scholarly journals Least Significant Bit Steganography using Hitzl-Zele Chaotic Map

2017 ◽  
Vol 63 (4) ◽  
pp. 417-422 ◽  
Author(s):  
Krasimir Kordov ◽  
Borislav Stoyanov

Abstract We propose a novel least significant bit steganography algorithm based on a Hitzl-Zele chaotic function. On the first step a pseudorandom generator is constructed for chaotic pixel selection for hiding the secret message. Exact study has been provided on the novel scheme using visual inspection, peak signal-to-noise ratio, and histogram analysis. The experimental data show excellent performance of the novel stego technique.

2019 ◽  
Vol 16 (11) ◽  
pp. 4812-4825
Author(s):  
Mohsin N. Srayyih Almaliki

One of the crucial aspects of processes and methodologies in the information and communication technology era is the security of information. The security of information should be a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies which are used, and they include steganography and cryptography. With cryptography, the secret message is converted into unintelligible text, but the existence of the secret message is noticed, nonetheless, steganography involves hiding the secret message in a way that its presence cannot be noticed. In this paper, a new secure image steganography framework which is known as an adaptive stego key LSB (ASK-LSB) framework is proposed. The construction of the proposed framework was carried out in four phases with the aim of improving the data-hiding algorithm in cover images by using capacity, image quality, and security. To achieve this, the Peak Signal-to-Noise Ratio (PSNR) of the steganography framework was maintained. The four phases began with the image preparation phase, followed by the secret message preparation phase, embedding phase and finally extraction phase. The secure image steganography framework that is proposed in this study is based on a new adaptive of least significant bit substitution method, combination random function, and encryption method. In the proposed work, the secret bits are inserted directly or inversely, thereby enhancing the imperceptibility and complexity of the process of embedding. Results from the experiment reveal that the algorithm has better image quality index, peak signal-to-noise ratio, and payload used in the evaluation of the stego image.


Author(s):  
Satvir Singh

Steganography is the special art of hidding important and confidential information in appropriate multimedia carrier. It also restrict the detection of  hidden messages. In this paper we proposes steganographic method based on dct and entropy thresholding technique. The steganographic algorithm uses random function in order to select block of the image where the elements of the binary sequence of a secret message will be inserted. Insertion takes place at the lower frequency  AC coefficients of the  block. Before we insert the secret  message. Image under goes dc transformations after insertion of the secret message we apply inverse dc transformations. Secret message will only be inserted into a particular block if  entropy value of that particular block is greater then threshold value of the entropy and if block is selected by the random function. In  Experimental work we calculated the peak signal to noise ratio(PSNR), Absolute difference , Relative entropy. Proposed algorithm give high value of PSNR  and low value of Absolute difference which clearly indicate level of distortion in image due to insertion of secret message is reduced. Also value of  relative entropy is close to zero which clearly indicate proposed algorithm is sufficiently secure. 


Author(s):  
Hussein Abdulameer Abdulkadhim ◽  
Jinan Nsaif Shehab

Although variety in hiding methods used to protect data and information transmitted via channels but still need more robustness and difficulty to improve protection level of the secret messages from hacking or attacking. Moreover, hiding several medias in one media to reduce the transmission time and band of channel is the important task and define as a gain channel. This calls to find other ways to be more complexity in detecting the secret message. Therefore, this paper proposes cryptography/steganography method to hide an audio/voice message (secret message) in two different cover medias: audio and video. This method is use least significant bits (LSB) algorithm combined with 4D grid multi-wing hyper-chaotic (GMWH) system. Shuffling of an audio using key generated by GMWH system and then hiding message using LSB algorithm will provide more difficulty of extracting the original audio by hackers or attackers. According to analyses of obtained results in the receiver using peak signal-to-noise ratio (PSNR)/mean square error (MSE) and sensitivity of encryption key, the proposed method has more security level and robustness. Finally, this work will provide extra security to the mixture base of crypto-steganographic methods.


2016 ◽  
Vol 53 (9) ◽  
pp. 090401
Author(s):  
苑智玮 Yuan Zhiwei ◽  
黄树彩 Huang Shucai ◽  
熊志刚 Xiong Zhigang ◽  
唐意东 Tang Yidong

2020 ◽  
Vol 32 (6) ◽  
pp. 1309-1313
Author(s):  
Duggirala Parvatha Venkata Vardhani Devi ◽  
Kapavarapu Maruthi Venkata Narayanarao ◽  
Pulipaka Shyamala ◽  
Rallabhandi Murali Krishna ◽  
Komali Siva Prasad

A new gradient elution mode HPLC method was developed and validated to detect and monitor the novel impurity namely methyl ezitimibe in ezetimibe drug substances. Chromatographic detection and analysis of methyl ezetimibe was performed on XBridge C18 column with mobile phase consisting of 0.02 M phosphate buffer (pH 5) and acetonitrile with 1 mL/min flow rate in gradient elution mode. Methyl ezetimibe was detected and monitored at 248 nm. The calibration curve was linear over range of 0.015 to 0.219% concentration. The limit of detection and quantification were computed as 0.005% (signal to noise ratio 3.60) and 0.015% (signal to noise ratio 15.96), respectively. The precision was 0.97% (%RSD) and accuracy was 93.2 to 98.2% (recovery). The developed method was proved suitable to detect and monitor methyl ezetimibe impurity in ezetimibe drug substances.


2012 ◽  
Vol 263-266 ◽  
pp. 2109-2112
Author(s):  
Jin Zhang ◽  
Ya Jie Mao ◽  
Li Yi Zhang ◽  
Yun Shan Sun

A constraint constant module blind equalization algorithm for medical image based on dimension reduction was proposed. The constant modulus cost function applied to medical image was founded. In order to improve the effect of image restoration, a constraint item was introduced to restrict cost function, and it guarantees that the algorithm converge the optimal solution. Compared to the traditional methods, the novel algorithm improves peak signal to noise ratio and restoration effects. Computer simulations demonstrate the effectiveness of the algorithm.


Author(s):  
KOHEI ARAI

Method for data hiding based on LeGall 5/3 of Cohen-Daubechies-Feauveau: CDF 5/3 wavelet with data compression and random scanning of secret imagery data together with steganography is proposed. Invisibility of secret imagery data is evaluated based on Peak Signal to Noise Ratio: PSNR with SIDBA standard image database. The experimental results show that PSNR of LeGall based wavelet utilized data hiding ranges from 43.82 to 46.9 while that of Daubechies based method ranges from 44.33 to 44.75 when the coded secret imagery data is inserted in the first 3 digits from Least Significant Bit: LSB of the original image. Data compression ratio for the secret imagery data ranges from 1.3 to 19.4 which depends on the complexity of the secret imagery data. Meanwhile, PSNR of data hidden image ranges from 46.83 to 47.41. Consequently, the proposed data hiding method is permissive because PSNR is over 40 dB results in satisfaction on invisibility of the secret imagery data in the data hidden image.


Author(s):  
A. A. Abdelmgeid ◽  
A. A. Bahgat ◽  
Al-Hussien Seddik Saad ◽  
Maha Mohamed Gomaa

Steganography is the art and science of writing hidden messages in such a way that no one suspects the existence of the message, a form of security through obscurity. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. In this paper explains the PIGPEN image steganography technique which modifies the secret message itself not the technique of embedding. This technique represents the secret message characters by two decimal digits only not three decimal digits as ASCII encoding. So, it can save one third of the required space for embedding the message in an image. The PIGPEN technique will be enhanced by using the zigzag scanning to increase the security and achieves higher visual quality as indicated by the high peak signal-to-noise ratio (PSNR) in spite of hiding a large number of secret bits in the image.


Sign in / Sign up

Export Citation Format

Share Document