Abstract
This paper presents a new technique of data hiding in spatial domain using digital image as cover file. It uses two logical modules, binary converter and bit extractor in its processing. Binary converter module converts the identified pixel value into binary sequence of eight bits. Bit extractor module extracts the seven bits of pixel value except LSB. The proposed method hides the message in the seven bits of pixel value except LSB as LSB is the most sensitive bit and can be altered on the network by some error. It disburses the message evenly on the pixel intensity. The preliminary results show that it expels various anomalies associated with some state-of-the-art methods. It also provides better imperceptibility and hiding capacity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gutub, A., Fattani, M.: A novel Arabic text steganography method using letter points and extensions. World Acad. of Sci. Eng. Technol. 1, 502–505 (2007)
Krenn, R.: Steganography and Steganalysis. Internet Publication. Available at: http://www.krenn.nl/univ/cry/steg/article (2004)
Brainos, II, A.C.: A Study of Steganography and The Art of Hiding Information. Internet Publication. Available at www.infosecwriters.com (2007)
Provos, N., Honeyman, P.: Hide and Seek: introduction to steganography. IEEE 1, 32–44 (2003)
Ahn, L.V., Hopper, N.J.: Public-Key Steganography. Lecture Notes in Computer Science. Springer, Berlin (2005)
Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE Comput. 31, 26–34 (1998)
Yadav, R., Rishi, R., Batra, S.: A new steganography method for gray level images using parity checker. Int. J. Comput. Appl. 11, 0975–8887 (2010)
Potdar, V., Chang, E.: Gray Level Modification Steganography for Secret Communication. IEEE, New York (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Saini, R., Joshi, K., Nandal, R. (2021). An Adapted Approach of Image Steganography Using Pixel Mutation and Bit Augmentation. In: Satapathy, S.C., Bhateja, V., Favorskaya, M.N., Adilakshmi, T. (eds) Smart Computing Techniques and Applications. Smart Innovation, Systems and Technologies, vol 225. Springer, Singapore. https://doi.org/10.1007/978-981-16-0878-0_22
Download citation
DOI: https://doi.org/10.1007/978-981-16-0878-0_22
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-0877-3
Online ISBN: 978-981-16-0878-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)