Increased Capacity of Information Hiding in LSB-s Method for Text and Image

Steganography, derived from Greek, literally means “covered writing". It includes a vast array of secret communications methods that conceal the message-s very existence. These methods include invisible inks, microdots, character arrangement, digital signatures, covert channels, and spread spectrum communications. This paper proposes a new improved version of Least Significant Bit (LSB) method. The approach proposed is simple for implementation when compared to Pixel value Differencing (PVD) method and yet achieves a High embedding capacity and imperceptibility. The proposed method can also be applied to 24 bit color images and achieve embedding capacity much higher than PVD.




References:
[1] Dr. H. B. Kekre, Ms. Archana A. Athawale, "Information Hiding using
LSB Technique with Increased Capacity", International Journal of
Cryptography and Security, Special issue on Steganography,
2008.(Accepted for publication).
[2] D. C. Wu and W. H. Tsai, A steganographic method for images by
pixel-value differencing," Pattern Recognition Letters, vol. 24, no. 9-10,
pp. 1613-1626, 2003.
[3] Johnson,Neil F,"Steganography", 2000:
www.jjtc.com/stegdoc/index2.htm
[4] J. Fridrich and M. Goljan, "Practical steganalysis of digital imagesÔÇö
State of the art," in Proc. SPIE Security Watermarking Multimedia
Contents, vol. 4675, E. J. Delp III and P. W. Wong, Eds., 2002, pp. 1-
13.
[5] N. Provos, "Defending Against Statistical Steganalysis", 10th USENIX
Security Symposium, Washington, DC, 2001.
[6] A. Westfeld and A. Pfitzmann, "Attacks on Steganographic Systems,"
Lecture Notes in Computer Science, vol.1768, Springer-Verlag, Berlin,
2000, pp. 61-75.
[7] W. Dixon, F. Massey: Introduction to Statistical Analysis. McGraw-Hill
Book Company, Inc., New York 1957.
[8] A. Ker, "Steganalysis of LSB Matching in Grayscale Images." IEEE
Signal Processing Letters, vol. 12(6), pp. 441-444, 2005.
[9] J. Mielikainen, "LSB Matching Revisited," IEEE Signal Processing
Letters, vol. 13, NO. 5., MAY 2006
[10] Hung-Min Sun, Yao-Hsin Chen, and King-Hang Wang, "An Image Data
Hiding Scheme being Perfectly Imperceptible to Histogram Attacks,"
Image and Vision Computing New Zealand IVCNZ 2006, November 27-
29, 2006
[11] X. Zhang and S. Wang, "Vulnerability of pixel-value differencing
steganography to histogram analysis and modification for enhanced
security", Pattern Recognition Letters, 2004.
[12] H.C. Wu, N.I Wu, C.S. Tsai and M.S. Hwang, "Image Steganographic
scheme based on pixel-value differencing and LSB replacement
methods",VISP(152), No. 5, October 2005
[13] Vajiheh Sabeti, Shadrokh Samavi, Mojtaba Mahdavi, Shahram Shirani,
"Steganalysis of Pixel-Value Differencing steganographic Method",
2007 IEEE. pp. 292-295
[14] Petitcolas F, Anderson R, Kuhn M: ÔÇÿInformation Hiding - A Survey-
Proceedings of the IEEE, Vol. 87. July 1999.
[15] N. Johnson and S. Jajodia, "Exploring steganography: seeing the
unseen," IEEE Computer, pp. 26-34, February 1998.
[16] X. Zhang and S. Wang, "Steganography using multiple-base notational
system and human vision sensitivity," IEEE Signal Process. Lett., vol.
12, no. 1, pp. 67-70, Jan. 2005.
[17] T. Sharp, "An implementation of key-based digital signal
steganography," in Proc. Information Hiding Workshop, vol. 2137,
Springer LNCS, 2001, pp. 13-26.
[18] J. Harmsen andW. Pearlman, "Steganalysis of additive-noise modelable
information hiding," in Proc. SPIE Security Watermarking Multimedia
Contents, vol. 5020, 2003, pp. 131-142
[19] A. Ker, "Steganalysis of LSB matching in greyscale images," IEEE
Signal Process Letter, vol. 12, no.6, pp. 441- 444, Jun. 2005.
[20] Chung-Ming Wang , Nan-I Wu, Chwei-Shyong Tsai, Min-Shiang
Hwang, "A high quality steganographic method with pixel-value
differencing and modulus function" , Science Direct,The Journal of
Systems and Software 81 (2008) pp. 150-158
[21] Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Member, IEEE,
and Hung-Min Sun, "Adaptive Data Hiding in Edge Areas of Images
with Spatial LSB Domain Systems", IEEE Transactions on Information
Forensics and Security, VOL. 3, NO. 3, September 2008 pp. 488-497.
[22] Rehab H. Alwan, Fadhil J. Kadhim, and Ahmad T. Al-Taani, "Data
Embedding Based on Better Use of Bits in Image Pixels", International
Journal of Signal Processing 2;2 ┬® www.waset.org Spring 2006.
[23] Andrew D. Ker, Member, IEEE, "Steganalysis of Embedding in Two
Least-Significant Bits", IEEE Transactions on Information Forensics and
Security, Vol. 2, NO. 1, March 2007
[24] Shila P. Hivrale, S. D. Sawarkar, Vijay Bhosale, and Seema
Koregaonka, "Statistical Method for Hiding Detection in LSB of Digital
Images: An Overview", Proceedings of World Academy of Science,
Engineering and Technology Volume 32 August 2008 ISSN 2070-3740.