Open Access Open Access  Restricted Access Subscription or Fee Access

Information Hiding Using Group of Bits Substitution


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecap.v7i2.11675

Abstract


The importance of any steganographic approach is based on its capacity and security in data transmission. This article proposes an image steganographic method, called three group of bits substitution (3GBS) which hides 3 bits of secret data in a pixel. Each pixel of an image can hide 3 bits of secret data. The Peak Signal-to-Noise Ratio (PSNR) and hiding capacity are two important parameters to evaluate the strength of any steganographic method. This article compares the PSNR and hiding capacity of the proposed 3GBS method with the existing GBS methods. The experimental results of the proposed method gives a conclusive evidence that the hiding capacity increased significantly with an acceptable visual fidelity of the produced-image.
Copyright © 2017 Praise Worthy Prize - All rights reserved.

Keywords


Steganography; Least Significant Bit (LSB); Group of Bits Substitution; Capacity; Peak Signal-to-Noise Ratio (PSNR)

Full Text:

PDF


References


H. Dadgostar, F. Afsari, Image steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSB. Journal of information security and applications. 2016, Pages 2-7.
http://dx.doi.org/10.1016/j.jisa.2016.07.001

G. Swain, Digital image steganography using variable length group of bits substitution. Procedia Computer Science, 85, 2016. Pages 31–38.
http://dx.doi.org/10.1016/j.procs.2016.05.173

A. K. Sahu, G. Swain, A Review on LSB substitution and PVD based image steganography techniques. Indonesian Journal of Electrical Engineering and Computer Science, 2(3), 2016. Pages 712-719.
http://dx.doi.org/10.11591/ijeecs.v2.i3.pp712-719

A. Pradhan, A. K. Sahu, G. Swain, & K. R. Sekhar, Performance evaluation parameters of image steganography techniques. International Conference on Research Advances in Integrated Navigation Systems, 2016,Pages1-8.
http://dx.doi.org/10.1109/rains.2016.7764399

X. Zhou, W. Gong, W. Fu & L. Jin, An improved method for LSB based color image steganography combined with cryptography. In Computer and Information Science (ICIS), IEEE/ACIS, 2016, Pages 1-4.
http://dx.doi.org/10.1109/icis.2016.7550955

A. K. Sahu, M. Sahu, Digital image steganography techniques in spatial domain: a study, International Journal of Pharmacy & Technology, Vol. 8, Issue No.4, 2016, Pages 5205- 5217
http://dx.doi.org/10.1109/rains.2016.7764399

J. Bai, C. C. Chang, T. S. Nguyen, C. Zhu, & Y. Liu, A High Payload Steganographic Algorithm Based on Edge Detection. Displays. 2017, Pages 42-45.
http://dx.doi.org/10.1016/j.displa.2016.12.004

K. S.Shet, A. R. Aswath, M. C. Hanumantharaju & X. Z. Gao, Design and development of new reconfigurable architectures for LSB/multi-bit image steganography system. Multimedia Tools and Applications, 2016, Pages 1-23.
http://dx.doi.org/10.1007/s11042-016-3736-0

G. Swain, & S. K. Lenka, A technique for secret communication using a new block cipher with dynamic steganography. International Journal of Security and Its Applications, 6(4), 2012, Pages 13–24.
http://dx.doi.org/10.1109/icectech.2011.5941806

R. Kumar, & S. Chand, A reversible data hiding scheme using bit flipping strategy, Journal of Discrete Mathematical Sciences and Cryptography, 19(2), 2016, Pages 331-345.
http://dx.doi.org/10.1080/09720529.2015.1085743

D. C. Wu, & W. H. Tsai, A steganographic method for images by pixel-value differencing. Pattern Recognition Letters, 24(9–10), 2003, Pages 1613–1626.
http://dx.doi.org/10.1016/s0167-8655(02)00402-6

G. Swain, Steganography in digital images using maximum difference of neighboring pixel values. International Journal of Security and Its Applications, 7(6), 2013, Pages 285–294.
http://dx.doi.org/10.14257/ijsia.2013.7.6.29

Swain G, Lenka SK. Classification of image steganography techniques in spatial domain: A study, International Journal of Computer Science & Engineering Technology (IJCSET). 2014; 5: 219 232.
http://dx.doi.org/10.1109/raecs.2014.6799604

A. Nilizadeh & A. R. N. Nilchi, A novel steganography method based on matrix pattern and LSB algorithms in RGB images. In Swarm Intelligence and Evolutionary Computation (CSIEC), 2016, Pages pp. 154-159.
http://dx.doi.org/10.1109/csiec.2016.7482107

S. Khan, N. Ahmad & M. Wahid, Varying index varying bits substitution algorithm for the implementation of VLSB steganography. Journal of the Chinese Institute of Engineers, 39(1), 2016, Pages 101-109.
http://dx.doi.org/10.1080/02533839.2015.1082933

M. Khodaei, B. S. Bigham, & K. Faez, Adaptive Data Hiding, Using Pixel-Value-Differencing and LSB substitution. Cybernetics and Systems, 47(8), 2016, Pages 617-628.
http://dx.doi.org/10.1080/01969722.2016.1214459

M. Hussain, A. W. A. Wahab, A. T. Ho, N.Javed, & K. H. Jung, A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Processing: Image Communication, 50, 2017, Pages 44-57.
http://dx.doi.org/10.1016/j.image.2016.10.005

X. Liao, and L. Ding, Data Hiding in Digital image using Four Pixel-value-differencing and Multiple-base Notational. In Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), IEEE. 2015 International Conference on, IEEE, 2015, Pages 76-80.
http://dx.doi.org/10.1109/iih-msp.2015.28

G. Swain, Digital image steganography using nine-pixel differencing and modified LSB substitution. Indian Journal of Science and Technology, 7(9), 2014, Pages 1444–1450.
http://dx.doi.org/10.17485/ijst/2016/v9i37/88557

A. Malik, G. Sikka, & H. K. Verma, A modified pixel-value differencing image steganographic scheme with least significant bit substitution method. International Journal of Image, Graphics and Signal Processing. 4, 2015, Pages 68–74.
http://dx.doi.org/10.5815/ijigsp.2015.04.08

M. Juneja, & P. S. Sandhu, Designing of robust image steganography technique based on LSB insertion and encryption. International Conference on Advances in Recent Technologies in Communication and Computing, 2009, Pages 302–305.
http://dx.doi.org/10.1109/artcom.2009.228

G. Swain, & S. K. Lenka, A novel steganography technique by mapping words with LSB array. International Journal of Signal and Imaging Systems Engineering, 8(1), 2015, Pages 115–122.
http://dx.doi.org/10.1504/ijsise.2015.067052

Z. Wang, & A. Bovik, A universal image quality index. IEEE Signal Processing Letters, 9(3), 2002. Pages 81–84.
http://dx.doi.org/10.1109/97.995823

A. Pradhan, K. R. Sekhar, G. Swain, Digital image steganography combining LSB substitution with five way PVD in 2×3 pixel blocks, International Journal of Pharmacy and Technology, 8(4), 2016, Pages 22051-22061.
http://dx.doi.org/10.17485/ijst/2016/v9i37/88557

G. Swain, A steganographic method combining LSB substitution and PVD in a block, Procedia Computer Science, 85, 2016, Pages 39-44.
http://dx.doi.org/10.1016/j.procs.2016.05.174

G. Swain, Adaptive pixel value differencing steganography using both vertical and horizontal edges. Multimedia Tools and Applications. 5; 21(75), 2015, Pages 13541-56.
http://dx.doi.org/10.1007/s11042-015-2937-2

W. L. Xu, C. C. Chang, T. S. Chen, & L. M. Wang, An improved least-significant-bit substitution method using the modulo three strategy. Displays, 42, 2016, Pages 36-42.
http://dx.doi.org/10.1016/j.displa.2016.03.002

A.K. Al- Dhamari & K. A. Darabkh, Block-Based Steganographic Algorithm Using Modulus Function and Pixel-Value Differencing. Journal of Software Engineering and Applications, 10(01), 2017, Pages 56-77.
http://dx.doi.org/10.4236/jsea.2017.101004

T. C. Lu, & Y. C. Lu, An Improved Data Hiding Method of Five Pixel Pair Differencing and LSB Substitution Hiding Scheme. In Advances in Intelligent Information Hiding and Multimedia Signal Processing: 2016, Kaohsiung, Taiwan, Volume 1 Springer International Publishing. 2017, Pages 67-74.
http://dx.doi.org/10.1007/978-3-319-50209-0_9


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize