scholarly journals Dynamic Steganography Least Significant Bit with Stretch on Pixels Neighborhood

Author(s):  
Muhammad Khoiruddin Harahap ◽  
Nurul Khairina

Background: The confidentiality of a message may at times be compromised. Steganography can hide such a message in certain media. Steganographic media such as digital images have many pixels that can accommodate secret messages. However, the length of secret messages may not match with the number of image pixels so the messages cannot be inserted into the digital images.Objective: This research aims to see the dynamics between an image size and a secret message’s length in order to prevent out of range messages entered in an image.Methods: This research will combine the Least Significant Bit (LSB) method and the Stretch technique in hiding secret messages. The LSB method uses the 8th bit to hide secret messages. The Stretch technique dynamically enlarges the image size according to the length of the secret messages. Images will be enlarged horizontally on the rightmost image pixel block until n blocks of image pixels.Results: This study compares an original image size and a stego image size and examines a secret message’s length that can be accommodated by the stego image, as well as the Mean Square Error and Structure Similarity Index. The test is done by comparing the size change of the original image with the stego image from the Stretch results, where each original image tested always changes dynamically according to the increasing number of secret message characters. From the MSE and SSIM test results, the success was only with the first image, while the second image to the fourth image remained erroneous because they also did not have the same resolution.Conclusion:The combination of LSB steganography and the Stretch technique can enlarge an image automatically according to the number of secret messages to be inserted. For further research development, image stretch must not only be done horizontally but also vertically. 

2020 ◽  
Author(s):  
Reshma V K ◽  
Vinod Kumar R S

Abstract Securing the privacy of the medical information through the image steganography process has gained more research interest nowadays to protect the privacy of the patient. In the existing works, least significant bit (LSB) replacement strategy was most popularly used to hide the sensitive contents. Here, every pixel was replaced for achieving higher privacy, but it increased the complexity. This work introduces a novel pixel prediction scheme-based image steganography to overcome the complexity issues prevailing in the existing works. In the proposed pixel prediction scheme, the support vector neural network (SVNN) classifier is utilized for the construction of a prediction map, which identifies the suitable pixels for the embedding process. Then, in the embedding phase, wavelet coefficients are extracted from the medical image based on discrete wavelet transform (DWT) and embedding strength, and the secret message is embedded into the HL wavelet band. Finally, the secret message is extracted from the medical image on applying the DWT. The experimentation of the proposed pixel prediction scheme is done by utilizing the medical images from the BRATS database. The proposed pixel prediction scheme has achieved high performance with the values of 48.558 dB, 0.50009 and 0.9879 for the peak signal to noise ratio (PSNR), Structural Similarity Index (SSIM) and correlation factor, respectively.


Author(s):  
Ebrahim Alrashed ◽  
Suood Suood Alroomi

Least-Significant-Bit (LSB) is one of the popular and frequently used steganography techniques to hide a secret message in a digital medium. Its popularity is due to its simplicity in implementation and ease of use. However, such simplicity comes with vulnerabilities. An embedded secret message using the traditional LSB insertion is easily decodable when the stego image is suspected to be hiding a secret message.  In this paper, we propose a novel secure and high quality LSB embedding technique. The security of the embedded payload is employed through introducing a novel quadratic embedding sequence. The embedding technique is also text dependent and has non-bounded inputs, making the possibilities of decoding infinite. Due to the exponential growth of and quadratic embedding, a novel cyclic technique is also introduced for the sequence that goes beyond the limits of the cover medium. The proposed method also aims to reduce the noise arising from embedding the secret message by reducing bits changed. This is done by partitioning the cover medium and the secret message into N partitions and artificially creating an assignment problem based on bit change criteria. The assignment problem will be solved using the Hungarian algorithm that will puzzle the secret message partition for an overall least bit change.


Author(s):  
Ratna Astuti Nugrahaeni ◽  
R. Rumani M. R. Rumani M. ◽  
Surya Michrandi Nasution

This journal explains about implementation that combine both cryptography and steganography method for texton cover image to increase the security level. Text will be encrypted with AES algorithm, and then it will be embedded to the cover image using F5 algorithm. The implemented AES algorithm has a good performance, with Avalanche Effect value ranges from 0.43 � 0.59. The resulting image, or stego image, has a very similar histogram with the original image, so there is no significant difference between the two of them. However, the file size change about 1.25 � 3.25 times larger than theoriginal image. If noise or disruption is given to stego image, the information can not be extracted.Keywords: cryptography, steganography, AES, F5


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Steganography can be used to secure secret messages. Steganography works by hiding valuable information in an accommodating medium. The media used is an image. In inserting information into a media, there are several techniques that can be used. The technique used is Least Significant Bit (LSB). It works by manipulating the last bit on each pixel. This bit will be replaced by a row of bits in the information. Each character in the information consists of 8 bits. And each bit will be inserted in each pixel in the image. A character needs 8 pixels to store information. The pixel sequence is RGBRGBRG. This study discusses insertion comparisons if carried out with 1-bit and 2-bit. Both image results will be tested for feasibility. MSE and PSNR will be applied and compared to the original image. MSE and PSNR test results say that 1-bit LSB is superior in terms of the image while 2-bit LSB is superior in terms of information size. For small information, it is better to use 1-bit LSB and large information will be inserted using 2-bit LSB.


2019 ◽  
Vol 8 (2) ◽  
pp. 2360-2365

Discrete Wavelet Transform is the algorithm which can be used to increase the contrast of an image for better visual quality of an image. The histogram value for original image with highest bins is taken for embedding the data into an image to perform the histogram equalization for repeating the process simultaneously. Information can be embedded into the source image with some bit value, for recovering the original image without any loss of the pixels. DWT is the first algorithm which has achieved the image contrast enhancement accurately. This approach maintained the original visual quality of an image even though themessage bits are embedded into the contrast-enhanced images. The proposed work with an original watermarking scheme based on the least significant bit technique. As a substitute of embedding the data into a simple image as watermarking, least significant bitmethod by utilizing the three wavelets transform is applied in the proposed system in order to enhance the embedding technique using spatial domain. For security, the Huffman coding has used to secure the data embedded into a host image, which can convert the secret message sequence into bit sequence for least significant bit operation. DWT can analyze the signal at multiple resolutions and it can divide the image into two types of quadrants as high and low-frequency quadrants. Here dividing an image into low and high it makes the information to hide.


2021 ◽  
Vol 8 (9) ◽  
pp. 373-377
Author(s):  
Alade Oluwaseun. Modupe ◽  
Amusan Elizabeth Adedoyin ◽  
Adedeji Oluyinka Titilayo

Steganography is the art and science of hiding information by embedding data into cover media. Numerous techniques are designed to provide the security for the communication of data over the Internet. A good steganographic algorithm is recognized by the performance of the techniques measured with the support of the performance metrics among which are PSNR, MSE, SSIM, robustness and capacity to hide the information in the cover image. In this paper a comparative analysis of Least Significant Bit (LSB), Most Significant Bit (MSB) and Pixel Value Differencing (PVD) image steganography in grayscale and colored images was performed. Three different cover images was used to hide secret message. A comparative performance analysis of LSB, MSB and PVD methods used in image steganography was performed using peak signal to noise ratio (PSNR), Mean square error (MSE) and Structural Similarity index (SSIM) as performance metrics. LSB technique gives higher PSNR and SSIM values than MSB and PVD method with lower MSE than the other two techniques. Future research can be geared towards investigating the embedding capacity, security, and computational complexity of each technique. Keywords: Least Significant Bit (LSB), Most Significant Bit (MSB), Pixel value differencing (PVD), PSNR, SSIM and MSE,


2021 ◽  
Vol 21 (3) ◽  
pp. 97-107
Author(s):  
Nadia A. Mohsin ◽  
Huda A. Alameen

Abstract In this research a new method for increasing the embedding capacity in images based on the edge area is proposed. The new approach combines Canny and Prewitt edge detection techniques using OR binary operation. The secret message is concealed using the Least Significant Bit (LSB) method. Embedding capacity, PSNR, SSIM, and MSE values are used as evaluation metrics. Based on the resulted values, the proposed method showed higher embedding capacity while keeping the PSNR, SSIM, MSE values without major changes of other methods which means keeping the imperceptibility quality of the stego image.


2020 ◽  
Vol 17 (12) ◽  
pp. 5279-5295
Author(s):  
S. Jahnavi ◽  
C. Nandini

With increase in growth of data and digital threat, demand of securing the data communicated over the internet is an essential play in the digital world. In the vision of digitalizing services with the next generation of security to the sensitive data transmitted over the internet by hiding the existence of the data using next generation cryptography by fusing cryptography techniques is one the major technique adopted. With this the aim in traditional Least Significant Bit (LSB) is one of the widely used technique. Where the secret message or image are placed in the cover image in the least significant bits of RGB Channels resulting in a stego image. But the drawback is, on suspecting the differences in the pixels of original and stegoimage in the secret data embedded can be guessed and extracted by attacker. The Proposed visual crypto-mask steganography method overcomes this drawback and support good payload capacity with multi modal approach of embedding biometrics, resulting in ∞ PSNR. The authenticated person face and fingerprint information is transmitted in a cover image and mask image (magic sheet) using proposed steganography and is combined with Random Visual Crypto Technique. Which results in enhanced and advance visual crypto steganography secured model in communicating sensitive (biometric features) information over the internet. Where the complete information cannot be extracted using only cover image. Mask image (magic sheet) is used along with cover image that reveals the secret data in the receiving end.


2020 ◽  
Vol 5 (2) ◽  
pp. 197-204
Author(s):  
Vera Wati ◽  
Hanifatus Sa’diyah ◽  
Dony Ariyus

The digital image can be one of the media for information security. The contents of information have an important value of effectiveness, one of which is as a support in decision making. Then the information needs to be done to safeguard the authority of parties who are not responsible. Such security can utilize Steganography and Cryptography (Stego-Crypto). The method used combines Stego-Crypto by randomizing information using Cipher Block Chaining (CBC) then the encryption results are secured through digital images. Based on the test results by measuring the capacity of information on the image produces test data if CBC can process characters in uppercase, spaces and other characters and the results of plaintext and ciphertext produce a ratio of 1: 2, but the LSB performance only accommodates characters depending on the number of sizes on digital image. Testing by evaluating the difference in pixel histogram, when viewed with an invisible not very visible difference, but the insertion of messages with 100-200 characters causes the addition of the average image size on stego images larger than 1: 4, the value of 1 from the original image. Besides, testing with the help of communication media, stego images or encrypted images is able to use email to send stego images because LSB is sensitive to the process of resizing images


2019 ◽  
Vol 8 (4) ◽  
pp. 3369-3373

In present world data transfer using the internet is growing. It is very easy and fast way to transfer information like confidential documents, economic transactions, business applications and other covert information over internet. With the advent and growth of internet, people are more concerned about security of information. Data Security is important while data is transferred over internet because any illegal user can access important and private data also make it worthless. Research in data security area will help government agencies, military organization and private companies to securely transmit their confidential data over internet. From past few years various steganography techniques have been developed to hide secret message using various multimedia objects having large amount of redundant data to support steganography. In this paper introduction about steganography, related concepts and implementation of commonly used spatial domain techniques like LSB(Least Significant Bit Technique) with modulus, PVD(Pixel Value Difference) with LSB replacement and adaptive data hiding over edges with LSB are considered. It is observed(while visual, statistical analysis and experiments were carried out) with benchmark cover and stego objects that embedding same amount of secret data in each pixel leads to more visible distortions in a stego image because all pixels do not bear same amount of changes and this effect is more observed in smooth area then edges. Improving stego image imperceptibility and adjusting hiding capacity adaptively are major related research challenges about spatial domain techniques.


Sign in / Sign up

Export Citation Format

Share Document