scholarly journals Notice of Retraction Digital Image Steganography Using Bit Flipping

Author(s):  
Aditya Kumar Sahu ◽  
Gandharba Swain

<p><strong>Notice of Retraction</strong><br /><br />-----------------------------------------------------------------------<br />After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IAES's Publication Principles.<br /><br />We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.<br /><br />The presenting author of this paper has the option to appeal this decision by contacting [email protected].<br /><br />-----------------------------------------------------------------------</p><p>This article proposes bit flipping method to conceal secret data in the original image. Here a section consists of 2 pixels and there by flipping one or two LSBs of the pixels to hide secret information in it. It exists in 2 variants. The variant-1 and variant-2 both use 7<sup>th</sup> and 8<sup>th</sup> bit to conceal the secret data. Variant-1 hides 3 bits per a pair of pixels and the variant-2 hides 4 bits per a pair of pixels. Our proposed method notably raises the capacity as well as bits per pixel that can be hidden in the image compared to existing bit flipping method. The image steganographic parameters such as, peak signal to noise ratio (PSNR), hiding capacity, and the quality index of the proposed techniques has been compared with the existing bit flipping technique</p>

2018 ◽  
Vol 18 (1) ◽  
pp. 69-80 ◽  
Author(s):  
Aditya Kumar Sahu ◽  
Gandharba Swain ◽  
E. Suresh Babu

Abstract This article proposes bit flipping method to conceal secret data in the original image. Here a block consists of 2 pixels and thereby flipping one or two LSBs of the pixels to hide secret information in it. It exists in two variants. Variant-1 and Variant-2 both use 7th and 8th bit of a pixel to conceal the secret data. Variant-1 hides 3 bits per a pair of pixels and the Variant-2 hides 4 bits per a pair of pixels. Our proposed method notably raises the capacity as well as bits per pixel that can be hidden in the image compared to existing bit flipping method. The image steganographic parameters such as, Peak Signal to Noise Ratio (PSNR), hiding capacity, and the Quality Index (Q.I) of the proposed techniques has been compared with the results of the existing bit flipping technique and some of the state of art article.


Author(s):  
Noor Alhuda F. Abbas ◽  
Nida Abdulredha ◽  
Raed Khalid Ibrahim ◽  
Adnan Hussein Ali

Information security is one of the main aspects of processes and methodologies in the technical age of information and communication. The security of information should be a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies that are used, and they include steganography and cryptography. An effective digital image-steganographic method based on odd/even pixel allocation and random function to increase the security and imperceptibility has been improved. This lately developed outline has been verified for increasing the security and imperceptibility to determine the existent problems. Huffman coding has been used to modify secret data prior embedding stage; this modified equivalent secret data that prevent the secret data from attackers to increase the secret data capacities. The main objective of our scheme is to boost the peak-signal-to-noise-ratio (PSNR) of the stego cover and stop against any attack. The size of the secret data also increases. The results confirm good PSNR values in addition of these findings confirmed the proposed method eligibility.


Author(s):  
Ashwaq Alabaichi ◽  
Maisa'a Abid Ali K. Al-Dabbas ◽  
Adnan Salih

In steganography, secret data are invisible in cover media, such as text, audio, video and image. Hence, attackers have no knowledge of the original message contained in the media or which algorithm is used to embed or extract such message. Image steganography is a branch of steganography in which secret data are hidden in host images. In this study, image steganography using least significant bit and secret map techniques is performed by applying 3D chaotic maps, namely, 3D Chebyshev and 3D logistic maps, to obtain high security. This technique is based on the concept of performing random insertion and selecting a pixel from a host image. The proposed algorithm is comprehensively evaluated on the basis of different criteria, such as correlation coefficient, information entropy, homogeneity, contrast, image, histogram, key sensitivity, hiding capacity, quality index, mean square error (MSE), peak signal-to-noise ratio (PSNR) and image fidelity. Results show that the proposed algorithm satisfies all the aforementioned criteria and is superior to other previous methods. Hence, it is efficient in hiding secret data and preserving the good visual quality of stego images. The proposed algorithm is resistant to different attacks, such as differential and statistical attacks, and yields good results in terms of key sensitivity, hiding capacity, quality index, MSE, PSNR and image fidelity.


2021 ◽  
Vol 50 (2) ◽  
pp. 264-283
Author(s):  
Ali Durdu

In this study, a new reversible image steganography method based on Red-Green-Blue (RGB) which hides thecolored image into the colored images in two layers nested is proposed. The proposed method hides the 24-bitimage to be hidden by hiding two layers of data firstly in the resized version of the cover image with the LSBmethod, and then hides the resized cover image to the original cover image with the 4-bit method. The proposedmethod offers a secure communication environment as it hides the hidden image in two layers. When thirdparties extract data by using the LSB method, they only access the resized version of the cover image. The 4-bitmethod divides the image to be hidden into 8-bit segments. While the first 4 bits, which are the most importantbits of 8-bit data, are hidden directly, 4 bits that can be neglected with less significance are completed by roundingat approximate value through the method function. In this way, since the 8-bit data is reduced to 4-bits, themethod performs lossy hiding, but doubles the hiding capacity. Peak signal to noise ratio (PSNR), structuralsimilarity quality criterion (SSIM) and chi-square steganalysis method, which are frequently used in the literature,are used to measure the immunity level of the proposed method. When it is concealed at the same ratewith the LSB method and the proposed method, a higher measurement value is obtained in the PSNR imagecriterion, which is 1.2 dB, SSIM 0.0025, BER 0.0129 and NCC image criterion 0.00027. In additional, it wasshown that the proposed method achieved more successful results in chi-square steganalysis and histogramtests compared to the traditional LSB method.


2019 ◽  
Vol 8 (4) ◽  
pp. 11473-11478

In recent days, for sending secret messages, we require secure internet. Image steganography is considered as the eminent tool for data hiding which provides better security for the data transmitted over internet. In the proposed work, the payload data is embedded using improved LSB-mapping technique. In this approach, two bits from each pixel of carrier image are considered for mapping and addition. Two bits of payload data can be embedded in one cover image pixel hence enhanced the hiding capacity. A logical function on addition is applied on 1st and 2nd bits of cover image pixel, and a mapping table is constructed which gives solution for data hiding and extraction. Simple addition function on stego pixel is performed to extract payload data hence increases the recovery speed. Here the secret data is not directly embedded but instead mapped and added with a number using modulo-4 strategy. Hence the payload data hidden using proposed approach provide more security and it can resist against regular LSB decoding approaches. The proposed work is implemented and tested for several gray scale as well as color images and compared with respect to parameters like peak signal to noise ratio and MSE. The proposed technique gives better results when compared and histogram of cover and stego images are also compared.


2020 ◽  
Vol 10 (9) ◽  
pp. 2247-2251
Author(s):  
Yuan Li ◽  
Zili Xu ◽  
Xiangyang Liu ◽  
G. Sasi ◽  
M. Sundar Prakash Balaji ◽  
...  

The contouring effects appear when an image is quantized rudely irrespective of the uniform or non-uniform quantization. To mitigate the effects of contouring, a small amount of random noise is added (dithered) to the original image before quantization. Techniques such as dithering and half-toning are widely used strategies in obtaining images and texts in magazines, newspapers, books, printers, computer monitors, and LCDs. This study explores the dithering technique on a broken foot image with more elaborative methods and results. All the experiments involved in this study, such as quantization, dithering, no dithering, and dithering, quantized, and filtered techniques, are conducted using the Matlab R2016b tool. Overall information and details are retained with the aid of lowpass filtering and highpass filtering, respectively. Simulation results such as Mean Square Error (MSE) and Peak Signal-to-Noise Ratio (PSNR) are obtained in every stage of the dithering procedure to analyze and compare the performance or accuracy.


2020 ◽  
Vol 8 (1) ◽  
pp. 95
Author(s):  
Yazen A. Khaleel

A new technique of hiding a speech signal clip inside a digital color image is proposed in this paper to improve steganography security and loading capacity. The suggested technique of image steganography is achieved using both spatial and cepstral domains, where the Mel-frequency cepstral coefficients (MFCCs) are adopted, as very efficient features of the speech signal. The presented technique in this paper contributes to improving the image steganography features through two approaches. First is to support the hiding capacity by the usage of the extracted MFCCs features and pitches extracted from the speech signal and embed them inside the cover color image rather than directly hiding the whole samples of the digitized speech signal. Second is to improve the data security by hiding the secret data (MFCCs features) anywhere in the host image rather than directly using the least significant bits substitution of the cover image. At the recovering side, the proposed approach recovers these hidden features and using them to reconstruct the speech waveform again by inverting the steps of MFCCs extraction to recover an approximated vocal tract response and combine it with recovered pitch based excitation signal. The results show a peak signal to noise ratio of 52.4 dB of the stego-image, which reflect a very good quality and a reduction ratio of embedded data to about (6%–25%). In addition, the results show a speech reconstruction degree of about 94.24% correlation with the original speech signal.


2020 ◽  
Vol 4 (2) ◽  
pp. 53-60
Author(s):  
Latifah Listyalina ◽  
Yudianingsih Yudianingsih ◽  
Dhimas Arief Dharmawan

Image processing is a technical term useful for modifying images in various ways. In medicine, image processing has a vital role. One example of images in the medical world, namely retinal images, can be obtained from a fundus camera. The retina image is useful in the detection of diabetic retinopathy. In general, direct observation of diabetic retinopathy is conducted by a doctor on the retinal image. The weakness of this method is the slow handling of the disease. For this reason, a computer system is required to help doctors detect diabetes retinopathy quickly and accurately. This system involves a series of digital image processing techniques that can process retinal images into good quality images. In this research, a method to improve the quality of retinal images was designed by comparing the methods for adjusting histogram equalization, contrast stretching, and increasing brightness. The performance of the three methods was evaluated using Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), and Signal to Noise Ratio (SNR). Low MSE values and high PSNR and SNR values indicated that the image had good quality. The results of the study revealed that the image was the best to use, as evidenced by the lowest MSE values and the highest SNR and PSNR values compared to other techniques. It indicated that adaptive histogram equalization techniques could improve image quality while maintaining its information.


The research constitutes a distinctive technique of steganography of image. The procedure used for the study is Fractional Random Wavelet Transform (FRWT). The contrast between wavelet transform and the aforementioned FRWT is that it comprises of all the benefits and features of the wavelet transform but with additional highlights like randomness and partial fractional value put up into it. As a consequence of the fractional value and the randomness, the algorithm will give power and a rise in the surveillance layers for steganography. The stegano image will be acquired after administrating the algorithm which contains not only the coated image but also the concealed image. Despite the overlapping of two images, any diminution in the grade of the image is not perceived. Through this steganographic process, we endeavor for expansion in surveillance and magnitude as well. After running the algorithm, various variables like Mean Square Error (MSE) and Peak Signal to Noise ratio (PSNR) are deliberated. Through the intended algorithm, a rise in the power and imperceptibility is perceived and it can also support diverse modification such as scaling, translation and rotation with algorithms which previously prevailed. The irrefutable outcome demonstrated that the algorithm which is being suggested is indeed efficacious.


Sign in / Sign up

Export Citation Format

Share Document