High Capacity and Statistical Attacks Resistant Reversible Image Data Hiding Scheme using LSB Substitution

Reversible data hiding technique is advancing with each passing day. It is a form of steganography in which the hidden data can be recovered or extracted by the authorized user. In this paper, we have proposed the variable least significant bit based digital image hiding system based on LSB substitution. The proposed scheme has high security, better embedding capacity and increased imperceptibility. Also, the proposed scheme successfully resists the stastical attacks like Rs analysis, histogram analysis and chi-square analysis which adds to the efficiency of the proposed scheme. General Terms Steganography, Cryptography, Steganalysis.

[1]  H. B. Kekre,et al.  Performance evaluation of pixel value differencing and Kekre's modified algorithm for information hiding in images , 2009, ICAC3 '09.

[2]  Gary C. Kessler,et al.  An Overview of Steganography for the Computer Forensics Examiner , 2004 .

[3]  Ajith Abraham,et al.  Significance of steganography on data security , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[4]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[5]  Xinpeng Zhang,et al.  Steganography using multiple-base notational system and human vision sensitivity , 2005, IEEE Signal Process. Lett..

[6]  Niels Provos,et al.  Detecting Steganographic Content on the Internet , 2002, NDSS.

[7]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[8]  Adnan Abdul-Aziz Gutub,et al.  Pixel Indicator High Capacity Technique for RGB Image Based Steganography , 2008 .

[9]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .

[10]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[11]  Mehdi Hussain,et al.  Pixel intensity based high capacity data embedding method , 2010, 2010 International Conference on Information and Emerging Technologies.

[12]  Alisha Arora,et al.  IMAGE STEGANOGRAPHY TECHNIQUES: AN OVERVIEW , 2014 .

[13]  Jessica J. Fridrich,et al.  Lossless Data Embedding—New Paradigm in Digital Watermarking , 2002, EURASIP J. Adv. Signal Process..

[14]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.

[15]  N. Hamid,et al.  Image Steganography Techniques : An Overview , 2012 .

[16]  Cheng-Hsing Yang,et al.  Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.

[17]  Heung-Kyu Lee,et al.  Multi Bit Plane Image Steganography , 2006, IWDW.

[18]  Kevin Curran,et al.  An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.

[19]  Kathryn Hempstalk,et al.  Hiding Behind Corners : Using Edges in Images for Better Steganography , 2006 .