scholarly journals A systematic overview of secure image steganography

Author(s):  
Bakhan Tofiq Ahmed

<p>Information is a vitalthing that needs to be secured and well protected during transmission between two or more parties over the internet. This can be achieved by steganography technology. Steganography is the concealing science in which the information is concealed inside other information in a way that the concealed information cannot be detectable by the human eye. Many ways are available to hide data inside a cover media for example text, image, and audio steganography, but image steganography is the most utilized technique among the others. Secure image steganography has a high-security level than traditional technique by combining steganography with cryptography due to encrypting secret information by cryptography algorithm before embedding it into the cover media by steganography algorithm. In this paper,a systematic review has been presented about secure image steganography and its renowned types. Many researchers proposed secure image steganography by using various cryptography and steganography algorithms which have been reviewed. The least significant bit ‘LSB’ was the renowned steganography algorithm which has been used by researchers due to its simplicity, while various cryptography algorithms like advanced encryption standard (AES) and blowfishhave been used to propose secure image steganography in the reviewed papers. The comparison among the reviewed papers indicated that the LSB with hash-RSA gave a greater peak signal-noise ratio ‘PSNR’ value than the others which was 74.0189 dB.</p>

Author(s):  
Nisha Manral

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.


Author(s):  
Meenakshi S Arya ◽  
Meenu Rani ◽  
Charndeep Singh Bedi

<p>With the intrusion of internet into the lives of every household and terabytes of data being transmitted over the internet on daily basis, the protection of content being transmitted over the internet has become an extremely serious concern. Various measures and methods are being researched and devised everyday to ensure content protection of digital media. To address this issue of content protection, this paper proposes an RGB image steganography based on sixteen-pixel differencing with n-bit Least Significant Bit (LSB) substitution. The proposed technique provides higher embedding capacity without sacrificing the imperceptibility of the host data. The image is divided into 4×4 non overlapping blocks and in each block the average difference value is calculated. Based on this value the block is classified to fall into one of four levels such as, lower, lower-middle, higher-middle and higher. If block belongs to lower level then 2-bit LSB substitution is used in it. Similarly, for lower-middle, higher-middle and higher level blocks 3, 4, and 5 bit LSB substitution is used. In our proposed method there is no need of pixel value readjustment for minimizing distortion. The experimental results show that stego-images are imperceptible and have huge hiding capacity.</p>


Author(s):  
Meenakshi S Arya ◽  
Meenu Rani ◽  
Charndeep Singh Bedi

<p>With the intrusion of internet into the lives of every household and terabytes of data being transmitted over the internet on daily basis, the protection of content being transmitted over the internet has become an extremely serious concern. Various measures and methods are being researched and devised everyday to ensure content protection of digital media. To address this issue of content protection, this paper proposes an RGB image steganography based on sixteen-pixel differencing with n-bit Least Significant Bit (LSB) substitution. The proposed technique provides higher embedding capacity without sacrificing the imperceptibility of the host data. The image is divided into 4×4 non overlapping blocks and in each block the average difference value is calculated. Based on this value the block is classified to fall into one of four levels such as, lower, lower-middle, higher-middle and higher. If block belongs to lower level then 2-bit LSB substitution is used in it. Similarly, for lower-middle, higher-middle and higher level blocks 3, 4, and 5 bit LSB substitution is used. In our proposed method there is no need of pixel value readjustment for minimizing distortion. The experimental results show that stego-images are imperceptible and have huge hiding capacity.</p>


2020 ◽  
Vol 55 (2) ◽  
Author(s):  
Azal Habeeb

Information is always being transmitted through the internet. Securing that information is an important issue that programmers need to take into consideration. There are several ways to protect digital images, one of which is steganography, a method of encryption that encrypts information inside another type of information such as images. In this research, we propose a new technique to protect information from hacking. We have used the process of hiding. There are many techniques to secure the image such as hiding information inside other information as in steganography. In this paper, we introduce a new method to protect the information from theft. We used encryption to encrypt the text by using the password between the sender and the receiver. After that we used the least significant bit technique to hide the text in the image. Finally, we applied the proposed method in the MATLAB program.


Cloud Computing has made it possible to provide individuals as well as organizations with a utility that is costeffective. It empowers businesses by delivering these services using the internet. Files can be shared through the cloud. These files may contain sensitive information that needs to be kept hidden from anonymous users. This is done using cryptographic algorithms. High level of security can be provided using hybrid cryptography to encrypt the data. Advanced Encryption Standard (AES) and Triple Data Encryption Standard (3DES) are the symmetric key encryption algorithms used to secure. An asymmetric key encryption algorithm, Rivest-Shamir-Adleman (RSA) helps in providing a hybrid cryptography model. The security of the key generated can be further enhanced using image steganography method Least Significant Bit (LSB). These issues regarding the security and its challenges will be addressed in this paper and also analyse the measures to handle it.


2021 ◽  
Vol 9 (3) ◽  
pp. 375
Author(s):  
Putu Isthu Canistya Chandra ◽  
I Ketut Gede Suhartana

The Internet has become a very popular medium for communicating and exchanging information data. However, with the development of technology, information data theft is becoming more frequent so it is very necessary to maintain the security of information data. To maintain the security of information data, steganography can be used, namely hiding data or information to a medium. Least Significant Bit (LSB) is a method that can be used to perform the insertion. The Least Significant Bit (LSB) replaces the insignificant or smallest bit value so that when an insertion is done, the difference is not clear. So, this research aims to make a steganography application using the Least Significant Bit (LSB) method.


2019 ◽  
Vol 9 (2) ◽  
Author(s):  
Dian Novianto ◽  
Yohanes Setiawan

<p align="center"><strong><em>Abstract</em></strong></p><p><em>There are several security aspects of the data that must be maintained, such as: authentication, integrity, non repudiation, authority, confidentialty, privacy and access control. One of the vulnerable parts of data security is when sending data to the destination. At the time of delivery, tapping of data can occur, so that people who are not entitled to get that information can find out. Therefore, an information needs to be secured so that only people who have access rights can know or get that information. And to maintain the confidentiality of the information, one of the ways is to insert the data into other objects, so that other people do not realize if the object contains important data or information. This hiding method is also known as steganography, and cryptography is added to strengthen the security of the data, that is a science and art to maintain the confidentiality of the message by encoding it in a form that is incomprehensible. The method used in steganography is Least Significant Bit (LSB), the algorithm used in cryptography is the Advanced Encryption Standard (AES), and the software development method used is prototype. The results of this study are all aspects of data security can be achieved, including when passing through the process of sending data through media such as the internet.</em></p><p><strong><em>Keyword: </em></strong><em>Steganography, Criptography, Prototype.</em></p><p align="center"><strong><em>Abstrak</em></strong></p><p><em>Ada beberapa aspek keamanan data yang harus dijaga, seperti: otentikasi, integritas, non repudiation, otoritas, kerahasiaan, privasi, dan kontrol akses. Salah satu bagian yang rentan dari keamanan data adalah ketika mengirim data ke tujuan. Pada saat pengiriman, penyadapan data dapat terjadi, sehingga orang yang tidak berhak mendapatkan informasi tersebut dapat mengetahuinya. Oleh karena itu, suatu informasi perlu diamankan sehingga hanya orang yang memiliki hak akses yang dapat mengetahui atau mendapatkan informasi tersebut. Dan untuk menjaga kerahasiaan informasi, salah satu caranya adalah dengan memasukkan data ke objek lain, sehingga orang lain tidak menyadari jika objek tersebut berisi data atau informasi penting. Metode persembunyian ini juga dikenal sebagai steganografi, dan kriptografi ditambahkan untuk memperkuat keamanan data, yaitu ilmu dan seni untuk menjaga kerahasiaan pesan dengan menyandikannya dalam bentuk yang tidak dapat dipahami. Metode yang digunakan dalam steganografi adalah Least Significant Bit (LSB), algoritma yang digunakan dalam kriptografi adalah Advanced Encryption Standard (AES), dan metode pengembangan perangkat lunak yang digunakan adalah prototipe. Hasil dari penelitian ini adalah semua aspek keamanan data dapat dicapai, termasuk ketika melewati proses pengiriman data melalui media seperti internet.</em></p><strong><em>Kata kunci:</em></strong><em> Steganografi, kriptografi, Prototipe</em>


2019 ◽  
Vol 8 (2S11) ◽  
pp. 3706-3710

In this advanced world with the growing technology, the demand for security of information is needed in any communication streams of data which is being conveyance from host to intended host over the internet. Obviously, a huge & numerous amount of the data or the information are transferred in our everyday. So, the demand for securing information has become the main concern. Image Steganography is one of the important areas in the field of Steganography. The main purpose of steganography is to protect the surreptitious information from others except from intended receiver & by increasing the security of the covert data in the significant way that information can’t be revealed although the intruder knows the methodology of the embedding process. In this paper, The aim is to propose a different yet, an innovative steganographical technique which provides the security on our digital image, and by using a quality measuring technique like Mean Square Error(MSE), Peak Signal Noise Ratio (PSNR) which assure the quality of image has been not degraded even after infusing the covert data inside the image. So to overcome these issues, this paper, suggests a new method to maintain the quality of the image. After embedding the authenticated information in the cover image using Region-Based Least Significant Bit (LSB) technique that provides security of digital image


2018 ◽  
Vol 26 (8) ◽  
pp. 112-121
Author(s):  
Aymen Mudheher Badr ◽  
Mohamed layth Talal ◽  
Ghassan Sabeh

Because the big grown of the digital market and the growing demand for protection to data and information which transmitted through the Internet. Steganography is the art of embedding, hiding information into different digital media, it was the main reason to increase its importance in the exponential development of the secret communication of computer and digital cloud users over the internet. There are a lot of techniques and different ways to achieve hiding data. Usually, the data embedding is obtained in communication such as image, text, voice or any multimedia content for copyright and also in military communication for authentication and many other different purposes. In this paper, we protected the information in two ways: Encryption and Steganography. The basic idea is to present a method that encrypted the message firstly by using The AES (Advanced Encryption Standard) it is a symmetric-key encryption each of these ciphers it has 128-bit the size to block, and size keys of 128, 192 and 256 bits.  Secondly, hide that encrypted message in color cover image in the Least Significant Bit (LSB) to image’s frame with (.bmp, .jpg) extensions. Our scheme is to enhance the ability of LSB algorithm to include the storage of information and images encoded and intangible sense of human vision. That two methods to increased together the security attend any attack.


Sign in / Sign up

Export Citation Format

Share Document