Skip to main content
Log in

ILSBMR: improved LSBMR (ILSBMR) method

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The Least Significant Bit Matching Revisited (LSBMR) is among the most commonly used methods on image steganography, aiming to make only smaller changes in an image. While security is considered as one of the basic evaluation criteria for steganography techniques and notably, LSBMR can be easily recognized due to its well-known structure, it is important to find a way to help improve this approach so that it might cause less variation in the image and also increase security. To this end, the current paper deploys divided blocks of the original cover image and a selection of the best layout to embed secret message bits from each block into color images by using LSBMR. The simulation results indicate that this improved method makes small changes in the image and increases its security, compared to the LSBMR technique.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Ahsan K, Kundur D (2002) Practical data hiding in TCP/IP. In: Proceedings of the Workshop on Multimedia Security at ACM Multimedia, Juan-les-Pins on the French Riviera, 6 Dec 2002

  2. Chan C-S, Chang C-Y (2009) An information hiding scheme by applying the dynamic programming strategy to LSB matching revisited. In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, Suwon, Korea, 15–16 Jan 2009, pp 246–250

  3. Chen W-J, Chang C-C, Le T (2010) High payload steganography mechanism using hybrid edge detector. Expert Syst Appl 37:3292–3301

    Article  Google Scholar 

  4. Dezfouli MA, Nikseresht S, Alavi SE (2013) A new image steganography method based on pixel neighbors and 6 most significant Bit (MSB) compare. Adv Comput Sci Int J 2:157–162

    Google Scholar 

  5. Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in color and grayscale images. In: Proceedings of the 2001 workshop on Multimedia and security: new challenges, Ottawa, Canada, Oct 2001, pp 27–30

  6. Fridrich J et al. (2003) Higher-order statistical steganalysis of palette images. In: Proceedings of the Electronic Imaging SPIE Santa Clara, CA, Jan 2003, pp 178–190

  7. Lee K et al. (2006) Category attack for LSB steganalysis of JPEG images. In: Shi YQ, Jeon B (eds) Digital watermarking, lecture notes in computer science, vol 4283. Springer, Heidelberg, pp 35–48

  8. Lerch-Hostalot D, Megías D (2013) LSB matching steganalysis based on patterns of pixel differences and random embedding. Comput Secur 32:192–206

    Article  Google Scholar 

  9. Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13:285–287

    Article  Google Scholar 

  10. Papapanagiotou K, Kellinis E, Marias G, Georgiadis P (2005) Alternatives for multimedia messaging system steganography. In: Hao Y et al (eds) Computational intelligence and security, lecture notes in computer science, vol 3802. Springer, Heidelberg, pp 589–596

  11. Rabah K (2004) Steganography-the art of hiding data. Inf Technol J 3:245–269

    Article  Google Scholar 

  12. Sharp T (2001) An implementation of key-based digital signal steganography. In: Moskowitz I (ed) Information hiding, lecture notes in computer science, vol 2137. Springer, Heidelberg, pp 13–26

  13. Swathi B, Shalini K, Prasanthi KN (2013) A review on steganography using images. Asian J Comput Sci Inf Technol 2:234–237

  14. Westfeld A, Pfitzmann A (2000) Attacks on steganographic systems. In: Pfitzmann A (ed) Information hiding, lecture notes in computer science, vol 1768. Springer, Heidelberg, pp 61–76

  15. Xu H, Wang J, Kim HJ (2010) Near-optimal solution to pair-wise LSB matching via an immune programming strategy. Inf Sci 180:1201–1217

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sajad Nikseresht.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nikseresht, S., Dezfouli, M.A. & Alavi, S. ILSBMR: improved LSBMR (ILSBMR) method. Multimed Tools Appl 76, 1857–1874 (2017). https://doi.org/10.1007/s11042-015-3073-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-3073-8

Keywords

Navigation