Steganographic Method in Selected Areas of the Stego-Carrier in the Spatial Domain (original) (raw)

A Proposed Method for Image Steganography

Research in Medical & Engineering Sciences, 2018

All security techniques try to maintain Confidentiality, Integrity and Availability-referred to as the CIA Triad of information security. Steganography also takes a real challenge in the field of security through data concealment. A Steganography System consists of two functions: embedding and extraction. The objective of the proposed work is to design robust algorithms which generate stego media, can carry large amount (capacity) of secret data without reducing imperceptibility.

A New Algorithm for a Steganography System

2015

Steganography is the workmanship and study of concealing mystery information to provide a safe communication between two parties. This paper, displays other steganographic algorithms for implanting encoded secret image in grayscale and color images to give abnormal state security of information for correspondence over unsecured channels. The proposed algorithms first analyze the secret image using 1level -DWT and SLT respectively. It will be then encrypted the low frequency components of the secret image only using AES method and then embedded in the insensitive mid and high sub-bands gotten from the cover image in the wake of applying 2levelDWT and SLT on it, The embedding method used in this paper is LSB, the resulting image called stego-image form different algorithms are then compared. .By using the proposed algorithms the capacity of the hidden secret data and stego image quality are improved. The embedding image reaches to half the size of cover image at same time PSNR reach t...

Developing Algorithms for Image Steganography and Increasing the Capacity Depending on Choosing the Best Pixels

International journal of Computer Networks & Communications

Steganography is a vital technique for transferring confidential information via an insecure network. In addition, digital images are used as a cover to communicate sensitive information. The Least Significant Bit (LSB) method is one of the simplest ways to insert secret data into a cover image. In this paper, the secret text is compressed twice by an Arithmetic coding algorithm, and the resulting secret bits are hidden in the cover pixels of the image corresponding to the pixels of each of the following three methods, one of three methods is used in each experiment: The first method, the edges of the image are modified to increase the number of edges, in the second method the lighter-colored regions are selected, and in the third method, the two methods are combined together to increase security and keep the secret message unrecognized. Hiding in each of the previous methods is done by using the LSB technique in the last 2-bit. The correction approach is used to increase the stego ...

Security and imperceptibility improving of image steganography using pixel allocation and random function techniques

International Journal of Electrical and Computer Engineering (IJECE), 2022

Information security is one of the main aspects of processes and methodologies in the technical age of information and communication. The security of information should be a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies that are used, and they include steganography and cryptography. An effective digital image-steganographic method based on odd/even pixel allocation and random function to increase the security and imperceptibility has been improved. This lately developed outline has been verified for increasing the security and imperceptibility to determine the existent problems. Huffman coding has been used to modify secret data prior embedding stage; this modified equivalent secret data that prevent the secret data from attackers to increase the secret data capacities. The main objective of our scheme is to boost the peak-signal-to-noise-ratio (PSNR) of the stego cover and stop against any attack. The size of the secret data also increases. The results confirm good PSNR values in addition of these findings confirmed the proposed method eligibility.

A robust way of steganography by using blocks of an image in spatial domain

Innovaciencia Facultad de Ciencias Exactas Físicas y Naturales

Steganography is a way to convey secret communication, with rapid electronic communication and high demand of using the internet, steganography has become a wide field of research and discussion. In this paper a new approach for hiding information in cover image proposed in spatial domain, the proposed approach divides the host image into blocks of size (8x8) pixels and message bits are embeds into the pixels of a cover image. The 64-pixel values of each block converted to be represented in binary system and compared with corresponding secret data bits for finding the matching and hold 6-pixels. The search process performed by comparing each secret data bit (8-bits) with created binary plane at the cover image, if matching is found the last row of the created binary plane which is (LSB) is modified to indicate the location of the matched bits sequence “which is the secret data” and number of the row, if matching is not found in all 7th rows the secret sequence is copied in to the co...

Multi-bits stego-system for hiding text in multimedia images based on user security priority

Security system for hiding sensitive text-data on personal computer (PC) is implemented. The system proposes using normal multimedia image based steganography replacing the pixel least significant bits with text to be hidden. The study involved several testing scenarios for possible increase in the capacity and ambiguity within steganography adopting 1, 2, 3 and 4 least significant bits stego-systems choices. The design novelty is in providing full security information to the user to select appropriate cover-image from the PC based on the security priority. The technique allows the PC user to test multi-bits steganography on several images to hide same sensitive texts. Then, the user can prefer one image to be used as cover image based on his selection knowing the capacity and security priority desired. The study proofs the data dependency and its security property by experimenting 35 fixed sizes PC images showing remarkable results.

Adaptive Steganography Scheme Using More Surrounding Pixels

Information hiding has several branches. One is called as steganography. Steganography has a wide variety of techniques whereby a certain amount of secret information is embedded inside a medium. The medium format can be of any kind. However, the simplest file format is an 8-bit gray scale image. The original image is called a cover image. Likewise, once some secret bits are embedded, it is called stego-image. The most challenging issue is how capable a technique is to conceal the very existence of secret information in the stego-image. Steganographic techniques are evaluated in terms of imperceptibility and capacity. Imperceptibility means how visible secret information is to the human eyes in the stego-image. On the other hand, capacity means the maximum amount of secret information embedded. Conventional Least Significant Bit (LSB) insertion method is the basic concept for steganographic techniques. LSB method embeds secret bits in LSB(s) of the cover image. A pixel which carries a fraction of secret data is called a target pixel. The more surrounding pixels around a target pixel are utilized to find the most appropriate capacity value, the more precise capacity value is achieved. This paper proves that discovering the best capacity value brings about an improvement in terms of imperceptibility. Most of the steganographic techniques use either three or four adjacent pixels around a target pixel whereas the proposed technique is able to utilize at most all eight adjacent neighbors so that imperceptibility value grows bigger. The proposed method is called A-MSPU which stands for Adaptive More Surrounding Pixels Using.

Secure Cover Selection Steganography

This paper presents a cover selection steganography method based on introduction of a technique for computing steganography capacity as a property of images. An ensemble system that uses different steganalyzer units, determines the upper bound of embedding rate in a cover image. In this technique, each steganalyzer unit is a combination of multiple steganalyzers with a same type but each one trained to detect stego images with a certain payload. Our proposed method minimizes the risk of detection by selecting a proper cover image that its steganography capacity is sufficient to hide a specific secret data securely. Experimental results demonstrate the efficiency and practicability of the proposed technique in enhancing the security of stego images.

A Survey of Spatial Domain Techniques in Image Steganography

Journal of Education College Wasit University, 2018

This paper presents the most techniques of spatial domain that used in image steganography where it is used to hide confidential message under a cover image. Steganography is a much better way to convey a secret message compared to cryptography. This is because cryptography is outlawed while steganography can avoid such policies to pass message covertly. Steganography is one of the most common techniques of securing information, which insists on concealing the clandestine data within the cover image in a way that nobody suspects to its existence. The challenge of steganography techniques is to make a reasonable balance between the file and the size of data that can be exchanged. Furthermore, the strength of the strategy and the security of the mysterious data are the fact that can't be hidden.

Steganography and its Advancements in Spatial Domain

2019

In the modern era, with the advancement of wireless communication, and Digital Signal Processing (DSP) techniques, enormous data is exchanged over the internet by many users which can be accessed worldwide that increases the possibility of attack over network. Many techniques are developed in the past that protect data from such attacks. Steganography is one of the popular techniques that protect data from unauthorized persons. It has increased to a great extent for transferring secret information by wrapping the secret data into another data for security. Generally, bits are replaced in the least significant bits and this technique is known as Least Significant Bit (LSB) steganography. The primary goal of steganography is to protect data in such a way that attackers do not know the existence of the secret content in the cover data. Also, steganography also takes care that modification in cover object should be indiscernible by the subjective testing. Steganography can be easily use...