Skip to main content

Inverted LSB Image Steganography

  • Conference paper
  • First Online:
Soft Computing: Theories and Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1053))

Abstract

This paper focus on a change in the plain Least Significant Bit based image/picture steganography and implementation of it. The paper asserts the utilization of bit reversal method to enhance the quality of stego-picture. The bit reversal methods that are proposed and implemented based on 2 schemes. In these strategies, least significant bits of a few picture elements of cover picture are rearranged if they happen with a particular pattern of a few bits of the picture elements. Along these lines, less number of picture elements is adjusted in contrast with plain least significant bit strategy. So PSNR of stego-picture is moved forward. In order to obtain correct de-steganography, the bit designs for which least significant bits has modified should be put away inside the stego-picture some place. The proposed bit reversal procedure gives great change to least significant bit steganography. This strategy could be joined along different strategies to enhance effective steganography further.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Cheddad, J., Condell, K.C., Kevitt, P.: Digital image steganography-survey and analysis of current methods. Sig. Process. 90, 727–752 (2010)

    Article  Google Scholar 

  2. Chang, C.C., Tseng, H.W.: Data hiding in images by hybrid LSB substitution. In: 2009 Third International Conference on Multimedia and Ubiquitous Engineering, MUE’09. IEEE, 2009

    Google Scholar 

  3. Wang, R.Z., Lin, C.F., Lin, J.C.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn. 34(3), 671–683 (2001)

    Article  Google Scholar 

  4. Zayed, H.H.: A high-hiding capacity technique for hiding data in images based on K-bit LSB substitution. In: The 30th International Conference on Artifical Intelligence (2005)

    Google Scholar 

  5. Akhtar, N., Johri, P., Khan, S.: Enhancing the security and quality of LSB based image steganography. In: IEEE lnternational Conference on Computational Intelligence and Computer Networks (CICN), pp. 27–29 (2013)

    Google Scholar 

  6. Kessler, C.: Steganography: hiding data within data. An edited version of this paper with the title “Hiding Data in Data”. Windows & NET Magazine (2001). http://www.garykessler.netllibrary/steganography.btml

  7. Fridrich, J., Goljan, M.: Practical steganalysis of digital images: state of the art. In: Electronic Imaging 2002. lnternational Society for Optics and Photonics (2002)

    Google Scholar 

  8. Fridricb, J., Goljan, M., Du, R.: Detecting LSB steganograpby in color and gray images. In: Magazine of EEE Multimedia (Special Issue on Security), pp. 22–28, Oct–Nov 2001

    Google Scholar 

  9. Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis, vol. 2578, pp. 355–372. Springer LNCS (2003)

    Google Scholar 

  10. Thien, C.C., Lin, J.C.: A simple and high-hiding capacity method for hiding digit-by digit data in images based on modulus function. Pattern Recogn. 36, 2875–2881 (2003)

    Article  Google Scholar 

  11. Wu, NI., Hwang, M.S.: Data hiding: current status and key issues. IJ Netw. Secur. (4)1, 1–9 (2007)

    Google Scholar 

  12. Chandramouli, R., Memon, N.: Analysis of LSB based image steganography techniques. In: IEEE, pp. 1019–1022 (2001)

    Google Scholar 

  13. Cox, I., et al.: Digital watermarking and steganography. Morgan Kaufmann (2007)

    Google Scholar 

  14. The USC-SIPI image database. http://sipi.usc.eduldatabase

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Indu Maurya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Maurya, I., Gupta, S.K. (2020). Inverted LSB Image Steganography. In: Pant, M., Sharma, T., Verma, O., Singla, R., Sikander, A. (eds) Soft Computing: Theories and Applications. Advances in Intelligent Systems and Computing, vol 1053. Springer, Singapore. https://doi.org/10.1007/978-981-15-0751-9_3

Download citation

Publish with us

Policies and ethics