Image Steganography Using Least Significant Bits (LSBs): A Novel Algorithm (original) (raw)
Related papers
Least Significant Bit algorithm for image steganography
Steganography is one of the most powerful techniques to conceal the existence of hidden secret data inside a cover object. Images are the most popular cover objects for Steganography and in this work image steganography is adopted. Embedding secret information inside images requires intensive computations, and therefore, designing Steganography in hardware speeds up Steganography. This is implemented using ARM7TDMI processor and GSM 900.
On the Information Hiding Technique Using Least Significant Bits Steganography
Steganography is the art and science of hiding data or the practice of concealing a message, image, or file within another message, image, or file. Steganography is often combined with cryptography so that even if the message is discovered it cannot be read. It is mainly used to maintain private data and/or secure confidential data from misused through unauthorized person. In contemporary terms, Steganography has evolved into a digital strategy of hiding a file in some form of multimedia, such as an image, an audio file or even a video file. This paper presents a simple Steganography method for encoding extra information in an image by making small modifications to its pixels. The proposed method focuses on one particular popular technique, Least Significant Bit (LSB) Embedding. The paper uses the (LSB) to embed a message into an image with 24-bit (i.e. 3 bytes) color pixels. The paper uses the (LSB) of every pixel’s bytes. The paper show that using three bits from every pixel is robust and the amount of change in the image will be minimal and indiscernible to the human eye. For more protection to the message bits a Stego-Key has been used to permute the message bits before embedding it. A software tool that employ steganography to hide data inside of other files (encoding) as well as software to detect such hidden files (decoding) has been developed and presented. https://sites.google.com/site/ijcsis/
A Development of Least Significant Bit Steganography Technique
Iraqi Journal of Computers, Communication and Control & System Engineering (IJCCCE), 2020
Recently, the world has been interested in transferring data between different devices. The transmission of data must be encrypted so that the intended receiver can only read and process a secret message. Hence, the security of information has become more important than earlier. This paper proposes the least significant bit Steganography method to hide a secret message inside an image cover via using dynamic stego-key. To check the effectiveness of the proposed method, many factors are used for evaluation and compared with another method. The results illustrate more robustness at steganography since stego-key depends on the cover image to hide a secret message.
Image Steganography Using Least Significant Bit with Cryptography
Journal of Global Research in Computer Science, 2012
To increase the security of messages sent over the internet steganography is used. This paper discussed a technique based on the LSB(least significant bit) and a new encryption algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover data. Before hiding the data in an image the application first encrypts it.
A new approach for LSB based image steganography using secret key
International Conference on Computer and Information Technology, 2011
This paper introduces a best approach for Least Significant Bit (LSB) based on image steganography that enhances the existing LSB substitution techniques to improve the security level of hidden information. It is a new approach to substitute LSB of RGB true color image. The new security conception hides secret information within the LSB of image where a secret key encrypts
A LSB Based Image Steganography Using Random Pixel and Bit Selection for High Payload
International Journal of Mathematical Sciences and Computing, 2021
Security in digital communication is becoming more important as the number of systems is connected to the internet day by day. It is necessary to protect secret message during transmission over insecure channels of the internet. Thus, data security becomes an important research issue. Steganography is a technique that embeds secret information into a carrier such as images, audio files, text files, and video files so that it cannot be observed. In this paper, based on spatial domain, a new image steganography method is proposed to ensure the privacy of the digital data during transmission over the internet. In this method, least significant bit substitution is proposed where the information embedded in the random bit position of a random pixel location of the cover image using Pseudo Random Number Generator (PRNG). The proposed method used a 3-3-2 approach to hide a byte in a pixel of a 24 bit color image. The method uses Pseudo Random Number Generator (PRNG) in two different stages of embedding process. The first one is used to select random pixels and the second PRNG is used select random bit position into the R, G and B values of a pixel to embed one byte of information. Due to this randomization, the security of the system is expected to increase and the method achieves a very high maximum hiding capacity which signifies the importance of the proposed method.
2020
Information privacy has become the overborne issue today with the increasing use and efficiency of electronic data processing. The main purpose on privacy of communication is to provide secure connection with target without being captured by the third persons or by bringing them in such a way that they cannot understand. In the most general sense, steganography is the study and practice of concealing information to provide security of communication. The classic LSB (least significant bit) technique and methods which are derived from classic lsb, are used in steganography techniques on spatial domains. For the case of security, the classic LSB technique is very weak because it is very simple and predictable. Also, it causes distortion of image. In this paper, we propose an improved LSB Steganography technique to increase security and decrease the distortion of image. The proposed method is based on hiding two bits of secret data in one color (rgb) pixel with only one least significan...
Design and Implementation of a Steganographic System using the Least Significant Bit Algorithm
African Journal of Computing & ICT, 2019
Secure data transmission over communication channels has been a critical issue since the beginning of the digital era. Due to advances in ICT, most of information is kept electronically. Consequently, the security of information has become a fundamental issue. Besides cryptography, steganography can be employed to secure information. Steganography is similar but adds another dimension to Cryptography. In cryptography, an intruder is normally aware that data is being communicated, because they can see the coded/scrambled message while in steganography, an unintended recipient or an intruder is unaware of the fact that observed data contains hidden information. In this method, people not only want to protect the secrecy of an information by concealing it, but they also want to make sure any unauthorized person gets no evidence that the information even exists. An example is invisible watermarking; although, this technique is not new, its application has been exploited in various information security technologies. This paper shows the design and implementation of a software system that uses the new image steganographic approach. This approach makes use of Least Significant Bit (LSB) algorithm and is implemented through the Microsoft.NET framework. This software is applied in embedding data into a bit map image (.bmp).
Simple and Secure Digital Color Image Steganography
International Journal of Computer Science and Mobile Computing (IJCSMC), 2023
A simple and secure method of digital color image steganography method will be introduced, the method will hide a digital color image in another image, the covering image will be any type and with any size (the covering image can be smaller than the image to be hidden, thus the capacity of the covering image will be unlimited. The proposed method will apply image resizing, the resizing factors will form the private key to protect the hidden image from being hacked, this key will provide a good key space to secure the image, the extracted image will be very sensitive to the selected values of the private key components. A simple way of image bits hiding and extracting operation will be used, the image bit matrix will converted to one column matrix and embedded in the LSBs of the covering bytes using one assignment operation, the LSBs of the stego bytes will extracted using one operation to create a one column matrix, which will be converted to 8 columns matrix to form the image binary matrix. The method will be implemented and tested using various covering images and various color images to be hidden. The obtained results will be analyzed to prove the quality, speed and sensitivity of the proposed method.
An Improved LSB Based Steganography Technique for RGB Color Images
International Journal of Computer and Communication Engineering, 2013
This paper proposes an improved LSB(least Significant bit) based Steganography technique for images imparting better information security .It presents an embedding algorithm for hiding encrypted messages in nonadjacent and random pixel locations in edges and smooth areas of images. It first encrypts the secret message, and detects edges in the cover-image using improved edge detection filter. Message bits are then, embedded in the least significant byte of randomly selected edge area pixels and 1-3-4 LSBs of red, green, blue components respectively across randomly selected pixels across smooth area of image. It ensures that the eavesdroppers will not have any suspicion that message bits are hidden in the image and standard steganography detection methods can not estimate the length of the secret message correctly. The Proposed approach is better in PSNR value and Capacity as shown experimentally than existing techniques.