A robust way of steganography by using blocks of an image in spatial domain
DOI:
https://doi.org/10.15649/2346075X.690Keywords:
Steganography; Information hiding; Spatial domain; LSB Matching.Abstract
Steganography is a way to convey secret communication, with rapid electronic communication and high demand of using the internet, steganography has become a wide field of research and discussion. In this paper a new approach for hiding information in cover image proposed in spatial domain, the proposed approach divides the host image into blocks of size (8x8) pixels and message bits are embeds into the pixels of a cover image. The 64-pixel values of each block converted to be represented in binary system and compared with corresponding secret data bits for finding the matching and hold 6-pixels. The search process performed by comparing each secret data bit (8-bits) with created binary plane at the cover image, if matching is found the last row of the created binary plane which is (LSB) is modified to indicate the location of the matched bits sequence “which is the secret data” and number of the row, if matching is not found in all 7th rows the secret sequence is copied in to the corresponding 8th row location.
The payload of this technique is 6 pixels’ message (48-bits) in each block. In the experiments secret messages are randomly embedded into different images. The quality of the stego-image from which the original text message is extracted is not affected at all. For validation of the presented mechanism, the capacity, the circuit complexity, and the measurement of distortion against steganalysis is evaluated using the peak-signal-to-noise ratio (PSNR) are analyzed.
References
Borse, Dipalee and Patil, Shobhana. Review and Analysis of Multifarious Spatial Domain Steganography Techniques. 2015; 4(1-Jan-2015).
Akhter F. A novel approach for image steganography in spatial domain. 2013; 13(7). Online ISSN: 0975-4172
D. Neeta, K. Snehal and D. Jacobs, "Implementation of LSB Steganography and Its Evaluation for Various Bits," 2006 1st International Conference on Digital Information Management, Bangalore, 2007, pp. 173-178. https://doi: 10.1109/ICDIM.2007.369349.
Samaratunge S. New steganography technique for palette based images. 2007;(IEEE). https://doi.org/10.1109/ICIINFS.2007.4579198
Cheddad AaCJaCKaMKP. Digital image steganography: Survey and analysis of current methods. 2010; 90. https://doi.org/10.1016/j.sigpro.2009.08.010
Liu, Qingzhong and Sung, Andrew H and Ribeiro, Bernardete and Wei, Mingzhen and Chen, Zhongxue and Xu, Jianyun. Image complexity and feature mining for steganalysis of least significant bit matching steganography. 2008; 178. https://doi.org/10.1016/j.ins.2007.08.007.
Chan, Chi-Kwong and Cheng, Lee-Ming. Hiding data in images by simple LSB substitution. 2004; 37. https://doi.org/10.1016/j.patcog.2003.08.007
Kurtuldu, Omer and Arica, Nafiz. A new steganography method using image layers. 2008. https://doi.org/10.1109/ISCIS.2008.4717893
Al-Shatnawi AM. A new method in image steganography with improved image quality. 2012; 6.
Prasad, Koyi Lakshmi and Rao, T Ch Malleswara. A Novel Secured RGB LSB Steganography with Enhanced Stego-Image Quality. 2013; 3.
Sravanthi, GS and Devi, B Sunitha and Riyazoddin, SM and Reddy, M Janga. A spatial domain image steganography technique based on plane bit substitution method. 2012; 12(15).
Downloads
Published
How to Cite
Issue
Section
Altmetrics
Downloads
License
All articles published in this scientific journal are protected by copyright. The authors retain copyright and grant the journal the right of first publication, with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial 4.0 International License (CC BY-NC 4.0), which permits sharing the work with authorship recognition and without commercial purposes.
Readers may copy and distribute the material from this journal issue for non-commercial purposes in any medium, provided the original work is cited and credit is given to the authors and the journal.
Any commercial use of the material from this journal is strictly prohibited without written permission from the copyright holder.
For more information on the copyright of the journal and open access policies, please visit our website.