolution of the image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhou Z, Mu Y, Jonathan Wu QM (2019) Coverless Image Steganography using partial-duplicate image retrieval. J Soft Comput 23(13):4927–4038

    Google Scholar 

  2. Luo Y, Qin J, Xiang X, Tan Y, Liu Q (2020) Coverless Real-Time image information hiding based on image block matching and dense convolutional network. J Real-Time Image Process 17(1):125–135

    Article  Google Scholar 

  3. Li C, Sun X, Zhou Z, Yang Y (2020) Real-time image carrier generation based on generative adversarial network and fast object detection. J Real-time Image Process:1–11

    Google Scholar 

  4. Parah SA, Sheikh JA, Akhoon JA, Loan NA, Bhat GM (2018) Information hiding in edges: a high capacity information hiding technique using hybrid edge detection. Multimedia Tools Appl 77(1):185–207

    Article  Google Scholar 

  5. Deshmukh PU, Pattewar TM (2014) A novel approach for edge adaptive steganography on LSB insertion technique. In: IEEE international conference on information communication and embedded systems (ICICES), pp 1–5

    Google Scholar 

  6. Modi MR, Islam S, Gupta P (2013) Edge based steganography on colored images. In: 9th international conference on intelligent computing (ICIC), July 2013, pp 593–600

    Google Scholar 

  7. Qing X, Jianquan X, Yunhua X (2010) A high capacity information hiding algorithm in color image. In: Proceedings of 2nd IEEE international conference on e-business and information system security, May 2010, pp 1–4

    Google Scholar 

  8. Lee C-W, Tsai W-H (2010) A new steganographic method based on information sharing via PNG images. In: IEEE 2nd international conference on computer and automation engineering (ICCAE), Feb 2010, pp 807–811

    Google Scholar 

  9. Juneja M, Sandhu PS (2013) An improved LSB based steganography technique for RGB color images. In: Proceedings of second international conference on latest computational technologies, pp 10–14

    Google Scholar 

  10. Akhtar N, Khan S, Johri P (2014) An improved inverted LSB image steganography. In: IEEE international conference on issues and challenges in intelligent computing techniques (ICICT), Feb 2014, pp 749–755

    Google Scholar 

  11. Qazanfari K, Safabakhsh R (2014) A new steganography method which preserves histogram: generalization of LSB++. Int J Inf Sci:90–101

    Google Scholar 

  12. Gupta S, Gujral G, Aggarwal N (2012) Enhanced least significant bit algorithm for image steganography. Int J Comput Eng Manage, July 2012, pp 40–42

    Google Scholar 

  13. Prashanti G, Sandhyarani K (2015) A new approach for data hiding with LSB steganography, emerging ICT for bridging the future—proceedings of the 49th annual convention of the computer society of India CSI. Springer 2015, pp 423–430

    Google Scholar 

  14. Singh NJP, Biswas S, Sarkar D, Sarkar PP (2014) A huffman code based image steganography technique. In: 1st international conference on applied algorithm (ICAA), Jan 2014, pp 257–265

    Google Scholar 

  15. Feng B, Lu W, Sun W (2015) Secure binary image steganography based on minimizing the distortion on the texture. IEEE Trans Inf Forensics Sec

    Google Scholar 

  16. Baby D, Thomas J, Augustine G, George E, Michael NR (2015) A novel DWT based image securing method using steganography. In: International conference on information and communication technologies (ICICT), procedia computer science, pp 612–618

    Google Scholar 

  17. Mielikainen J (2006) LSB matching revisted. IEEE Signal Process Lett 13(5)

    Google Scholar 

  18. Juneja M, Sandhu PS (2009) Designing of robust image steganography technique based on LSB insertion and encryption. In: 2009 IEEE international conference on advances in recent technologies in communication and computing

    Google Scholar 

  19. Eyre W, Rogers M (2006) Steganography and terrorist communications: current information and trends—tools, analysis and future directions in steganalysis in context with terrorists and other criminals. In: Annual ADFSL conference on digital forensics, security and law. Springer, pp 567–579

    Google Scholar 

  20. Yang H, Sun X, Sun G (2009) A high-capacity image data hiding scheme using adaptive LSB substitution. J Radio Eng 18(4):509–516

    Google Scholar 

  21. Kumar R, Kumar N, Jung K-H (2020) Color image steganography scheme using gray invariant in AMBTC compression domain. In: Multidimensional systems and signal processing. Springer, pp 1–18

    Google Scholar 

  22. Mukherjee S, Sanyal G (2019) A multi level image steganography methodology based on adaptive PMS and block based pixel swapping. J Multimedia Tools Appl 78(13):17607–17622

    Article  Google Scholar 

  23. Samidha D, Agrawal D (2013) Random image steganography in spatial domain. In: IEEE international conference on emerging trends in VLSI, embedded system, nano electronics and telecommunication system (ICEVENT), Jan 2013, pp 1–3

    Google Scholar 

  24. Karim SMM, Rahman MS, Hossain MI (2011) A new approach for LSB based image steganography using secret key. In: Proceedings of 14th IEEE international conference on computer and information technology, Dec 2011, pp 286–291

    Google Scholar 

  25. Yang C-H, Weng C-Y, Wang S-J (2008) Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans Inf Forensics Secur 3(3)

    Google Scholar 

  26. Zhang X, Wang S (2003) Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Elsevier J, received 23 June 2003; received in revised form 13 Oct 2003

    Google Scholar 

  27. Wu H-C, Wu N-I, Tsai C-S, Hwang M-S (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEEE Proc Vis Image Signal Process 152(5)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sneh Rachna .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rachna, S., Kumar, R. (2021). Image Steganography: An Inevitable Need for Data Security. In: Singh, H., Singh Cheema, P.P., Garg, P. (eds) Sustainable Development Through Engineering Innovations. Lecture Notes in Civil Engineering, vol 113. Springer, Singapore. https://doi.org/10.1007/978-981-15-9554-7_35

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9554-7_35

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9553-0

  • Online ISBN: 978-981-15-9554-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics