Title :
A threshold-LSB based information hiding scheme using digital images
Author :
Nayak, Dilip Kumar ; Bhagvati, Chakravarthy
Author_Institution :
Sch. of Comput. & Inf. Sci., Univ. Of Hyderabad, Hyderabad, India
Abstract :
Providing protection to secret information has been given high importance and has received increasing attention from the information technology community. In this paper, we propose a new approach for information hiding based on gray-scale digital images which considers the threshold of the pixel of an image while hiding the bits of a secret message in its least-significant-bits (LSBs). The proposed method works on the secret message by converting it into a stream of bits. Then we generate pseudo random numbers to provide a random distribution of the secret bits across the image. We use m-least significant bits of an 8-bit pixel to hold the secret bits. The value of m varies depending on the threshold of the pixels. The number of bits (m) to be embedded in a pixel having small threshold is more than that of a pixel having high or medium threshold. When we consider low and high thresholds we simply replace the m-least significant bits of a pixel with the m-secret bits. For medium threshold category pixels we use exclusive-or (XOR) of m-least significant bits of the pixel with the m-secret bits. The experimental results show that the proposed scheme achieves high embedding capacity and good visual quality of stego images for m=3 and m=2 for low and non-low thresholds respectively.
Keywords :
image processing; random processes; statistical distributions; steganography; 8-bit pixel; LSB; XOR; embedding capacity; exclusive-or bits; gray-scale digital images; information technology community; least-significant-bits; m-least significant bits; m-secret bits; medium threshold category pixels; pseudo random number generation; random distribution; secret information protection; secret message bits; stego images; threshold-LSB based information hiding scheme; visual quality; word length 8 bit; Computers; Data mining; Digital images; PSNR; Receivers; Visualization; Digital Security; Information Hiding; Information security; LSB Matching; LSB Replacement; LSB technique; Threshold-LSB based Information Hiding;
Conference_Titel :
Computer and Communication Technology (ICCCT), 2013 4th International Conference on
Conference_Location :
Allahabad
Print_ISBN :
978-1-4799-1569-9
DOI :
10.1109/ICCCT.2013.6749639