Skip to main content

LSB Technique-Based Dual-Image Steganography Using COS Function

  • Conference paper
  • First Online:
Proceedings of Emerging Trends and Technologies on Intelligent Systems (ETTIS 2021)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1371))

  • 271 Accesses

Abstract

Due to the advancement in technology, the exchange of information via a network has been taking such a great peak that each and every person is highly dependent on the Internet, like in the current Covid-19 pandemic situation. But sharing information/secret medical data by means of the Internet has created a risk to the information loss. Thus, data exchange should be done in such a way that its presence cannot be perceived by the third party with bad intentions and should not be able to modify or alter the important message. For the safety of important data, many algorithms like cryptography, steganography, watermarking, etc. have been used by researchers to safeguard data sharing via an insecure Internet. Cryptography and steganography together can provide better security to the data as one encrypts the data and the other hides its presence in multimedia, like image, audio, video, etc. In this paper, data encryption and image steganography have been presented to provide security to the message that is being transferred through the Internet. The experimental outcomes show that the proposed technique is able to transfer important data securely without coming into the eyes of a hacker. The PSNR value for the proposed system is about 51.14 with 1 bit per pixel (bpp) capacity. As per the security view, the presented method has a 7.99 entropy value, which means the system is secure against attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jan, A., Parah, S.A., Malik, B.A.: A Novel Laplacian of Gaussian and Chaotic encryption based image steganography technique. In: 2020 International Conference for Emerging Technology (INCET), Belgaum, pp. 1–4 (2020). https://doi.org/10.1109/INCET49848.2020.9154173

  2. Kundu, D., Upreti, A.: Survey of various steganography tools. In: 2018 International Conference on Automation and Computational Engineering (ICACE), Greater Noida, pp. 117–120 (2018). https://doi.org/10.1109/ICACE.2018.8687092

  3. Dhawan, S., Gupta, R.: Analysis of various data security techniques of steganography: A survey. Inf. Secur. J. Glob. Perspect (Taylor & Francis) (2020). https://doi.org/10.1080/19393555.2020.1801911

  4. Jan, A, Parah, S.A., Malik, B.A.: Logistic Map-Based Steganography using Edge Detection. Innovations in Computational Intelligence and Computer Vision. Springer, (2020). https://doi.org/10.1007/978-981-15-6067-5_50

  5. Brar, R.K., Sharma, A.: Improved steganography using odd even substitution. Learn. Anal. Intell. Syst. 17, 1–8 (2020). https://doi.org/10.1007/978-3-030-48118-6_2 (Springer)

    Article  Google Scholar 

  6. Raju, K.U., Prabha, D.N.A.: Chaos Encryption Images on Lossless and Reversible Data Hiding using Wavelet Transform. Easychair Preprint (2345) (2020). https://easychair.org/publications/preprint/2tVH

  7. Parah, S.A., Sheikh, J.A., Akhoon, J.A., Loan, N.A.: Electronic health record hiding in images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication. Futur. Gener. Comput. Syst. (2018). https://doi.org/10.1016/j.future.2018.02.023 (Elsevier)

    Article  Google Scholar 

  8. Parah, S.A., Loan, N.A., Shah, A.A., Sheikh, J.A., Bhat, G.M.: A new secure and robust watermarking technique based on logistic map and modification of DC coefficient. Nonlinear Dyn. (Science and Business Media B.V., Springer) (2018) https://doi.org/10.1007/s11071-018-4299-6

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jan, A., Parah, S.A., Hussan, M., Malik, B.A. (2022). LSB Technique-Based Dual-Image Steganography Using COS Function. In: Noor, A., Sen, A., Trivedi, G. (eds) Proceedings of Emerging Trends and Technologies on Intelligent Systems . ETTIS 2021. Advances in Intelligent Systems and Computing, vol 1371. Springer, Singapore. https://doi.org/10.1007/978-981-16-3097-2_20

Download citation

Publish with us

Policies and ethics