Skip to main content

A Novel Image Steganography Model Using LSB with Extended ASCII Codes

  • Conference paper
  • First Online:
Smart Intelligent Computing and Applications

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 159))

Abstract

Steganography is a method for invisible communication while concealing the actual data to be transmitted within non-secret data or text. It is the process of hiding the secret information within another form of data like text, image, audio, or video. Image steganography intends to embed a secret message into another image, called as a cover image through an encrypting algorithm, and the secret data can be retrieved by using a decrypting algorithm. The two major techniques used in image steganography process are spatial domain and transform domain. LSB is a commonly used technique as the payload capacity is higher compared to transform domain techniques, whereas the robustness is lower. There are various other models where the disadvantages of each type are being reduced. But the proposed model is a hybrid model which would increase payload capacity as well as robustness with a strong security. This helps to combine the advantages of each type of image steganography. We can do so by replacing the common words by using special symbols with extended ASCII values.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sheth, R.K., Tank, R.M.: Image steganography techniques. Int. J. Comput. Eng. Sci. (IJCES), 1(2). (Raksha Shakti University Ahmedabad Rashmi M. Tank M.E. (C.E.), student B.V.M. Engineering College V V Nagar) (2015)

    Article  Google Scholar 

  2. Hussain, M., Hussain. M.: A survey of image steganography techniques. Int. J. Adv. Sci. Technol. (IJAST), 53 (Institute of Science & Technology, (SZABIST), Islamabad, Pakistan) (2013)

    Google Scholar 

  3. Victer Paul, P.,Ramalingam, A., Baskaran, R., Dhavachelvan, P., Vivekanandan, K., Subramanian, R.: A new population seeding technique for permutation-coded genetic algorithm: service transfer approach. J. Comput. Sci. (5), 277–297 (2014) (Elsevier)

    Article  Google Scholar 

  4. Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: study and analysis of current methods. Signal Process. 90 (3), March 2010, 727–752 (University of Ulster at Magee, Londonderry, BT48 7JL, Northern Ireland, United Kingdom)

    Google Scholar 

  5. Kaur, S., Bansal, S., Bansal, R.K.: Steganography and classification of image steganography techniques. In 2014 International Conference on Computing Sustainable Global Development (INDIACom), pp. 870–875 (2014)

    Google Scholar 

  6. Morkel, T., Eloff, J.H.P., Olivier, M.S.: An overview of image steganography. In Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, June/July 2005 (Published electronically), Information and Computer Security Architecture (ICSA) Research Group Department of Computer Science University of Pretoria, 0002, Pretoria, South Africa

    Google Scholar 

  7. Thangadurai, K., Sudha Devi, G.: An analysis of LSB based image steganography techniques. Int. Conf. Comput. Commun. Inf. (ICCCI-2014), Jan 03–05, 2014 (Coimbatore, India, PG and Research Department of Computer Science, Govt., Arts College (Autonomous), Karur, India)

    Google Scholar 

  8. Chandramouli, R., Memon, N.: Analysis of LSB based image steganography techniques. In: Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205), Greece

    Google Scholar 

  9. Kumar, A., Sharma, R.: A Secure image steganography based on RSA algorithm and hash-LSB technique. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(7), July 2013, ISSN: 2277 128X

    Google Scholar 

  10. Masud Karim, S.M., Rahman M.S., Hossain, M.I.: A New approach for LSB based image steganography using secret key. In: 14th International Conference on Computer and Information Technology (ICCIT 2011), Dhaka, pp. 286–291 (2011)

    Google Scholar 

  11. Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2, June 2010), ISSN: 1556-6021, Guangdong Key Laboratory of Information Security Technology, Guangzhou, China

    Google Scholar 

  12. Parvez, M.T., Gutub, A.A.A.: RGB intensity based variable-bits image steganography. In: IEEE Asia-Pacific Services Computing Conference (2008), ISBN: 978-0-7695-3473-2, Saudi Arabia (2008)

    Google Scholar 

  13. Mishra, A., Gupta, A., Vishwakarma, D.K.: Proposal of a new steganographic approach. In: International Conference on Advances in Computing, Control, and Telecommunication Technologies, Kerala, India, ISBN: 978-0-7695-3915-7, Department of Electronics & Communication Engineering, ASET, Amity University, India (2009)

    Google Scholar 

  14. Mathkour, H., Assassa, G.M.R., Al Muharib, A., Kiady, I.: A novel approach for hiding messages in images. In: International Conference on Signal Acquisition and Processing, Malaysia, ISBN: 978-0-7695-3594-4, Department of Computer Science College of Computer and Information Sciences King Saud University Riyadh, Kingdom of Saudi Arabia (2009)

    Google Scholar 

  15. Yang, H., Sun, X., Sun, G.: A high-capacity image data hiding scheme using adaptive LSB substitution. Radioengineering, 18(4, December 2009), School of Computer and Communication, Hunan University, Changsha, China Dept. of Information Science & Engg., Hunan First Normal Univ., Changsha, China

    Google Scholar 

  16. Mandal, J.K., Das, D.: Colour image steganography based on pixel value differencing in the spatial domain. Int. J. Inf. Sci. Techn. (IJIST) 2(4, July 2012), Department of Computer Science and Engineering, University of Kalyani, Kalyani, West Bengal, India

    Google Scholar 

  17. Pazhaniraja, N., Priyadharshini, V., Divya, P., Preethi, D., Victer Paul, P.: Bio inspired algorithm based web service optimization—a survey. Int. J. Appl. Eng. Res. (IJAER), 10(5), 13231–13242 (2015)

    Google Scholar 

  18. Victer Paul, P., Moganarangan, N., Sampath Kumar, S., Raju, R., Vengattaraman, T., Dhavachelvan, P.: Performance analyses over population seeding techniques of the permutation-coded genetic algorithm: an empirical study based on traveling salesman problems. Appl. Soft Comput 32(July 2015) 383–402 (Elsevier)

    Article  Google Scholar 

  19. Logesh, R., Ramalingam, A., Hemalatha, M., Victer Paul, P., Prabhakaran, M.: High capacity ideal image steganography scheme in networks using scrambled payload. J. Eng. Interdisc. Res. (JEIR) (1), 28–34(2014)

    Google Scholar 

  20. Baskaran, R., Victer Paul, P., Dhavachelvan, P.: Ant colony optimization for data cache technique in MANET. In: International Conference on Advances in Computing (ICADC 2012), Advances in Intelligent and Soft Computing series, vol. 174, pp. 873–878. Springer (2012, June)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Victer Paul .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sai Ravi Chandra, N., Sneha, V., Victer Paul, P. (2020). A Novel Image Steganography Model Using LSB with Extended ASCII Codes. In: Satapathy, S., Bhateja, V., Mohanty, J., Udgata, S. (eds) Smart Intelligent Computing and Applications . Smart Innovation, Systems and Technologies, vol 159. Springer, Singapore. https://doi.org/10.1007/978-981-13-9282-5_11

Download citation

Publish with us

Policies and ethics