Open Access   Article Go Back

Analysis on LSB based detection methods and hiding strategies with color images

A.K. Chaturvedi1 , Annu Sharma2 , Kalpana Sharma3

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 687-692, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.687692

Online published on Jul 31, 2018

Copyright © A.K. Chaturvedi, Annu Sharma, Kalpana Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A.K. Chaturvedi, Annu Sharma, Kalpana Sharma, “Analysis on LSB based detection methods and hiding strategies with color images,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.687-692, 2018.

MLA Style Citation: A.K. Chaturvedi, Annu Sharma, Kalpana Sharma "Analysis on LSB based detection methods and hiding strategies with color images." International Journal of Computer Sciences and Engineering 6.7 (2018): 687-692.

APA Style Citation: A.K. Chaturvedi, Annu Sharma, Kalpana Sharma, (2018). Analysis on LSB based detection methods and hiding strategies with color images. International Journal of Computer Sciences and Engineering, 6(7), 687-692.

BibTex Style Citation:
@article{Chaturvedi_2018,
author = {A.K. Chaturvedi, Annu Sharma, Kalpana Sharma},
title = {Analysis on LSB based detection methods and hiding strategies with color images},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {687-692},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2493},
doi = {https://doi.org/10.26438/ijcse/v6i7.687692}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.687692}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2493
TI - Analysis on LSB based detection methods and hiding strategies with color images
T2 - International Journal of Computer Sciences and Engineering
AU - A.K. Chaturvedi, Annu Sharma, Kalpana Sharma
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 687-692
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
511 253 downloads 218 downloads
  
  
           

Abstract

The internet users are regularly increasing day by day. After the launching of the 4G or IMT-Advanced services, communication over internet increased drastically. People across all the communities like social, economical, business, financial, etc are doing communication or exchanging their valued documents over internet. Hence, the demand of securing these documents or hiding some secret message into another cover is also increased. As, Steganography is the art and science of hiding a secret message in another message, image, or video as cover, in such a way, which hides the existence of the communication. Its goal is to hide messages inside other harmless messages, or image and does not allow any enemy to even detect that there is a second message present. In this paper, we have presented an analysis on LSB based detection methods and current hiding strategies with color images. Many noticeable hiding strategies proposed by researchers are presented here, but more research is required with the objectives of achieving high embedding payload and less detectable against the modern detector SPAM.

Key-Words / Index Term

Secret Message, Data Hiding, Steganography, Detection Method, Color Images, SPAM

References

[1] G. Shailender and A.G. Bhushan, “Information Hiding least significant bit steganography and cryptography”, International Journal of Education and Computer Science, vol. 6, 2012, pp. 27-34
[2] S. Wang, J. Sang, X. Song, X. Niu, “Least Significant Qubit (LSQb) Information Hiding Algorithm for Quantum Image”, Elsevier, Measurement (2015), doi: http://dx.doi.org/10.1016/j.measurement. 2015.05.038
[3] K. Muhammad, M. Sajjad, I. Mehmood, S. Rho, S. W. Baik, “Image steganography using uncorrelated color space and its application for security of visual contents in online social networks”, Future Generation Computer Systems 86 (2018), pp. 951–960
[4] Thien Huynh-The , Cam-Hao Hua , N. Anh Tu , Taeho Hur , J. Bang , D. Kim , M. Bilal Amin, B. Ho Kang , H. Seung , S. Lee, “Selective bit emb e dding scheme for robust blind color image watermarking”, Elsevier, Information Sciences 426 (2018),pp. 1–18
[5] Huan Xu, Jianjun Wang, Hyoung Joong Kim, Near-optimal solution to pair-wise LSB matching via an immune programming strategy, Elsevier, Information Sciences 180 (2010), pp. 1201–121
[6] Zhenjun Tang, Quanfeng Lu, Huan Lao, Chunqiang Yu, Xianquan Zhang, Error-free reversible data hiding with high capacity in encrypted image, Elsevier, Optik, Vol. 157 (2018), pp. 750–760
[7] Chin-Chen Chang, Chih-Yang Lin, Yi-Hsuan Fan, Lossless data hiding for color images based on block truncation coding, Elsevier, ScienceDirect, Pattern Recognition, vol. 41 (2008), pp. 2347 – 2357
[8] Wen-Long Xu, Chin-Chen Chang, Tung-Shou Chen, Liang-Min Wang, “An improved least-significant-bit substitution method using the modulo three strategy”, Elsevier, ScienceDirect, Displays vol. 42 (2016), pp. 36–42
[9] Chuan Qin, Ping Ji, Xinpeng Zhang , Jing Dong, Jinwei Wang, “Fragile image watermarking with pixel-wise recovery based on overlapping emb e dding strategy”, Elsevier, Signal Processing, vol. 138 (2017), pp. 280–293
[10] Daniel Lerch-Hostalot, David Megıas,” LSB matching steganalysis based on patterns of pixel differences and random embedding”, Elsevier, computers & security, vol. 32 (2013), pp. 192-206.
[11] HayatAl-Dmour,AhmedAl-Ani, “A steganography embedding method based on edge identification and XOR coding”, Elsevier, Expert SystemsWithApplications, vol. 46(2016), pp. 293–306
[12] B. Feng, J. Weng, Wei Lu, Bei Pei, “Steganalysis of content-adaptive binary image data hiding”, Elsevier, J. Vis. Commun. Image R. vol. 46 (2017), pp. 119–127
[13] B. B. Haghighi, A. H. Taherinia, A. Harati, “TRLH: Fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique”, Elsevier, Journal of Visual Communication and Image Representation, vol 50 (2018), pp. 49–64
[14] S. Sajasi, A.M. E. Moghadam, “An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method”, Elsevier, Applied Soft Computing, vol. 30 (2015), pp. 375–389
[15] N. N. El-Emama, M. Al-Diabat, “A novel algorithm for colour image steganography using a new intelligent technique based on three phases”, Elsevier, Applied Soft Computing, vol. 37 (2015), pp. 830–846
[16] S. Udhayavene, A. T. Dev and K. Chandrasekaran, “New Data Hiding Technique In Encrypted Image: DKL Algorithm (Differing Key Length)”, Elservier, Procedia Computer Science, vol. 54 ( 2015 ), pp. 790 – 798, Eleventh International Multi-Conference on Information Processing-2015 (IMCIP-2015)
[17] K. Patel, S. Utareja, H. Gupta, “Information Hiding using Least Significant Bit Steganography and Blowfish Algorithm”, International Journal of Computer Applications (0975 – 8887), Volume 63– No.13, February 2013, pp. 24-28
[18] Amit and Jyoti, “REVIEW OF INFORMATION HIDING USING LEAST SIGNIFICANT BIT STEGANOGRAPHY IN BMP & JPG IMAGES”, ISSN 2319-5991, Vol. 3, No. 3, August 2014, pp. 96-102
[19] Sabu M Thampi, “Information Hiding Techniques : A Tutorial Review”, ISTE-STTP on Network Security & Cryptography, LBSCE 2004