Abstract
Steganography is the art of hiding data in a seemingly innocuous cover medium. For example – any sensitive data can be hidden inside a digital image. Steganography provides better security than cryptography because cryptography hides the contents of the message but not the existence of the message. So no one apart from the authorized sender and receiver will be aware of the existence of the secret data. Steganographic messages are often first encrypted by some traditional means and then a cover image is modified in some way to contain the encrypted message. The detection of steganographically encoded packages is called steganalysis. In this paper, we propose three efficient Steganography techniques that are used for hiding secret messages. They are LSB based Steganography, Steganography using the last two significant bits and Steganography using diagonal pixels of the image. Symmetric and asymmetric key cryptography has been used to encrypt the message.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Johnson, N.F., Jajodia, S.: Exploring Steganography: Seeing the Unseen. Computer 31(2), 26–34 (1998)
Artz, D.: Digital Steganography: Hiding Data within Data. In: IEEE Internet Computing, pp. 75–80 (2001)
Li, X., Wang, J.: A Steganographic Method based Upon JPEG and Particle Swarm Optimization Algorithm. Information Sciences 177(15), 3099–3109 (2007)
Chandramouli, R., Memon, N.D.: Analysis of LSB based image steganography techniques. In: IEEE International Conference on Image Processing, vol. 3, pp. 1019–1022 (2001)
Kutter, M., Hartung, F.: Introduction to Watermarking Techniques in Information Techniques for Steganography and Digital Watermarking. In: Katzenbeisser, S.C. (ed.), pp. 97–119. Artec House (1999)
Mohamed, M., Al-Afari, F., Bamatraf, M.: Data Hiding by LSB Substitution Using Genetic Optimal Key-Permutation. International Arab Journal of e-Technology 2(1), 11–17 (2011)
Wang, R.Z., Lin, C.F., Lin, J.C.: Image Hiding by Optimal LSB Substitution and Genetic Algorithm. Pattern Recognition 34(3), 671–683 (2001)
Chang, C.C., Hsiaob, J.Y., Chan, C.S.: Finding Optimal Least-Significant-bit Substitution in Image Hiding by Dynamic Programming Strategy. Pattern Recognition 36, 1583–1595 (2003)
Chan, C.K., Cheng, L.M.: Hiding Data in Images by Simple LSB Substitution. Pattern Recognition 37(3), 469–474 (2004)
Krenn, J.R.: Steganography and Steganalysis. XIDC.NL (2004)
Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Maiti, C., Baksi, D., Zamider, I., Gorai, P., Kisku, D.R. (2011). Data Hiding in Images Using Some Efficient Steganography Techniques. In: Kim, Th., Adeli, H., Ramos, C., Kang, BH. (eds) Signal Processing, Image Processing and Pattern Recognition. SIP 2011. Communications in Computer and Information Science, vol 260. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27183-0_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-27183-0_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27182-3
Online ISBN: 978-3-642-27183-0
eBook Packages: Computer ScienceComputer Science (R0)