An Improved Module Based Substitution Steganography Method

The rapid growth of the Internet and digitized content made text/image distribution simpler. The ability to protect and secure information is vital to the growth of electronic commerce and to the growth of the Internet itself. Most data embedding techniques used so far lead to distortions in the original image. These distortions create problems in some areas where protection of data is immensely required. Lossless data hiding is an exact restoration approach for recovering original data. In this paper, a scheme for data hiding is presented which is based on a module-based substitution method with lossless secret data compression with some improvements to reduce the difference between cover and stego image pixel values. This scheme is loss less scheme. In our scheme user can hide either text, image or wav file as secret data in cover image file.

[1]  Dae Ho Kim,et al.  Efficient Implementation of a Pseudorandom Sequence Generator for High‐Speed Data Communications , 2010 .

[2]  Kuo-Liang Chung,et al.  A novel SVD- and VQ-based image hiding scheme , 2001, Pattern Recognit. Lett..

[3]  Musheer Ahmad,et al.  Chaos based PN sequence generator for cryptographic applications , 2011, 2011 International Conference on Multimedia, Signal Processing and Communication Technologies.

[4]  Nikolaos G. Bourbakis,et al.  Image and video encryption using SCAN patterns , 2004, Pattern Recognit..

[5]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[6]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[7]  Rabia Latif,et al.  Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs) , 2009, ISA.

[8]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[9]  Chin-Chen Chang,et al.  A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..

[10]  Iuon-Chang Lin,et al.  Hiding data in spatial domain images with distortion tolerance , 2009, Comput. Stand. Interfaces.

[11]  Howard C. Card,et al.  Parallel pseudorandom number generation in GaAs cellular automata for high speed circuit testing , 1995, J. Electron. Test..

[12]  Xiaobo Li,et al.  Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..

[13]  Ja-Chen Lin,et al.  A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..

[14]  B. Ripley,et al.  Pattern Recognition , 1968, Nature.

[15]  Chin-Chen Chang,et al.  Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..

[16]  Nadeem Akhtar,et al.  An improved inverted LSB image steganography , 2014, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT).

[17]  Nadeem Akhtar,et al.  Enhancing the Security and Quality of LSB Based Image Steganography , 2013, 2013 5th International Conference on Computational Intelligence and Communication Networks.

[18]  Shang-Kuan Chen A module-based LSB substitution method with lossless secret data compression , 2011, Comput. Stand. Interfaces.

[19]  Franco Maloberti,et al.  Pseudorandom sequence generation for mismatch analog compensation of ADCs , 2010, 2010 17th IEEE International Conference on Electronics, Circuits and Systems.

[20]  Ernesto J. Cruselles,et al.  Uncorrelated PN sequences generator for spreading codes in CDMA systems , 1995, Proceedings of 6th International Symposium on Personal, Indoor and Mobile Radio Communications.

[21]  Cheng-Hsing Yang,et al.  Inverted pattern approach to improve image quality of information hiding by LSB substitution , 2008, Pattern Recognit..

[22]  Ran-Zan Wang,et al.  An image-hiding method with high hiding capacity based on best-block matching and k-means clustering , 2007, Pattern Recognit..