Image Steganography Research Papers - Academia.edu (original) (raw)
In a color image every pixel value composed of red, green and blue component and each of which ranges from 0 to 255 in case of 8-bit representation. In this paper, we have used pixel value differencing (PVD) method for secret data... more
In a color image every pixel value composed of red, green and blue component and each of which ranges from 0 to 255 in case of 8-bit representation. In this paper, we have used pixel value differencing (PVD) method for secret data embedding in each of the component of a pixel in a color image. But when we use pixel-value differencing (PVD) method as image steganographic scheme, the pixel values in the stego-image may exceed the range 0~255. We have eliminated this overflow problem of each component pixel. Furthermore for providing more security, we have used different number of bits in different pixel components. It would be very difficult to trace how many bits are embedded in a pixel of the stego image. From the experiments it is seen that the results obtained in proposed method provides better visual quality of stego-image compared to the PVD method.
Information security is one of the most challenging problems in today's technological world. In order to secure the transmission of secret data over the public network (Internet), various schemes have been presented over the last... more
Information security is one of the most challenging problems in today's technological world. In order to secure the transmission of secret data over the public network (Internet), various schemes have been presented over the last decade. Steganography combined with cryptography, can be one of the best choices for solving this problem. This paper proposes a new steganographic method based on gray-level modification for true colour images using image transposition, secret key and cryptography. Both the secret key and secret information are initially encrypted using multiple encryption algorithms (bitxor operation, bits shuffling, and stego key-based encryption); these are, subsequently, hidden in the host image pixels. In addition, the input image is transposed before data hiding. Image transposition, bits shuffling, bitxoring, stego key-based encryption, and gray-level modification introduce five different security levels to the proposed scheme, making the data recovery extremely...
Security system for hiding sensitive text-data on personal computer (PC) is implemented. The system proposes using normal multimedia image based steganography replacing the pixel least significant bits with text to be hidden. The study... more
Security system for hiding sensitive text-data on personal computer (PC) is implemented. The system proposes using normal multimedia image based steganography replacing the pixel least significant bits with text to be hidden. The study involved several testing scenarios for possible increase in the capacity and ambiguity within steganography adopting 1, 2, 3 and 4 least significant bits stego-systems choices. The design novelty is in providing full security information to the user to select appropriate cover-image from the PC based on the security priority. The technique allows the PC user to test multi-bits steganography on several images to hide same sensitive texts. Then, the user can prefer one image to be used as cover image based on his selection knowing the capacity and security priority desired. The study proofs the data dependency and its security property by experimenting 35 fixed sizes PC images showing remarkable results.
This paper presents a new suggested Steganography system. This system hides a message into a stego-image by using a mapping table and some other tables to map different values of pixels in the image to the alphabetic letters of the... more
This paper presents a new suggested Steganography system. This system hides a message into a stego-image by using a mapping table and some other tables to map different values of pixels in the image to the alphabetic letters of the message. One of the strong points in the system is that the system does not make any changes/distortion in the stego-image, where most steganography systems suffer from this point. Also the system tries, in its operations, to mix the properties of some Cryptographic systems to provide additional security to the hidden message. The experiments on the suggested system proved that it is an easy and efficient Steganography system with a good security for the message. Therefore, this system can be considered as a Steganograpgy-Cryptograpgy system and it can be used effectively in these two fields.
Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio and video files. It comes under the assumption that if the feature is visible, the point of attack is evident,... more
Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio and video files. It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is always to conceal the very existence of the embedded data. This paper presents a novel technique for image steganography based on Huffman Encoding. Two 8 bit gray level image of size M X N and P X Q are used as cover image and secret image respectively. The Huffman Encoding is performed on the secret image/message before embedding and each bit of Huffman code of secret image/message is embedded in the cover image by altering the least significant bit (LSB) of each of the pixels intensities of cover image. The size of the Huffman encoded bit stream and Huffman Table are also embedded in the cover image, so that the Stego-Image becomes standalone information to the receiver. The experimental results show that the algorithm has a high capacity and a good invisibility. Moreover Peak Signal to Noise Ratio (PSNR) of cover image with stego-image shows the better results in comparison with other existing steganography approaches. Furthermore, satisfactory security is maintained since the secret message/image cannot be extracted without knowing decoding rules and Huffman table.
Images are used because the widespread cowl objects for steganography. A message is embedded in a very digital image through an embedding algorithmic program, exploitation the key. During this method image is split into totally different... more
Images are used because the widespread cowl objects for steganography. A message is embedded in a very digital image through an embedding algorithmic program, exploitation the key. During this method image is split into totally different regions for the detection of least vital bits out there in numerous pictures. The no. of bits which will be used for image enhancement depend on the element intensity the low intensity element utilizes less no. of bits and element having a high intensity used most bits within the method of concealing the image. The difficulty during this is security for hindrance image from stegnalysis attack and therefore the secret knowledge is out there in such a fashion because it transmitted. In this paper a review on various approaches are done that has been used for embedding of secret data behind the quilt object.
Özet: Tarih boyunca, insanoğlu toplumsal dokunun gelişmesi ile bilgi alışverişi için birçok yöntem kullanmıştır. Sosyal hayatın gelişmesi, ülkeler arasındaki siyasal ve toplumsal ilişkilerin önemini arttırmıştır. Toplumlar arasındaki... more
Özet: Tarih boyunca, insanoğlu toplumsal dokunun gelişmesi ile bilgi alışverişi için birçok yöntem kullanmıştır. Sosyal hayatın gelişmesi, ülkeler arasındaki siyasal ve toplumsal ilişkilerin önemini arttırmıştır. Toplumlar arasındaki iletişim yöntemlerinde, kaynak ve hedef arasında yol alan verinin önem derecesi farklılık göstermiştir. Değerli bilginin iletim ve depolanması için Kriptografi ve Steganografi gibi yöntemler geliştirilmiştir. Kriptografi, çeşitli şifreleme algoritmaları ile iletilecek verinin şifrelenmesidir. Şifrelenen verinin içeriğine ancak hedefin veriyi deşifre etmesi ile mümkündür. Steganografi veri içinde veri mantığı ile geliştirilmiş bir kavramdır. Taşınan veri içinde ulaştırılmak istenen bir başka veri gizlilik esasına göre iletilir. Steganografi yapısal anlamda dilbilimi ve teknik Steganografi şeklinde sınıflandırılır. Dilbilimi açısından bakıldığında, metin içinde bulunan eksik ya da boşluklardan ziyade, doğrudan cümle yapısı ve kelimelerle bağlantılıdır. Teknik Steganografi ise görüntü ve ses dosyaları aracılığı ile yapılan veri gizleme olaylarında ise kullanılmayan ve önemsiz bitler aracılığı ile veri gizlemesi yapılır. Bu çalışmada teknik steganografi alanında kullanılan algoritmalar araştırılarak, steganaliz yöntemlerinin verimlilikleri incelenmiştir. Anahtar Sözcükler-Veri gizleme, bilgi güvenliği, steganografi, steganaliz Abstract: Throughout history, human beings have a social status with the development of many methods used for the exchange of information. The development of social life, the importance of political and social relations between countries has increased. A method of communication between communities in the path between the source and destination of the data has shown that differ in severity. Cryptography and Steganography methods such as the transmission and storage of valuable information have been developed. Cryptography, various encryption algorithms to encrypt data to be transmitted with; but the goal is to decode the encrypted data on the content of the data is possible. Steganography is a concept that works with the logic data in data. Moved on the basis of the data desired to be delivered within the privacy of another data is transmitted. Steganography and technical Steganography in the form of structural linguistics in the sense are classified. From the perspective of Linguistics in the text, missing, or gaps, rather than directly linked to the sentence structure and words. Technical data hiding via steganography image and audio files in the event of data with unused bits of junk and to hide. In this study, the algorithms used in the field of technical steganography are investigated and the efficiency of the steganalysis methods are investigated.
Information hiding is an active area of research where secret information is embedded in innocent-looking carriers such as images and videos for hiding its existence while maintaining their visual quality. Researchers have presented... more
Information hiding is an active area of research where secret information is embedded in innocent-looking carriers such as images and videos for hiding its existence while maintaining their visual quality. Researchers have presented various image steganographic techniques since the last decade, focusing on payload and image quality. However, there is a trade-off between these two metrics and keeping a better balance between them is still a challenging issue. In addition, the existing methods fail to achieve better security due to direct embedding of secret data inside images without encryption consideration, making data extraction relatively easy for adversaries. Therefore, in this work, we propose a secure image steganographic framework based on stego key-directed adaptive least significant bit (SKA-LSB) substitution method and multi-level cryptography. In the proposed scheme, stego key is encrypted using a two-level encryption algorithm (TLEA); secret data is encrypted using a multi-level encryption algorithm (MLEA), and the encrypted information is then embedded in the host image using an adaptive LSB substitution method, depending on secret key, red channel, MLEA, and sensitive contents. The quantitative and qualitative experimental results indicate that the proposed framework maintains a better balance between image quality and security, achieving a reasonable payload with relatively less computational complexity, which confirms its effectiveness compared to other state-of-the-art techniques.
Advanced Image Steganography is used to develop a secure path for sending or receiving secret text messages. Using Chaff and Winnow& AES (Advanced Encryption Standard) encryption technique, the text message is encrypted and sent to... more
Advanced Image Steganography is used to develop a secure path for sending or receiving secret text messages. Using Chaff and Winnow& AES (Advanced Encryption Standard) encryption technique, the text message is encrypted and sent to receiver very securely. The system uses AES encryption to encrypt the user's secret text message and key information while sending it to receiver also using Diffie-Hellman key generation for sharing secret key between sender and receiver.
The article deals with the steganography system which hides text inside images without losing data. The secret message is hidden in the cover image using Last Significant Bit (LSB) algorithm. To evaluate steganography system properties... more
The article deals with the steganography system which hides text inside images without losing data. The secret message is hidden in the cover image using Last Significant Bit (LSB) algorithm. To evaluate steganography system properties the measures like Signal-to-Noise Ratio (SNR), Peak Signal-to-Noise Ratio (PRSN), Mean Squared Error (MSE) and Structural Similarity Index for measuring (SSIM) are used. Experimental results show the advantages of the described steganography system.
Metode PVD (Pixel Value Differencing) merupakan salah satu metode steganografi. Metode PVD merupakan metode yang menggunakan selisih nilai piksel yang satu dengan nilai piksel yang lain, dimana hasil selisih kedua piksel tersebut nantinya... more
Metode PVD (Pixel Value Differencing) merupakan salah satu metode steganografi. Metode PVD merupakan metode yang menggunakan selisih nilai piksel yang satu dengan nilai piksel yang lain, dimana hasil selisih kedua piksel tersebut nantinya akan digunakan untuk menyisipkan pesan pada media lain yang ingin disembunyikan. Setelah pesan sudah disisipkan pada media penampung pesan, maka nilai piksel-piksel tersebut akan berubah. Nilainya akan berubah sesuai dengan rumus perhitungan PVD. Untuk menambah tingkat keamanan informasi, data maupun pesan yang akan disisipkan ke dalam citra, steganografi dapat dikombinasikan dengan enkripsi, sehingga informasi yang disisipkan ke dalam citra tidak mudah dibaca oleh orang lain. Metode enkripsi pesan yang digunakan adalah Pembangkit Bilangan Acak berupa LCG (Linear Congruential Generator).
In the era of modern technology, there is a need of safe and secure communication. The art of impregnable communication through a safe medium like images is known as steganography. The process that detects the embedded data in the medium... more
In the era of modern technology, there is a need of safe and secure communication. The art of impregnable communication through a safe medium like images is known as steganography. The process that detects the embedded data in the medium is called as Steganalysis. In this review paper, we have studied various methodologies proposed by the researchers in the field of steganography. The main objective of image steganography is to hide the existence of data from unauthorized action. Image steganography is a technique that provides a safe way to the secret embedded data to the target user. To hide the secret data in the images various techniques are proposed by the researchers, some are complex and other produce good results. Each methodology has good and bad points, so techniques are compared as well.
In this paper, information about steganographic methods and tools which are used to hide important data in digital media are presented. At the same time, different aspects of these tools such as achievement on data hiding, used methods,... more
In this paper, information about steganographic methods and tools which are used to hide important data in digital media are presented. At the same time, different aspects of these tools such as achievement on data hiding, used methods, types of hidden data and cover media are examined.
In today’s scenario security of data is very big challenge in any communication. Numerous data security and hiding algorithms have been developed in the last decade. The Digital image Steganography is science of hiding sensitive... more
In today’s scenario security of data is very big challenge in any communication. Numerous data security and hiding algorithms have been developed in the last decade. The Digital image Steganography is science of hiding sensitive information in another transmission medium to achieve secure and secret communication. In this paper we present the dual layer of security to the data, in which first layer is to encode data using Least Significant Bit image steganography method and in the second layer encrypt the data using Advance Encryption Standard Algorithm. Steganography does not replace the encryption of data, instead it provides extra security feature to it. In our work secret text message is hiding behind the digital image file and this image file is then encrypted using AES encryption algorithm.
A new steganography scheme using a reference image is proposed with two variants. In the first kind, secret text bits are directly embedded into the cover image after encryption using a reference image. In the second variant secret text... more
A new steganography scheme using a reference image is proposed with two variants. In the first kind, secret text bits are directly embedded into the cover image after encryption using a reference image. In the second variant secret text is written/printed on a white canvas and then that image containing the secret text is converted into binary (BW) image. Any image could be used as a cover image. A special reference image will act as an encryption key and it is assumed that the used reference image is known to sender and receiver apriori. For a grayscale reference image, any k LSB bit planes could be used to encode the secret binary image bits before embedding them into k LSBs of the cover image. When k=1, the dimension of the secret image becomes the same as that of the reference image and cover image. With k=2, secret binary image size could be doubled or two secret images could be hidden using two LSB bit planes of the reference image and embedding them into two LSB bits of each cover image pixel. Any reversible mechanism could be used for encoding. Here XOR operation will be used for experiments. Two distinct advantages of this generic scheme are (i) It is far more secure than other image steganography techniques as adversary may know the encoding formulae , may collect the stego image but could not get information about the reference image used and which and how many bit planes are used for encoding as there could be millions of images and many combinations of bit planes that could have been employed; (ii) As the secret text is printed and then converted into an image, it overcomes one of the main limitations of LSB image steganography, i.e. robustness to random noise. Even with corrupted Stego image, the extracted binary image becomes corrupted too but most of the secret are still readable.
This scheme has lower capacity than the capacity that would have been achieved by directly embedding the secret text binary as in the first variant, but this could be overcome by using k>=2 as k=2 doubles the capacity. This whole scheme is generic and any digital media could be used as reference or cover. Experimental results demonstrate the robustness of the second variant against random noise, and standard image quality metrics such as MSE, PSNR, SSIM are evaluated and compared between the two variants.
— Image based steganography utilize the images as cover media to hide secret data. The common technique used in this field replaces the least significant bits (LSB) of image pixels with intended secret bits. Several improvements to... more
— Image based steganography utilize the images as cover media to hide secret data. The common technique used in this field replaces the least significant bits (LSB) of image pixels with intended secret bits. Several improvements to enhance the security of the LSB method have been presented earlier. This paper proposed a new improved technique that takes the advantage of the 24 bits in each pixel in the RGB images using the two least significant bits of one channel to indicate existence of data in the other two channels. The stego method does not depend on a separate key to take out the key management overhead. Instead, it is using the size of the secret data as selection criteria for the first indicator channel to insert security randomness. Our proposed technique is analyzed using security and capacity measures and compared to two other similar work. This proposed pixel indicator technique for RGB image steganography showed interesting promising result.
Information security is one of the most challenging problems in today's technological world. In order to secure the transmission of secret data over the public network (Internet), various schemes have been presented over... more
Information security is one of the most challenging problems in today's technological world. In order to secure the transmission of secret data over the public network (Internet), various schemes have been presented over the last decade. Steganography combined with cryptography, can be one of the best choices for solving this problem. This paper proposes a new steganographic method based on gray-level modification for true colour images using image transposition, secret key and cryptography. Both the secret key and secret information are initially encrypted using multiple encryption algorithms (bitxor operation, bits shuffling, and stego key-based encryption); these are, subsequently, hidden in the host image pixels. In addition, the input image is transposed before data hiding. Image transposition , bits shuffling, bitxoring, stego key-based encryption, and gray-level modification introduce five different security levels to the proposed scheme, making the data recovery extremely difficult for attackers. The proposed technique is evaluated by objective analysis using various image quality assessment metrics, producing promising results in terms of imperceptibility and security. Moreover, the high quality stego images and its minimal histogram changeability, also validate the effectiveness of the proposed approach.
The proposed method is a quite useful technique for secure communication over the web. In steganography, the hidden message is invisible. This paper depicts methods to implement encryption and decryption techniques on the secret... more
The proposed method is a quite useful technique for secure communication over the web. In steganography, the hidden message is invisible. This paper depicts methods to implement encryption and decryption techniques on the secret information to be hidden into other images, this will provide confidentiality to the secret information. The sender and the receiver only know the techniques to hide and retrieve the secret message. No third party person will even suspect that there is a hidden message inside the image file. The sender and the receiver only have the knowledge of the instructions to hide and retrieve.
Owing to the exceptional growth of information exchange over open communication channels within the public Internet, confidential transmission of information has become a vital current concern for organizations and individuals. In the... more
Owing to the exceptional growth of information exchange over open communication channels within the public Internet, confidential transmission of information has become a vital current concern for organizations and individuals. In the proposed content-protection scheme, the decryption key is embedded in the encrypted image by utilizing machine learning, nearest-centroid clustering classifier, followed by least significant bit matching (LSB-M) in the spatial domain. An image is first encrypted with the advanced encryption standard (AES) algorithm in output feedback mode, after which the AES key is embedded into the encrypted image. Preliminary nearest-centroid clustering followed by shuffling the sequence of pixels within the clusters before applying LSB-M makes any attack more complex, as the bits of the key are further dispersed within the encrypted image. In terms of contributions, one contribution is the direct implementation of the proposed security mechanism on color images rather than first converting them into gray tones. Another contribution of the Crypto-Stego method is that, it requires no separate key distribution mechanism to decrypt the information. In addition, a parallel-processing approach is implemented to improve the execution time and the efficiency of the scheme by exploiting system resources. Extensive experiments were performed on RGB images with different resolutions and sizes to confirm the effectiveness of the scheme. The high structural similarity index score confirmed that the overall carrier image and stego-image were unaltered by processing. While an average value over the test images of 0.0594 for mean squared error confirmed that malicious individuals cannot detect the presence of stego data in the cover image. Moreover, negligible pixel intensity histogram changes also validated the effectiveness of the proposed scheme. An average 77% efficiency and 1.5 times speed-up factor were achieved through parallel processing showed the effectiveness of the joint Crypto-Stego method for image confidentiality.
This paper informs the reader how an innocent looking digital image hides a deadly terrorist plan. It analyses the strengths of image steganography and the reasons why terrorists are relying on it. It also aims to generate interest among... more
This paper informs the reader how an innocent looking digital image hides a deadly terrorist plan. It analyses the strengths of image steganography and the reasons why terrorists are relying on it. It also aims to generate interest among the scientific community about Image steganography so that experts from multiple disciplines may join hands for devising better steganalysis techniques against the global terrorism. In this paper a basic digital image is analyzed and based on this analysis an LSB based steganographic algorithm is designed. Using this algorithm a software is developed and its performance is compared with various other steganographic tools available on the internet. The result of this comparison explains us why steganography is so much preferred by terrorists. Various images and image related tables used in this paper are generated using MATLAB © Simulation Environment.
Cloud computing provides a lot of shareable resources payable on demand to the users. The drawback with cloud computing is the security challenges since the data in the cloud are managed by third party. Steganography and cryptography are... more
Cloud computing provides a lot of shareable resources payable on demand to the users. The drawback with cloud computing is the security challenges since the data in the cloud are managed by third party. Steganography and cryptography are some of the security measures applied in the cloud to secure user data. The objective of steganography is to hide the existence of communication from the unintended users whereas cryptography does provide security to user data to be transferred in the cloud. Since users pay for the services utilize in the cloud, the need to evaluate the performance of the algorithms used in the cloud to secure user data in order to know the resource consumed by such algorithms such as storage memory, network bandwidth, computing power, encryption and decryption time becomes imperative. In this work, we implemented and evaluated the performance of Text steganography and RSA algorithm and Image steganography and RSA as Digital signature considering four test cases. The simulation results show that, image steganography with RSA as digital signature performs better than text steganography and RSA algorithm. The performance differences between the two algorithms are 10.76, 9.93, 10.53 and 10.53 seconds for encryption time, 60.68, 40.94, 40.9, and 41.85 seconds for decryption time, 8.1, 10.92, 15.2 and 5.17 mb for memory used when hiding data, 5.3, 1.95 and 17.18 mb for memory used when extracting data, 0.93, 1.04, 1.36 and 3.76 mb for bandwidth used, 75.75, 36.2, 36.9 and 37.45 kwh for processing power used when hiding and extracting data respectively. Except in test case2 where Text steganography and RSA algorithm perform better than Image Steganography and RSA as Digital Signature in terms of memory used when extracting data with performance difference of-5.09 mb because of the bit size of the image data when extracted. This research work recommend the use of image steganography and RSA as digital signature to cloud service providers and users since it can secure major data types such as text, image, audio and video used in the cloud and consume less system resources.
Image Steganography is the process of embedding text in images such that its existence cannot be detected by Human Visual System (HVS) and is known only to sender and receiver. This paper presents a novel approach for image... more
Image Steganography is the process of embedding text in images such that its existence cannot be
detected by Human Visual System (HVS) and is known only to sender and receiver. This paper presents a novel
approach for image steganography using Hue-Saturation-Intensity (HSI) color space based on Least Significant
Bit (LSB). The proposed method transforms the image from RGB color space to Hue-Saturation-Intensity (HSI)
color space and then embeds secret data inside the Intensity Plane (I-Plane) and transforms it back to RGB color
model after embedding. The said technique is evaluated by both subjective and Objective Analysis.
Experimentally it is found that the proposed method have larger Peak Signal-to Noise Ratio (PSNR) values, good
imperceptibility and multiple security levels which shows its superiority as compared to several existing
methods.
Transmitting secret information through internet requires more security because of interception and improper manipulation by eavesdropper. One of the most desirable explications of this is " Steganography ". This paper proposes a... more
Transmitting secret information through internet requires more security because of interception and improper manipulation by eavesdropper. One of the most desirable explications of this is " Steganography ". This paper proposes a technique of steganography using Advanced Encryption Standard (AES) with secured hash function in the blue channel of image. The embedding system is done by dynamic bit adjusting system in blue channel of RGB images. It embeds message bits to deeper into the image intensity which is very difficult for any type improper manipulation of hackers. Before embedding text is encrypted using AES with a hash function. For extraction the cipher text bit is found from image intensity using the bit adjusting extraction algorithm and then it is decrypted by AES with same hash function to get the real secret text. The proposed approach is better in Pick Signal to Noise Ratio (PSNR) value and less in histogram error between stego images and cover images than some existing systems.
The goals of this study were to develop a system intended for securing files through the technique of image steganography integrated with cryptography by utilizing ZLIB Algorithm for compressing and decompressing secret files, DES... more
The goals of this study were to develop a system intended for securing files through the technique of image steganography integrated with cryptography by utilizing ZLIB Algorithm for compressing and decompressing secret files, DES Algorithm for encryption and decryption, and Least Significant Bit Algorithm for file embedding and extraction to avoid compromise on highly confidential files from exploits of unauthorized persons. Ensuing to this, the system is in accordance with ISO 9126 international quality standards. Every quality criteria of the system was evaluated by 10 Information Technology professionals, and the arithmetic Mean and Standard Deviation of the survey were computed. The result exhibits that most of them strongly agreed that the system is excellently effective based on Functionality, Reliability, Usability, Efficiency, Maintainability and Portability conformance to ISO 9126 standards. The system was found to be a useful tool for both government agencies and private institutions for it could keep not only the message secret but also the existence of that particular message or file secret maintaining the privacy of highly confidential and sensitive files from unauthorized access.
Steganography is the technique of hiding the fact that communication is taking place, by hiding data in other data. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the... more
Steganography is the technique of hiding the fact that communication is taking place,
by hiding data in other data. Many different carrier file formats can be used, but digital images
are the most popular because of their frequency on the Internet. For hiding secret information in
images, there exist a large variety of steganographic techniques. Steganalysis, the detection of this
hidden information, is an inherently difficult problem.In this paper,I am going to cover different
steganographic techniques researched by different researchers.
Keywords — Cryptography, Steganography, LSB, Hash-LSB, RSA Encryption –Decryption
Image steganography is a growing research field, where sensitive contents are embedded in images, keeping their visual quality intact. Researchers have used correlated color space such as RGB, where modification to one channel affects the... more
Image steganography is a growing research field, where sensitive contents are embedded in images, keeping their visual quality intact. Researchers have used correlated color space such as RGB, where modification to one channel affects the overall quality of stego-images, hence decreasing its suitability for steganographic algorithms. Therefore, in this paper, we propose an adaptive LSB substitution method using uncorrelated color space, increasing the property of imperceptibility while minimizing the chances of detection by the human vision system. In the proposed scheme, the input image is passed through an image scrambler, resulting in an encrypted image, preserving the privacy of image contents, and then converted to HSV color space for further processing. The secret contents are encrypted using an iterative magic matrix encryption algorithm (IMMEA) for better security, producing the cipher contents. An adaptive LSB substitution method is then used to embed the encrypted data inside the V-plane of HSV color model based on secret key-directed block magic LSB mechanism. The idea of utilizing HSV color space for data hiding is inspired from its properties including de-correlation, cost-effectiveness in processing, better stego image quality, and suitability for steganography as verified by our experiments, compared to other color spaces such as RGB, YCbCr, HSI, and Lab. The quantitative and qualitative experimental results of the proposed framework and its application for addressing the security and privacy of visual contents in online social networks (OSNs), confirm its effectiveness in contrast to state-of-the-art methods.
A new steganographic model using dual image has been proposed to increase the obscurity of the secret as well as to make it more secure. It uses two different images namely reference image and cover image along with a secret embed key... more
A new steganographic model using dual image has been proposed to increase the obscurity of the secret as well as to make it more secure. It uses two different images namely reference image and cover image along with a secret embed key (stego key). Reference image is divided into blocks with assigned block-codes. Total number of blocks and other embedding parameters (block traversing direction, starting block etc.) are stored in the embed key. Secret message converted to binary and bit pairs are made. Bit pairs of secret message are encoded using the bit pairs of different blocks of reference image and sometimes updating a few LSB bits in the reference image. As an optional capacity enhancement module for text only secret messages dictionary word indexing based encoding is applied. Finally encoded bit stream is embedded into the cover image using any standard LSB technique with its own merits and demerits. LSB changes in the reference image are almost negligible. Embedding key is encrypted using public key of the receiver hence even if someone gets the encoded message it is not possible to get the secret message. As this model can use any existing LSB replacement scheme to embed encoded message into the cover image the state of the art security and other quality features are by default available to it. This is made more secure by using different dictionary word indexing scheme every time based on a random secret key that is appended in the embed key. Keywords—dual image; lsb steganography; reference image; dictionary word indexing; block code based encoding
The article deals with the steganography system which hides text inside images without losing data. The secret message is hidden in the cover image using Least Significant Bit (LSB) algorithm. To evaluate steganography system properties... more
The article deals with the steganography system which hides text inside images without losing data. The secret message is hidden in the cover image using Least Significant Bit (LSB) algorithm. To evaluate steganography system properties the measures like Signal-to-Noise Ratio (SNR), Peak Signal-to-Noise Ratio (PRSN), Mean Squared Error (MSE) and Structural Similarity Index for measuring (SSIM) are used. Experimental results show the advantages of the described steganography system.
This paper present a application for enhancing security in internet banking .This paper mainly consists of image morphing, steganography and compression for security purpose. This proposal provides OTP security using image processing .The... more
This paper present a application for enhancing security in internet banking .This paper mainly consists of image morphing, steganography and compression for security purpose. This proposal provides OTP security using image processing .The idea is to encrypt the OTP behind cover image. It includes theoretical analysis of image Steganography, compression and morphing.
El proceso de ocultar datos secretos dentro de una señal huésped se conoce como esteganografía; sus parámetros de diseño son la imperceptibilidad, la capacidad de ocultamiento y la calidad de los datos recuperados. En el caso de imágenes,... more
El proceso de ocultar datos secretos dentro de una señal huésped se conoce como esteganografía; sus parámetros de diseño son la imperceptibilidad, la capacidad de ocultamiento y la calidad de los datos recuperados. En el caso de imágenes, uno de los métodos existentes basado en la modicación de los píxeles de la imagen huésped es el denominado BPHM (Block Pixel Hiding Method), el cual presenta una buena imperceptibilidad y alta capacidad de ocultamiento, pero no garantiza la calidad de la imagen secreta recuperada. Este artículo propone un método que mejora los resultados de BPHM basado en la selección de banda y un algoritmo de búsqueda global denominado IPHM (Improved Pixel Hiding Method). De acuerdo a las simulaciones realizadas, los resultados obtenidos con IPHM son mejores a los obtenidos con BPHM y son similares a uno de los métodos más populares en esteganografía de imágenes conocido como QIM (Quantization Index Modulation).
Data hiding is a method of concealing secret data into a cover media and preventing a spectator from being aware of the existence of the hidden message. According to the problems of steganography, the main effort is to provide a better... more
Data hiding is a method of concealing secret data into a cover media and preventing a spectator from being aware of the existence of the hidden message. According to the problems of steganography, the main effort is to provide a better imperceptibility of stego-image that can be done by decreasing distortion of image. One of the popular techniques in data hiding is steganography in which the simple method for image hiding is the Least Significant Bit (LSB) substitution method. Wu et al. proposed two image hiding techniques to improve the quality of the stego-image [1]. The first one is to find the best block matching matrix and the other one is to find the optimal substitution matrices. The proposed method utilizes particle Swarm optimization (PSO) for finding the best pixel locations, and then the secret image is transformed to a new secret image. Optimal Pixel Adjustment (OPA) method is applied to further increase the quality of image. Results are then compared with those obtained...
Steganography is one of the cryptography techniques where secret information can be hidden through multimedia files such as images and videos. Steganography can offer a way of exchanging secret and encrypted information in an untypical... more
Steganography is one of the cryptography techniques where secret information can be hidden through multimedia files such as images and videos. Steganography can offer a way of exchanging secret and encrypted information in an untypical mechanism where communicating parties can only interpret the secret message. The literature has shown a great interest in the least significant bit (LSB) technique which aims at embedding the secret message bits into the most insignificant bits of the image pixels. Although LSB showed a stable performance of image steganography yet, many works should be done on the message part. This paper aims to propose a combination of LSB and Deflate compression algorithm for image steganography. The proposed Deflate algorithm utilized both LZ77 and Huffman coding. After compressing the message text, LSB has been applied to embed the text within the cover image. Using benchmark images, the proposed method demonstrated an outperformance over the state of the art. This can proof the efficacy of using Deflate as a data compression prior to the LSB embedding.
A huge number of messages circulate through social media, and many of these messages are confidential or carry personal information, which requires protection from intruders. The least significant bit method of data steganography is... more
A huge number of messages circulate through social media, and many of these messages are confidential or carry personal information, which requires protection from intruders. The least significant bit method of data steganography is effective in masking messages, but it is not secure. In this research paper we will present a way to raise the security of the method of hiding messages without affecting the effectiveness of the method by keeping the MSE values low and PSNR values high. The proposed method will base on extracting a secret block from the image, this block will be used as a covering media to hold the secret message, after inserting the secret message the block will be returned back to the covering image.
- by IJCSMC Journal and +1
- •
- Mathematics, Computer Science, Algorithms, Information Technology