We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

High Capacity and Statistical Attacks Resistant Reversible Image Data Hiding Scheme using LSB Substitution

by Savita, Mamta Juneja
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 92 - Number 12
Year of Publication: 2014
Authors: Savita, Mamta Juneja
10.5120/16060-5191

Savita, Mamta Juneja . High Capacity and Statistical Attacks Resistant Reversible Image Data Hiding Scheme using LSB Substitution. International Journal of Computer Applications. 92, 12 ( April 2014), 12-18. DOI=10.5120/16060-5191

@article{ 10.5120/16060-5191,
author = { Savita, Mamta Juneja },
title = { High Capacity and Statistical Attacks Resistant Reversible Image Data Hiding Scheme using LSB Substitution },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 92 },
number = { 12 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 12-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume92/number12/16060-5191/ },
doi = { 10.5120/16060-5191 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:14:07.346031+05:30
%A Savita
%A Mamta Juneja
%T High Capacity and Statistical Attacks Resistant Reversible Image Data Hiding Scheme using LSB Substitution
%J International Journal of Computer Applications
%@ 0975-8887
%V 92
%N 12
%P 12-18
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Reversible data hiding technique is advancing with each passing day. It is a form of steganography in which the hidden data can be recovered or extracted by the authorized user. In this paper, we have proposed the variable least significant bit based digital image hiding system based on LSB substitution. The proposed scheme has high security, better embedding capacity and increased imperceptibility. Also, the proposed scheme successfully resists the stastical attacks like Rs analysis, histogram analysis and chi-square analysis which adds to the efficiency of the proposed scheme.

References
  1. J. Fridrich, M. Goljan, and R. Du, "Lossless data embedding—new paradigm in digital watermarking," EURASIP J. Appl. Signal Processing, vol. 2002, no. 2, pp. 185–196, Feb. 2002.
  2. Provos et. al. , "Hide and seek: an introduction to steganography", IEEE Security & Privacy Magazine, Volume 1, 2003, pp. 32-44.
  3. Nagham Hamid et. al, "Image steganography techniques: an overview", International Journal of Computer Science and Security (IJCSS), Volume 6, Issue 3, 2012.
  4. Cryptography – Wikipedia, http://en. wikipidea. org/wiki/Cryptography.
  5. N. Provos and P. Honeyman, "Detecting steganographic content on the Internet," in proc. of Network and Distributed System Security Symposium (NDSS), 2002, pp 1-13.
  6. H. B. Kekre et. al, "Performance evaluation of pixel value differencing and Kekre's modified algorithm for information hiding in images", in proc. of International Conference on Advances in Computing, Communication and Control, 2009, pp342-346.
  7. Mehdi Hussain et. al, "Pixel intensity based high capacity data embedding method", IEEE, 2010.
  8. G. C. Kessler, "An Overview of Steganography for the Computer Forensics Examiner", Forensic Science Communications, Volume 6, Issue 3, July 2004.
  9. Artz, "Digital Steganography: Hiding Data within Data", IEEE Internet Computing: Spotlight, June 2001, pp 75-80.
  10. K. Bailey and K. Curran, "An Evaluation of Image Based Steganography Methods", Multimedia Tools & Applications, Volume 30, Issue 1, July 2006, pp 55-88.
  11. Venkatraman et. al. , "Significance of Steganography on Data Security", in proc. of International Conference on Information Technology: Coding and Computing (ITCC), April 2004.
  12. B. C. Nguyen et. al , "Multi bit plane image steganography", in Proc. of International Workshop on Digital Watermarking (IWDW) Springer, Volume 4283, November 2006, pp 61–70.
  13. Xinpeng Zhang and Shuozhong Wang, "Steganography using multiple-base notational system and human vision sensitivity", IEEE Signal Processing Letters, Volume 12, Issue 1, 2005, pp 67-70.
  14. Kathryn Hempstalk, "Hiding Behind Corners: Using Edges in Images for Better Steganography", in proc. of the Computing Women's Congress, February 2006, pp 11- 19.
  15. AdnanGutub et. al. , "Pixel indicator high capacity technique for RGB image based Steganography", in proc. of IEEE 5th International Workshop on Signal Processing and its Applications (WoSPA), March 2005.
  16. C. Wu and W. H. Tsai, "A steganographic method for images by pixel-value differencing," Pattern Recognition Letters, Volume 24, Issue 9-10, June 2003, pp. 1613-1626.
  17. Cheng-Hsing Yang et. al. , "Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems", in proc. of IEEE Transactions on Information Forensics and Security, Volume 3, Issue 3, September 2008, pp 488-497.
  18. A. Westfeld and A. Pfitzmann , "Attacks on steganographic systems", in Lecture Notes in Computer Science, Springer, Berlin, 2000, pp. 61-75.
  19. Fridrich and M. Goljan ,"Practical steganalysis of digital images — state of the art", in proc. of SPIE, Security and Watermarking of Multimedia Contents IV, E. J. Delp III and P. W. Wong , 2002 , pp. 1-13.
Index Terms

Computer Science
Information Sciences

Keywords

Reversible data hiding steganography cryptography variable least significant bit embedding steganalysis.