scholarly journals A new approach for enhancing LSB steganography using bidirectional coding scheme

Author(s):  
Mohammed M. Saeed Abdullah Al-Momin ◽  
Issa Ahmed Abed ◽  
Hussein A. Leftah

This paper proposes a new algorithm for embedding private information within a cover image. Unlike all other already existing algorithms, this one tends to employ the data of the carrier image more efficiently such that the image looks less distorted. As a consequence, the private data is maintained unperceived and the sent information stays unsuspicious.  This task is achieved by dividing the least significant bit plane of the cover image into fixed size blocks, and then embedding the required top-secret message within each block using one of two opposite ways depending on the extent of similarity of each block with the private information needed to be hidden. This technique will contribute to lessen the number of bits needed to be changed in the cover image to accommodate the private data, and hence will substantially reduce the   amount of distortion in the stego-image when compared to the classic LSB image steganography algorithms.

2021 ◽  
Vol 21 (3) ◽  
pp. 97-107
Author(s):  
Nadia A. Mohsin ◽  
Huda A. Alameen

Abstract In this research a new method for increasing the embedding capacity in images based on the edge area is proposed. The new approach combines Canny and Prewitt edge detection techniques using OR binary operation. The secret message is concealed using the Least Significant Bit (LSB) method. Embedding capacity, PSNR, SSIM, and MSE values are used as evaluation metrics. Based on the resulted values, the proposed method showed higher embedding capacity while keeping the PSNR, SSIM, MSE values without major changes of other methods which means keeping the imperceptibility quality of the stego image.


2020 ◽  
Vol 17 (12) ◽  
pp. 5279-5295
Author(s):  
S. Jahnavi ◽  
C. Nandini

With increase in growth of data and digital threat, demand of securing the data communicated over the internet is an essential play in the digital world. In the vision of digitalizing services with the next generation of security to the sensitive data transmitted over the internet by hiding the existence of the data using next generation cryptography by fusing cryptography techniques is one the major technique adopted. With this the aim in traditional Least Significant Bit (LSB) is one of the widely used technique. Where the secret message or image are placed in the cover image in the least significant bits of RGB Channels resulting in a stego image. But the drawback is, on suspecting the differences in the pixels of original and stegoimage in the secret data embedded can be guessed and extracted by attacker. The Proposed visual crypto-mask steganography method overcomes this drawback and support good payload capacity with multi modal approach of embedding biometrics, resulting in ∞ PSNR. The authenticated person face and fingerprint information is transmitted in a cover image and mask image (magic sheet) using proposed steganography and is combined with Random Visual Crypto Technique. Which results in enhanced and advance visual crypto steganography secured model in communicating sensitive (biometric features) information over the internet. Where the complete information cannot be extracted using only cover image. Mask image (magic sheet) is used along with cover image that reveals the secret data in the receiving end.


2020 ◽  
Vol 6 (2) ◽  
pp. 111-120
Author(s):  
Yulia Fatma ◽  
Afdhil Hafid ◽  
Heru Oktavian Dani

Confidentiality in transfer the messages is an important thing to maintain. Increased security in transfer the messages can be improved using cryptography and steganography. This article aims to apply a combination of AES 128 cryptography and LSB steganography in an application, and measures the quality of the stego-image. In this article, the AES 128 algorithm is used for the encryption process of secret messages and the LSB algorithm for the process of inserting secret messages in the cover image. PSNR is used to measure the quality of the stego-image, by comparing the cover image and the stego-image. This research produces an application that can be used for the security of sending text messages by combining the AES 128 algorithm in the plaintext encryption and the LSB algorithm in the secret message insertion process. In term of measuring the quality of the stego-image, it was found that the character length of the secret message would have an impact on the MSE and PSNR values. This means, the longer the character of the secret message will affect the quality of the stego-image.


2021 ◽  
Vol 39 (1B) ◽  
pp. 231-242
Author(s):  
Sally A. Mahdi ◽  
Maisa’a A. Khodher

Image steganography is the art of hiding data into an image by using the secret key. This paper presents two techniques that combine the most significant bit (MSB) as well as the least significant bit (LSB) based on a color image (24bit for RGB). The presented study proposes a novel method to combine (LSB and MSB) bits based on check MSB values and replace bits from LSB with a secret message. The result of this proposed method that made not affect quality stego -image based on the resulting histogram that shows a match between the cover image and stego- image and more secure because not hidden in all image. The factors were used Mean Square Error (MSE), Compute Payload, in addition to Peak Signal to Noise Ratio (PSNR). The PSNR’s rate is high and MSE is less. The result of this paper when applying on the different image gives high PSNR of 87.141 and less MSE of 0.00012 when inserting message 80 bits and reduction value PSNR of 72.023 and MSE of 0.0040 when inserting message 1200 bits and measure entropy is the same value for cover image and stego –image then this method is more security for the attacker.


Author(s):  
Soo Ann Nie ◽  
Ghazali Sulong ◽  
Rozniza Ali ◽  
Andrew Abel

<span lang="EN-US">Steganography is one of the method to communicate in a hidden way. In another word, steganography literally means the practice of hiding messages or information within another data. Previous studies have proposed various steganography techniques using different approaches including Least Significant Bit (LSB), Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). However, different approaches still have its own weaknesses. Therefore image stenography using Knight Tour Algorithm with Least Significant Bit (LSB) technique is presented. The main objective is to improve the security factor in the stego image. Basically, the proposed technique is divided into two parts which are the sender and receiver side. Then, steganalysis which is a type of attack on stenography algorithm is used to detect the secret message in the cover image by the statistical analysis of pixel values. Chi Square Statistical Attach which is one of the type of steganalysis is used to detect these near-equal Po Vs in images and bases the probability of embedding on how close to equal the even pixel values and their corresponding odd pixel values are in the test image. The Knight Tour Algorithm is applied due to the common Least Significant Bit technique that is weak in security and easily decoded by outsider.</span>


2020 ◽  
Vol 10 (6) ◽  
pp. 1288-1293
Author(s):  
K. N. Madhusudhan ◽  
P. Sakthivel

The image authentication is generally based on two different types of techniques: watermarking and digital signature. In watermarking methods, embedded watermarking is often imperceptible and it contains either a specific ID of producer or codes related to content that are used for authentication. Normally a separate file is stored, digital signature is a non-repudiation and encrypted version of the information extracted from the data. A digital signature can be attached to the data to prove the originality and integrity. The proposed work presents a new approach to steganography of medical images that uses modified Least Significant Bit (LSB) based on the Local Binary Pattern (LBP) pattern. As a first step, cover image has been divided as blocks of 3×3 non overlapping masks. Then, the pixel embedding position (clock wise or anti-clock wise) has to be identified using LBP operator. The value of the LBP operator determines how and where to embed secret image pixel. Later, using LSB method, pixel values will be embedded in the cover image pixel. In order to provide the integrity of the data, the proposed work also presents Reversible Watermarking (RW), a Digital Signature (DS) technique. The proposed algorithm of steganography experimented on few medical images and achieved better efficiency with respect to MSE and PSNR values and same is reported in this paper.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Xinliang Bi ◽  
Xiaoyuan Yang ◽  
Chao Wang ◽  
Jia Liu

Steganography is a technique for publicly transmitting secret information through a cover. Most of the existing steganography algorithms are based on modifying the cover image, generating a stego image that is very similar to the cover image but has different pixel values, or establishing a mapping relationship between the stego image and the secret message. Attackers will discover the existence of secret communications from these modifications or differences. In order to solve this problem, we propose a steganography algorithm ISTNet based on image style transfer, which can convert a cover image into another stego image with a completely different style. We have improved the decoder so that the secret image features can be fused with style features in a variety of sizes to improve the accuracy of secret image extraction. The algorithm has the functions of image steganography and image style transfer at the same time, and the images it generates are both stego images and stylized images. Attackers will pay more attention to the style transfer side of the algorithm, but it is difficult to find the steganography side. Experiments show that our algorithm effectively increases the steganography capacity from 0.06 bpp to 8 bpp, and the generated stylized images are not significantly different from the stylized images on the Internet.


Author(s):  
Arpad Incze

AbstractThis paper contains a brief description of new approach regarding LSB steganography. The novelty of the method resides in the combination of LSB (Least Significant Bits) steganography with some primitives of the pixel-sieve/bit-sieve cryptographic method. In short, we propose to use two or more carrier images and the sieving algorithm, borrowed from the pixel sieve primitive, to determine which carrier image will receive the next set of bits of the secret message. While in classic LSB steganography the secret message must be encrypted prior to embed the information into the carrier image, in our proposal the message is scrambled between the shares in a pseudo random way. An attacker will need all the carrier images and the sieving key in order to reconstruct the original message. Also we recommend an alternative method in which instead of simply replacing the last bit/bits we use them as XOR keys to further enhance the security. Keywords: steganography, cryptography, secret sharing; visual cryptography, LSB.


Author(s):  
Gandharba Swain ◽  
Dodda Ravi Kumar ◽  
Anita Pradhan ◽  
Saroj Kumar Lenka

In this paper we present a technique for secure communication between two parties Alice and Bob. We use both cryptography and steganography. We take image as the carrier to use steganography. By using our own substitution cipher called two square reverse we encrypt the secret information. Then the cipher text of the secret information is embedded into the carrier image in LSB (least significant bit) minus one position of some selected bytes. The byte selection is done depending on the bit pattern of the secret information. Thus the embedding locations are dependent on the secret message. So the intruder will face difficulties to locate the bits. After embedding the resultant image will be sent to the receiver, the receiver will apply the reverse operation what the sender has done and get the secret information.


2018 ◽  
Vol 31 (2) ◽  
pp. 193 ◽  
Author(s):  
Hussein L. Hussein

Concealing the existence of secret hidden message inside a cover object is known as steganography, which is a powerful technique. We can provide a secret communication between sender and receiver using Steganography. In this paper, the main goal is for hiding secret message into the pixels using Least Significant Bit (LSB) of blue sector of the cover image. Therefore, the objective is by mapping technique presenting a model for hiding text in an image. In the model for proposing the secret message, convert text to binary also the covering (image) is divided into its three original colors, Red, Green and Blue (RGB) , use the Blue sector convert it to binary,  hide two bits from the message in  two bits of the least significant bits of blue sector of the image.


Sign in / Sign up

Export Citation Format

Share Document