scholarly journals Concealing a Secret Message in a Colour Image Using an Electronic Workbench

2021 ◽  
pp. 4964-4977
Author(s):  
Maysa Abdel Ali ◽  
Ashwaq Al-Abayji

Steganography is the art of concealing security data in media, such as pictures, audio, video, text, and protocols. The objective of this paper is hiding a secret message in a colour image to prevent an attacker from accessing the message. This is important because more people use the Internet all the time and network connections are spread around the world. The hidden secret message uses two general algorithms that are embedded and extracted. This paper proposes a new algorithm to conceal a secret message in a colour image in LSB. This algorithm includes three phases: 1) dividing the colour image into a number of blocks, 2) concealing the secret message, and 3) transmitting the stego-image from the sender in a multiplexer network and receiving it through a demultiplexer network using an electronic workbench. The outcome of the new algorithm demonstrates good efficiency, high security, and robustness and is executed quickly. The system is evaluated through the measurements of mean square error, peak signal-to-noise ratio, correlation, histogram, and capacity.

Author(s):  
Hussein Abdulameer Abdulkadhim ◽  
Jinan Nsaif Shehab

Although variety in hiding methods used to protect data and information transmitted via channels but still need more robustness and difficulty to improve protection level of the secret messages from hacking or attacking. Moreover, hiding several medias in one media to reduce the transmission time and band of channel is the important task and define as a gain channel. This calls to find other ways to be more complexity in detecting the secret message. Therefore, this paper proposes cryptography/steganography method to hide an audio/voice message (secret message) in two different cover medias: audio and video. This method is use least significant bits (LSB) algorithm combined with 4D grid multi-wing hyper-chaotic (GMWH) system. Shuffling of an audio using key generated by GMWH system and then hiding message using LSB algorithm will provide more difficulty of extracting the original audio by hackers or attackers. According to analyses of obtained results in the receiver using peak signal-to-noise ratio (PSNR)/mean square error (MSE) and sensitivity of encryption key, the proposed method has more security level and robustness. Finally, this work will provide extra security to the mixture base of crypto-steganographic methods.


2020 ◽  
Vol 10 (1) ◽  
pp. 25
Author(s):  
Ranida Pradita ◽  
Ida Nurhaida

Seiring dengan perkembangan teknologi 5G, penyebaran dengan menggunakan video semakin besar dan mudah. Penyebaran informasi baik yang tersembunyi atau tidak semakin mudah disebarluaskan dengan menggunakan internet. Steganografi adalah cara menyembunyikan informasi dalam image atau video. Steganografi berbentuk digital image, text, audio, video, 3D model, dan lain-lain. Media digital yang popularitasnya paling tinggi dalam penelitian algoritma steganografi dengan menggunakan media digital image. Tulisan ini menggunakan media digital video karna media penelitian sebelumnya menggunakan media digital image. Pada tulisan ini akan diulas dan dianalis tentang video steganografi dengan menggunakan metode Egypt, Least Significant Bit (LSB), dan Least Significant Bit (LSB) Fibonacci Edge Pixel. Analisis video steganografi ini bertujuan untuk mendeteksi video yang mengandung unsur pesan rahasia yang kemungkinan untuk pengintaian. Hasil Peak Signal-to-Noise Ratio (PSNR) yang didapat dari penelitian ini rata-rata 40.46 dB dan menghasilkan rata-rata presentase similarity 30.67 %. Rata-rata Mean Square Error (MSE) pada penelitian ini adalah sebesar 0.50657. Untuk metode yang paling optimal yang digunakan dalam video steganografi adalah dengan menggunakan Metode Egypt.


2017 ◽  
Vol 6 (1) ◽  
pp. 15-20
Author(s):  
Megah Mulya ◽  
Zikry Sugiwa

Confidentiality of the message or the information is the most important and essential.  It is very influential on the party who has the valuable message when they want to exchange messages on others.  To keep the message is not known to others, the necessary security on the message.  Steganography is one technique for providing security to the message.  Steganography is a technique to hide messages in a medium, such as pictures, sounds and video.  Steganographic technique used in this study is the Least Significant Braille (LSBraille).  This technique makes use of human vision in the message on the bit value was not significant.  This study focuses on how much resistance level stego image to various image processes and measure results accuracy Peak Signal to Noise Ratio (PSNR).  From the result of the insertion of a secret message, that the level of resistance stego image is not resistant to digital image processing.  The result of the calculation of PSNR value obtained from experiments on all data samples between 51-73 db.


2019 ◽  
Vol 16 (11) ◽  
pp. 4812-4825
Author(s):  
Mohsin N. Srayyih Almaliki

One of the crucial aspects of processes and methodologies in the information and communication technology era is the security of information. The security of information should be a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies which are used, and they include steganography and cryptography. With cryptography, the secret message is converted into unintelligible text, but the existence of the secret message is noticed, nonetheless, steganography involves hiding the secret message in a way that its presence cannot be noticed. In this paper, a new secure image steganography framework which is known as an adaptive stego key LSB (ASK-LSB) framework is proposed. The construction of the proposed framework was carried out in four phases with the aim of improving the data-hiding algorithm in cover images by using capacity, image quality, and security. To achieve this, the Peak Signal-to-Noise Ratio (PSNR) of the steganography framework was maintained. The four phases began with the image preparation phase, followed by the secret message preparation phase, embedding phase and finally extraction phase. The secure image steganography framework that is proposed in this study is based on a new adaptive of least significant bit substitution method, combination random function, and encryption method. In the proposed work, the secret bits are inserted directly or inversely, thereby enhancing the imperceptibility and complexity of the process of embedding. Results from the experiment reveal that the algorithm has better image quality index, peak signal-to-noise ratio, and payload used in the evaluation of the stego image.


In today’s world, confidential information is growing due to various areas of works. Internet is the main area of transmission of digital data, so security must be more considered. Two common ways of providing security is cryptography and steganography. Employing a hybrid of cryptography and steganography enhances the security of data. This paper employs LSB (Least significant Bit) as the steganography algorithm and AES, RSA, DES, 3DES, and Blowfish algorithms as cryptographic algorithms to encrypt a message that should be hidden in a cover image. The results are represented in the form of execution time, PSNR (Peak Signal to Noise Ratio), MSE (Mean Square Error) and the histogram of main and covered image. The experimental results reveal that all the algorithms achieve appropriate quality of stego image. They can be used as cryptographic algorithms to encrypt a message before applying steganography algorithms.


2018 ◽  
Vol 8 (2) ◽  
pp. 109-122
Author(s):  
Hillman Akhyar Damanik ◽  
Merry Anggraeni

Internet adalah media komunikasi paling populer saat ini, tetapi komunikasi melalui internet menghadapi beberapa masalah seperti keamanan data, kontrol hak cipta, kapasitas ukuran data, otentikasi dan lain sebagainya. Pada penelitian ini peneliti memperkenalkan skema untuk menyembunyikan data yang terenkripsi. Dengan menggunakan citra sebagai embedding dan cover image untuk text hiding. Fitur utama skema adalah cara penyematan data teks ke cover image terenkripsi. Peneliti berkonsentrasi menggunakan metode Red-Green-Blue Least Significant Bit (RGB-LSB). Penyematan data teks dan memverifikasi kinerja menggunakan metode RGB-LSB dalam hal indeks kualitas yaitu Peak Signal-to-Noise Ratio (PSNR) dan Mean Square Error (MSE) , imperceptibility dan indeks recovery. Nilai SME pada jumlah pesan yang disisipi sebanyak 407 kata adalah nilai MSE 0.8310 dan nilai PSNR 48.9348. pada jumlah pesan yang disisipi sebanyak 507 kata adalah nilai MSE 0.8322 dan nilai PSNR 48.9285. Nilai kriteria imperceptibility pada stego image menghasilkan image dan nilai-nilai pixel pada masing-masing cover image tidak mengalami perubahan. Aspek recovery pada penyembunyian pesan teks pada masing-masing cover image pada proses embedding, dimensi citra yang berbeda dan sampai proses ekstraksi juga menghasilkan panjang pesan asli terungkap. Berdasarkan hasil perbandingan ini dapat diketahui bahwa algoritma LSB memiliki hasil yang baik pada teknik penyisipan sebuah pesan pada file citra.


2018 ◽  
Vol 8 (2) ◽  
pp. 109
Author(s):  
Hillman Akhyar Damanik ◽  
Merry Anggraeni

<p><strong>Internet adalah media komunikasi paling populer saat ini, tetapi komunikasi melalui internet menghadapi beberapa masalah seperti keamanan data, kontrol hak cipta, kapasitas ukuran data, otentikasi dan lain sebagainya. Pada penelitian ini peneliti memperkenalkan skema untuk menyembunyikan data yang terenkripsi. Dengan menggunakan citra sebagai <em>embedding</em> dan <em>cover image</em> untuk <em>text hiding</em>. Fitur utama skema adalah cara penyematan data teks ke <em>cover image</em> terenkripsi. Peneliti berkonsentrasi menggunakan metode Red-Green-Blue Least Significant Bit (RGB-LSB</strong>).<strong> Penyematan data teks dan memverifikasi kinerja menggunakan metode RGB-LSB dalam hal indeks kualitas yaitu </strong><strong>Peak Signal-to-Noise Ratio (PSNR) dan</strong><em> </em><strong>Mean Square Error<em> </em>(MSE)</strong><strong> </strong><strong>, <em>imperceptibility</em> dan indeks<em> recovery</em>. Nilai SME pada jumlah pesan yang disisipi sebanyak 407 kata adalah nilai MSE 0.8310 dan nilai PSNR 48.9348. pada jumlah pesan yang disisipi sebanyak 507 kata adalah nilai MSE 0.8322 dan nilai PSNR 48.9285. Nilai kriteria <em>imperceptibility</em> pada <em>stego image</em> menghasilkan <em>image</em> dan nilai-nilai <em>pixel </em>pada masing-masing <em>cover image</em> tidak mengalami perubahan. Aspek <em>recovery</em> pada penyembunyian pesan teks pada masing-masing <em>cover image</em> pada proses <em>embedding</em>, dimensi citra yang berbeda dan sampai proses ekstraksi juga menghasilkan panjang pesan asli terungkap. Berdasarkan hasil perbandingan ini dapat diketahui bahwa algoritma LSB memiliki hasil yang baik pada teknik penyisipan sebuah pesan pada file citra.</strong></p>


Author(s):  
Satvir Singh

Steganography is the special art of hidding important and confidential information in appropriate multimedia carrier. It also restrict the detection of  hidden messages. In this paper we proposes steganographic method based on dct and entropy thresholding technique. The steganographic algorithm uses random function in order to select block of the image where the elements of the binary sequence of a secret message will be inserted. Insertion takes place at the lower frequency  AC coefficients of the  block. Before we insert the secret  message. Image under goes dc transformations after insertion of the secret message we apply inverse dc transformations. Secret message will only be inserted into a particular block if  entropy value of that particular block is greater then threshold value of the entropy and if block is selected by the random function. In  Experimental work we calculated the peak signal to noise ratio(PSNR), Absolute difference , Relative entropy. Proposed algorithm give high value of PSNR  and low value of Absolute difference which clearly indicate level of distortion in image due to insertion of secret message is reduced. Also value of  relative entropy is close to zero which clearly indicate proposed algorithm is sufficiently secure. 


Symmetry ◽  
2021 ◽  
Vol 13 (4) ◽  
pp. 717
Author(s):  
Mariia Nazarkevych ◽  
Natalia Kryvinska ◽  
Yaroslav Voznyi

This article presents a new method of image filtering based on a new kind of image processing transformation, particularly the wavelet-Ateb–Gabor transformation, that is a wider basis for Gabor functions. Ateb functions are symmetric functions. The developed type of filtering makes it possible to perform image transformation and to obtain better biometric image recognition results than traditional filters allow. These results are possible due to the construction of various forms and sizes of the curves of the developed functions. Further, the wavelet transformation of Gabor filtering is investigated, and the time spent by the system on the operation is substantiated. The filtration is based on the images taken from NIST Special Database 302, that is publicly available. The reliability of the proposed method of wavelet-Ateb–Gabor filtering is proved by calculating and comparing the values of peak signal-to-noise ratio (PSNR) and mean square error (MSE) between two biometric images, one of which is filtered by the developed filtration method, and the other by the Gabor filter. The time characteristics of this filtering process are studied as well.


Author(s):  
Сергей Клавдиевич Абрамов ◽  
Виктория Валерьевна Абрамова ◽  
Сергей Станиславович Кривенко ◽  
Владимир Васильевич Лукин

The article deals with the analysis of the efficiency and expedience of applying filtering based on the discrete cosine transform (DCT) for one-dimensional signals distorted by white Gaussian noise with a known or a priori estimated variance. It is shown that efficiency varies in wide limits depending upon the input ratio of signal-to-noise and degree of processed signal complexity. It is offered a method for predicting filtering efficiency according to the traditional quantitative criteria as the ratio of mean square error to the variance of additive noise and improvement of the signal-to-noise ratio. Forecasting is performed based on dependences obtained by regression analysis. These dependencies can be described by simple functions of several types parameters of which are determined as the result of least mean square fitting. It is shown that for sufficiently accurate prediction, only one statistical parameter calculated in the DCT domain can be preliminarily evaluated (before filtering), and this parameter can be calculated in a relatively small number of non-overlapping or partially overlapping blocks of standard size (for example, 32 samples). It is analyzed the variations of efficiency criteria variations for a set of realizations; it is studied factors that influence prediction accuracy. It is demonstrated that it is possible to carry out the forecasting of filtering efficiency for several possible values of the DCT-filter parameter used for threshold setting and, then, to recommend the best value for practical use. An example of using such an adaptation procedure for the filter parameter setting for processing the ECG signal that has not been used in the determination of regression dependences is given. As a result of adaptation, the efficiency of filtering can be essentially increased – benefit can reach 0.5-1 dB. An advantage of the proposed procedures of adaptation and prediction is their universality – they can be applied for different types of signals and different ratios of signal-to-noise.


Sign in / Sign up

Export Citation Format

Share Document