scholarly journals Analysis of Least Significant Bit Method Using Sequential Encoding-Decoding in Steganography Digital Image

Author(s):  
Nurmi Hidayasari ◽  
Febi Yanto

The method of steganography commonly used to hide data or information is Least Significant Bit (LSB) method. One of the relevant research is LSB using sequential Encoding - Decoding by David Pipkorn and Preston Weisbrot. In this research, an analysis of the LSB method using Sequential Encoding - Decoding by doing some testing. The tests are on the aspect of message security using tools StegSpy and enhanced LSB algorithm, testing on image quality by calculating the Peak Signal to Noise Ratio (PSNR) value and see the image histogram, testing on robustness of message by doing some image processing operations on stego image, like cropping, rotating, and etc, and then testing on capacity to check size of cover image and stego image and calculates the maximum size of data that can be hidden. From the testing process, we know that there are deficiencies in the aspects of security, robustness and capacity of a message. And then in this research we try to change the location of messages that are hidden in the image bits, which previous research used the 8th bit of each bytes, changed to the 7th bit. To be able to correct deficiencies in the security aspect. After repairing and testing like before, obtained better results in the security aspect. This can be seen from the image of the enhanced LSB algorithm process, the message is not detected, but unfortunately the image quality is reduced, with the low PSNR value generated.

2019 ◽  
Vol 16 (11) ◽  
pp. 4812-4825
Author(s):  
Mohsin N. Srayyih Almaliki

One of the crucial aspects of processes and methodologies in the information and communication technology era is the security of information. The security of information should be a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies which are used, and they include steganography and cryptography. With cryptography, the secret message is converted into unintelligible text, but the existence of the secret message is noticed, nonetheless, steganography involves hiding the secret message in a way that its presence cannot be noticed. In this paper, a new secure image steganography framework which is known as an adaptive stego key LSB (ASK-LSB) framework is proposed. The construction of the proposed framework was carried out in four phases with the aim of improving the data-hiding algorithm in cover images by using capacity, image quality, and security. To achieve this, the Peak Signal-to-Noise Ratio (PSNR) of the steganography framework was maintained. The four phases began with the image preparation phase, followed by the secret message preparation phase, embedding phase and finally extraction phase. The secure image steganography framework that is proposed in this study is based on a new adaptive of least significant bit substitution method, combination random function, and encryption method. In the proposed work, the secret bits are inserted directly or inversely, thereby enhancing the imperceptibility and complexity of the process of embedding. Results from the experiment reveal that the algorithm has better image quality index, peak signal-to-noise ratio, and payload used in the evaluation of the stego image.


2020 ◽  
Vol 39 (3) ◽  
pp. 2977-2990
Author(s):  
R. Anushiadevi ◽  
Padmapriya Praveenkumar ◽  
John Bosco Balaguru Rayappan ◽  
Rengarajan Amirtharajan

Digital image steganography algorithms usually suffer from a lossy restoration of the cover content after extraction of a secret message. When a cover object and confidential information are both utilised, the reversible property of the cover is inevitable. With this objective, several reversible data hiding (RDH) algorithms are available in the literature. Conversely, because both are diametrically related parameters, existing RDH algorithms focus on either a good embedding capacity (EC) or better stego-image quality. In this paper, a pixel expansion reversible data hiding (PE-RDH) method with a high EC and good stego-image quality are proposed. The proposed PE-RDH method was based on three typical RDH schemes, namely difference expansion, histogram shifting, and pixel value ordering. The PE-RDH method has an average EC of 0.75 bpp, with an average peak signal-to-noise ratio (PSNR) of 30.89 dB. It offers 100% recovery of the original image and confidential hidden messages. To protect secret as well as cover the proposed PE-RDH is also implemented on the encrypted image by using homomorphic encryption. The strength of the proposed method on the encrypted image was verified based on a comparison with several existing methods, and the approach achieved better results than these methods in terms of its EC, location map size and imperceptibility of directly decrypted images.


2017 ◽  
Vol 28 (5) ◽  
pp. 749-758 ◽  
Author(s):  
Vijay Kumar ◽  
Dinesh Kumar

Abstract Steganography is the foremost influential approach to hide data. Images serve as the most appropriate cover media for steganography. This paper intends to do a performance evaluation of color images and its comparison with the recently proposed approaches, using the modified technique already proposed for grayscale images, by the authors. This approach hides large data in color image using the blocking concept. The blocking process is applied on approximation coefficients of secret image and detail coefficients of red, green and blue components of cover image. The blocks of detail coefficients are replaced with approximation coefficients of secret image using root mean square error method. The key is used to store the position of best matching blocks. It is being predicated that the work will be able to hide large data in a single image. The stego image (ST) has better visual quality based on the peak signal to noise ratio values.


2019 ◽  
Vol 17 (1) ◽  
pp. 73
Author(s):  
Albert Christie Giovani ◽  
Yustina Retno Wahyu Utami ◽  
Teguh Susyanto

The development of internet has become one of the most popular data communication media. The ease of use and complete facilities are the advantages possessed by the internet. However, along with the development of internet media and applications that use the Internet,  crime on information system increases as well. With various illegal information-gathering techniques developing, many are trying to access information that is not their right. There are several security techniques for sending messages confidentially and securedly, one of which is known as steganography. This study combined steganography and cryptography. The message was encrypted first using base64 then inserted using the LSB Crossed method. This method was aimed at making the process of extracting messages by unauthorized ones not easy. Embedding message into images was using the last binary number of the RGB value of an image by randomizing the placement of binary numbers by integrating base64 coding so that it combined base64 messages which next the text messages would be encrypted. The measurement results in the stego image using PSNR (Peak Signal to Noise Ratio) showed that the image quality after the insertion process was > 50 db


2018 ◽  
Vol 3 (1) ◽  
pp. 27-32
Author(s):  
Tika Erna Putri ◽  
Muhammad Rifqi Al Fauzan ◽  
Prima Asmara Sejati

Security issues have become major problem in the field of data communications, specifically in the data transmission through the internet. One of the solutions is to hide the messages through a digital media so the attention of the attacker or third party can be avoided, this method is known as steganography. In this research, we use images as digital media. We modify the Least Significant Bit (LSB) which is the most commonly used technique in steganography. Unfortunately LSB has poor security level since it is already widely known technique. Therefore, it is important to modify the algorithm of LSB to ensure its security aspect. An improvement to LSB technique is suggested by selecting only odd pixels and ignoring even pixels in the implementation of steganography. We successfully implement the modified LSB algorithm by using RBG image and grayscale image as steganography media. Mean Squared Error (MSE) and Peak Signal-to-noise Ratio (PSNR) are employed to evaluate the stego-image quality. Our calculations show that the modified LSB algorithm provides better results than the conventional LSB. The conventional LSB algorithm gives 1.98 10-5 for MSE and 95.20893 dB for PSNR calculations, while the modified LSB gives 1. 80 10-5 and 95.6101 dB for MSE and PSNR, respectively.


2014 ◽  
Vol 23 (4) ◽  
pp. 451-459 ◽  
Author(s):  
Ali M. Ahmad ◽  
Ghazali Sulong ◽  
Amjad Rehman ◽  
Mohammed Hazim Alkawaz ◽  
Tanzila Saba

AbstractThe rapid growth of covert activities via communications network brought about an increasing need to provide an efficient method for data hiding to protect secret information from malicious attacks. One of the options is to combine two approaches, namely steganography and compression. However, its performance heavily relies on three major factors, payload, imperceptibility, and robustness, which are always in trade-offs. Thus, this study aims to hide a large amount of secret message inside a grayscale host image without sacrificing its quality and robustness. To realize the goal, a new two-tier data hiding technique is proposed that integrates an improved exploiting modification direction (EMD) method and Huffman coding. First, a secret message of an arbitrary plain text of characters is compressed and transformed into streams of bits; each character is compressed into a maximum of 5 bits per stream. The stream is then divided into two parts of different sizes of 3 and 2 bits. Subsequently, each part is transformed into its decimal value, which serves as a secret code. Second, a cover image is partitioned into groups of 5 pixels based on the original EMD method. Then, an enhancement is introduced by dividing the group into two parts, namely k1 and k2, which consist of 3 and 2 pixels, respectively. Furthermore, several groups are randomly selected for embedding purposes to increase the security. Then, for each selected group, each part is embedded with its corresponding secret code by modifying one grayscale value at most to hide the code in a (2ki + 1)-ary notational system. The process is repeated until a stego-image is eventually produced. Finally, the χ2 test, which is considered one of the most severe attacks, is applied against the stego-image to evaluate the performance of the proposed method in terms of its robustness. The test revealed that the proposed method is more robust than both least significant bit embedding and the original EMD. Additionally, in terms of imperceptibility and capacity, the experimental results have also shown that the proposed method outperformed both the well-known methods, namely original EMD and optimized EMD, with a peak signal-to-noise ratio of 55.92 dB and payload of 52,428 bytes.


2018 ◽  
Vol 7 (2.5) ◽  
pp. 119
Author(s):  
Erick Fitra Wijayanto ◽  
Muhammad Zarlis ◽  
Zakarias Situmorang

There are many research has done a hybridization approach of text message insertion that has been compressed with Lempel-Ziv-Welch (LZW) algorithm and has also been encrypted. The text messages in ciphertext form are inserted into the image file using LSB (Least Significant Bit) method. The results of this study indicate that the value of Peak Signal to Noise Ratio (PSNR) lower than the LSB method of 0.94 times with a ratio of 20.33%, with Kekre's method of 10.04%. To improve the value of PSNR stego image of insertion, in this research is inserted audio samples using 5 bits to reduce the amount of data insertion, so it can get the value of MSE stego image low. Prior to insertion, the text file is compressed with the Lempel-Ziv-Welch (LZW) algorithm and encrypted with the Advanced Encryption Standard (AES) algorithm. Then, the insertion of compression and encrypted text files is done with the Modified Least Significant Bit (MLSB) algorithm. To performa test reliability of steganography, the image stego image is done by calculating Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). At extraction process with MLSB algorithm, decryption with AES algorithm and decompression with LZW algorithm. The experimental results show that the MSE values obtained are lower and the proposed PSNR method is better with (α) 1,044 times than the Kaur method, et al. The result of embed text file extraction from the stego image works well resulting in encrypted and uncompressed text files.  


2019 ◽  
Vol 5 (2) ◽  
pp. 137-146
Author(s):  
Andre Hernandes ◽  
Hartini Hartini ◽  
Dewi Sartika

Steganografi merupakan sebuah cara yang digunakan untuk menyembunyi-kan pesan rahasia dari orang yang tidak berhak mengetahuinya. Pada penelitian ini penulis menggunakan salah satu metode steganografi yaitu metode least significant bit (LSB) untuk menyisipkan bit-bit pesan rahasia berupa teks kedalam citra digital RGB berekstensi file bitmap, dengan cara menggabungkan metode LSB dan linear congruential generator (LCG) untuk membangkitkan bilangan acak dari posisi pixel yang akan disisipkan pesan rahasia. Hasil dari penelitian ini penulis berhasil membangun aplikasi steganografi dengan bahasa pemrograman java dan menguji kualitas stego image yang menghasilkan nilai rata-rata Peak Signal to Noise Ratio (PSNR) yang mencapai 51 dB. Dari penilaian ini, disimpulkan bahwa stego image yang dihasilkan dalam kualitas baik dan tidak mengalami perubahan yang signifikan.


2020 ◽  
Vol 7 (1) ◽  
Author(s):  
Ibnu Utomo Wahyu Mulyono ◽  
Ajib Susanto ◽  
Muhamad Rizky Fajar Febrian ◽  
Ghaitsa Ardelia Rosyida

The maximum value obtained to test the encrypt hill cipher uses the avalanche effect with modification of one, two, three, and four key matrices 35.71%, therefore an additional security technique is needed. The Least Significant Bit (LSB) method is used to insert the ciphertext that has been generated from the hill cipher algorithm, has been testing using RGB, CMY, CMYK and YUV shapes with 6142 characters in 128 x 128 character images producing the highest PSNR value of 51.2826 dB in CMYK images. Steganography technique is applied because it has advantages in terms of imperceptibility, for example the results of a stego image are so similar to the original image that it is difficult to be distinguished by the human senses. Tests were carried out with 10 images, five images measuring 512 x 512 and five images measuring 16 x 16. While the messages to be inserted were 240, 480, and 960 characters for images measuring 512 x 512 and 24, 48 and 88 characters for images measuring 16 x16. Test results that I have done are calculated using Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) with a minimum PSNR of 51.2907 dB which means the resulting image is quite good. Computation time is calculated using tic toc on Matlab by encrypting 2000 and 6000 characters, and also computation time.


In today’s world, confidential information is growing due to various areas of works. Internet is the main area of transmission of digital data, so security must be more considered. Two common ways of providing security is cryptography and steganography. Employing a hybrid of cryptography and steganography enhances the security of data. This paper employs LSB (Least significant Bit) as the steganography algorithm and AES, RSA, DES, 3DES, and Blowfish algorithms as cryptographic algorithms to encrypt a message that should be hidden in a cover image. The results are represented in the form of execution time, PSNR (Peak Signal to Noise Ratio), MSE (Mean Square Error) and the histogram of main and covered image. The experimental results reveal that all the algorithms achieve appropriate quality of stego image. They can be used as cryptographic algorithms to encrypt a message before applying steganography algorithms.


Sign in / Sign up

Export Citation Format

Share Document