scholarly journals Analisis Perbandingan Ketahanan Metode Steganografi LSB dan BPCS Menggunakan Metode Steganalisis Binary Similarity Measures

2012 ◽  
Vol 3 (1) ◽  
Author(s):  
Ngurah Agus Sanjaya ER ◽  
I Putu Edy Suardiyana Putra

Abstract. Least significant bit (LSB) and Bit Plane Complexity Segmentation (BPCS) are two of the most commonly used steganoraphy methods. LSB is relatively simple and can be quickly implemented while BPCS offers an advantage in the capacity of storing hidden messages. These two methods are considered good if and only if the hidden messages in each of them are robust from a steganalysis implementation. This research specifically performs the robustness checks for both methods by using the Binary Similarity Measures (BSM). BSM measures the correlations between bits in a bit-plane to detect the message hidden in an image. Our test results show that the larger the size of the message hidden by using the BPCS method, the smaller is its detection probability. On the contrary, the size of the hidden message is directly proportional to its probability of being discovered in the LSB method. Keywords: steganography, Least Significant Bit, Bit Plane Complexity Segmentation, steganalysis, Binary Similarity Measures Abstrak. Least Significant Bit (LSB) dan Bit Plane Complexity Segmentation (BPCS) merupakan dua metode steganografi yang umum digunakan. LSB dapat diimplementasikan secara cepat dan sederhana sedangkan BPCS menawarkan kelebihan dalam penampungan kapasitas pesan rahasia. Agar dapat dikatakan sebagai metode steganografi yang baik maka kedua metode tersebut harus dapat mempertahankan pesan yang disisipkan dari serangan metode steganalisis. Penelitian yang dilakukan bertujuan untuk mengetahui ketahanan dari masing-masing metode menggunakan metode steganalisis Binary Similarity Measures (BSM). BSM mengukur korelasi antar bit-bit dalam suatu bit-plane untuk mengetahui keberadaan pesan pada citra. Hasil penelitian mengungkapkan bahwa semakin besar pesan yang disisipkan pada suatu citra menggunakan metode BPCS, maka kemungkinan terdeteksinya pesan akan berkurang. Hal ini berbanding terbalik dengan metode LSB dimana ukuran pesan yang disisipkan berbanding lurus dengan kemungkinan terdeteksinya pesan tersebut.Kata Kunci: Steganografi, Least Significant Bit, Bit Plane Complexity Segmentation, Steganalisis, Binary Similarity Measures

Author(s):  
Brij B. Gupta ◽  
Somya Rajan Sahoo ◽  
Prashant Chugh ◽  
Vijay Iota ◽  
Anupam Shukla

In global internet usage, increasing multimedia message, which includes video, audio, images, and text documents, on the web raised a lot of consequences related to copyright. For copyright protection, authentication purpose and forgery detection digital watermarking is the robust way in social network content protection. In this technique, the privacy information is embedded inside the multimedia content like image and video. The protected content embedded inside multimedia content is called watermark-enabled information. To make more effective the process of watermarking, the content encrypted before embedding to the image. Basically, the digital watermarking embedded process implemented in two different domains called spatial and frequency domain. In spatial domain digital watermarking, the watermark information is embedded in the least significant bit of the original image on the basis of bit plane selected and on the basis of the pixels of image, embedding, and detection is performed.


2017 ◽  
Vol 18 (8) ◽  
pp. 1082-1107 ◽  
Author(s):  
Rashid Naseem ◽  
Mustafa Bin Mat Deris ◽  
Onaiza Maqbool ◽  
Jing-peng Li ◽  
Sara Shahzad ◽  
...  

Electronics ◽  
2018 ◽  
Vol 7 (11) ◽  
pp. 326 ◽  
Author(s):  
Shouliang Li ◽  
Benshun Yin ◽  
Weikang Ding ◽  
Tongfeng Zhang ◽  
Yide Ma

Considering that a majority of the traditional one-dimensional discrete chaotic maps have disadvantages including a relatively narrow chaotic range, smaller Lyapunov exponents, and excessive periodic windows, a new nonlinearly modulated Logistic map with delay model (NMLD) is proposed. Accordingly, a chaotic map called a first-order Feigenbaum-Logistic NMLD (FL-NMLD) is proposed. Simulation results demonstrate that FL-NMLD has a considerably wider chaotic range, larger Lyapunov exponents, and superior ergodicity compared with existing chaotic maps. Based on FL-NMLD, we propose a new image encryption algorithm that joins the pixel plane and bit-plane shuffle (JPB). The simulation and test results confirm that JPB has higher security than simple pixel-plane encryption and is faster than simple bit-plane encryption. Moreover, it can resist the majority of attacks including statistical and differential attacks.


Author(s):  
İsmail Avcıbaş ◽  
Mehdi Kharrazi ◽  
Nasir Memon ◽  
Bülent Sankur

2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Steganography can be used to secure secret messages. Steganography works by hiding valuable information in an accommodating medium. The media used is an image. In inserting information into a media, there are several techniques that can be used. The technique used is Least Significant Bit (LSB). It works by manipulating the last bit on each pixel. This bit will be replaced by a row of bits in the information. Each character in the information consists of 8 bits. And each bit will be inserted in each pixel in the image. A character needs 8 pixels to store information. The pixel sequence is RGBRGBRG. This study discusses insertion comparisons if carried out with 1-bit and 2-bit. Both image results will be tested for feasibility. MSE and PSNR will be applied and compared to the original image. MSE and PSNR test results say that 1-bit LSB is superior in terms of the image while 2-bit LSB is superior in terms of information size. For small information, it is better to use 1-bit LSB and large information will be inserted using 2-bit LSB.


2021 ◽  
Vol 5 (2) ◽  
pp. 204-213
Author(s):  
Ardhi Fadlika Satria ◽  
◽  
Riza Ibnu Adam ◽  
Carudin Carudin ◽  
◽  
...  

The use of digital platforms has both positive and negative effects. Many criminals who manipulate images for personal gain, so as to harm the copyright holder (ownership) of the image. The purpose of the study was to detect false imagery generated by copy-move, splicing, and retouching techniques. The method used is the Least Significant Bit (LSB) method as a watermarking technique and its detection features. The insertion process is carried out on watermark images into the cover image as the container media. Image owners can authenticate to prove the originality of the image when the extraction process is done, the image manipulation is successfully detected because it is damaged. The test results showed that the digital watermarking technique with the Least Significant-Bit method is able to protect and prove the authenticity of the image. It was concluded that the results of comparison of watermark extraction on the original image and manipulation image saw a very significant difference in terms of visual and calculation with MSE, RMSE, and PSNR parameters.


Sign in / Sign up

Export Citation Format

Share Document