Abstract
With the advent of growing terrorism in the world and the availability of the internet, data integrity is being endangered. Hence ensuring the security of the messages is paramount. Steganography is used—the process of hiding information in image, video, etc. Steganography is not any novel technique, it had been used too earlier where they use to shave the head and embed the message on to it and then wait for the hair to grow in ancient Greece; it was also used in war times. The methodology carried out here is of least significant bit technique and random pixel technique. A brief analysis of various algorithms is done and a histogram is also plotted. The image steganography methodology is performed using MATLAB/Simulink. It is also vindicated as to where to hide the message in the image so that, it is barely noticed by any observer, keeping in view the quality, size, and resolution of the image.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Zhou Z, Mu Y, Jonathan Wu QM (2019) Coverless Image Steganography using partial-duplicate image retrieval. J Soft Comput 23(13):4927–4038
Luo Y, Qin J, Xiang X, Tan Y, Liu Q (2020) Coverless Real-Time image information hiding based on image block matching and dense convolutional network. J Real-Time Image Process 17(1):125–135
Li C, Sun X, Zhou Z, Yang Y (2020) Real-time image carrier generation based on generative adversarial network and fast object detection. J Real-time Image Process:1–11
Parah SA, Sheikh JA, Akhoon JA, Loan NA, Bhat GM (2018) Information hiding in edges: a high capacity information hiding technique using hybrid edge detection. Multimedia Tools Appl 77(1):185–207
Deshmukh PU, Pattewar TM (2014) A novel approach for edge adaptive steganography on LSB insertion technique. In: IEEE international conference on information communication and embedded systems (ICICES), pp 1–5
Modi MR, Islam S, Gupta P (2013) Edge based steganography on colored images. In: 9th international conference on intelligent computing (ICIC), July 2013, pp 593–600
Qing X, Jianquan X, Yunhua X (2010) A high capacity information hiding algorithm in color image. In: Proceedings of 2nd IEEE international conference on e-business and information system security, May 2010, pp 1–4
Lee C-W, Tsai W-H (2010) A new steganographic method based on information sharing via PNG images. In: IEEE 2nd international conference on computer and automation engineering (ICCAE), Feb 2010, pp 807–811
Juneja M, Sandhu PS (2013) An improved LSB based steganography technique for RGB color images. In: Proceedings of second international conference on latest computational technologies, pp 10–14
Akhtar N, Khan S, Johri P (2014) An improved inverted LSB image steganography. In: IEEE international conference on issues and challenges in intelligent computing techniques (ICICT), Feb 2014, pp 749–755
Qazanfari K, Safabakhsh R (2014) A new steganography method which preserves histogram: generalization of LSB++. Int J Inf Sci:90–101
Gupta S, Gujral G, Aggarwal N (2012) Enhanced least significant bit algorithm for image steganography. Int J Comput Eng Manage, July 2012, pp 40–42
Prashanti G, Sandhyarani K (2015) A new approach for data hiding with LSB steganography, emerging ICT for bridging the future—proceedings of the 49th annual convention of the computer society of India CSI. Springer 2015, pp 423–430
Singh NJP, Biswas S, Sarkar D, Sarkar PP (2014) A huffman code based image steganography technique. In: 1st international conference on applied algorithm (ICAA), Jan 2014, pp 257–265
Feng B, Lu W, Sun W (2015) Secure binary image steganography based on minimizing the distortion on the texture. IEEE Trans Inf Forensics Sec
Baby D, Thomas J, Augustine G, George E, Michael NR (2015) A novel DWT based image securing method using steganography. In: International conference on information and communication technologies (ICICT), procedia computer science, pp 612–618
Mielikainen J (2006) LSB matching revisted. IEEE Signal Process Lett 13(5)
Juneja M, Sandhu PS (2009) Designing of robust image steganography technique based on LSB insertion and encryption. In: 2009 IEEE international conference on advances in recent technologies in communication and computing
Eyre W, Rogers M (2006) Steganography and terrorist communications: current information and trends—tools, analysis and future directions in steganalysis in context with terrorists and other criminals. In: Annual ADFSL conference on digital forensics, security and law. Springer, pp 567–579
Yang H, Sun X, Sun G (2009) A high-capacity image data hiding scheme using adaptive LSB substitution. J Radio Eng 18(4):509–516
Kumar R, Kumar N, Jung K-H (2020) Color image steganography scheme using gray invariant in AMBTC compression domain. In: Multidimensional systems and signal processing. Springer, pp 1–18
Mukherjee S, Sanyal G (2019) A multi level image steganography methodology based on adaptive PMS and block based pixel swapping. J Multimedia Tools Appl 78(13):17607–17622
Samidha D, Agrawal D (2013) Random image steganography in spatial domain. In: IEEE international conference on emerging trends in VLSI, embedded system, nano electronics and telecommunication system (ICEVENT), Jan 2013, pp 1–3
Karim SMM, Rahman MS, Hossain MI (2011) A new approach for LSB based image steganography using secret key. In: Proceedings of 14th IEEE international conference on computer and information technology, Dec 2011, pp 286–291
Yang C-H, Weng C-Y, Wang S-J (2008) Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans Inf Forensics Secur 3(3)
Zhang X, Wang S (2003) Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Elsevier J, received 23 June 2003; received in revised form 13 Oct 2003
Wu H-C, Wu N-I, Tsai C-S, Hwang M-S (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEEE Proc Vis Image Signal Process 152(5)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Rachna, S., Kumar, R. (2021). Image Steganography: An Inevitable Need for Data Security. In: Singh, H., Singh Cheema, P.P., Garg, P. (eds) Sustainable Development Through Engineering Innovations. Lecture Notes in Civil Engineering, vol 113. Springer, Singapore. https://doi.org/10.1007/978-981-15-9554-7_35
Download citation
DOI: https://doi.org/10.1007/978-981-15-9554-7_35
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9553-0
Online ISBN: 978-981-15-9554-7
eBook Packages: EngineeringEngineering (R0)