scholarly journals Data Hiding and Retrieval Method Using LSB Substitution Algorithm

Author(s):  
Asoke Nath ◽  
Soham Mondal ◽  
Raj Deb ◽  
Akash Das

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier ?le formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This project hides the message within the image. This project uses LSB Substitution method to hide the secret message inside the image. Sender select the cover image with the secret message ?le (which can be of any format) and hide it into the image, it help to generate the secure stego image. The stego image is sent to the destination with the help of private or public communication network. On the other side the receiver downloads the stego image and using the software retrieve the secret text hidden in the stego image.

Author(s):  
Nisha Manral

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.


Author(s):  
Sakshi Meshram ◽  
Pragati Nimje ◽  
Apeksha Dhengre ◽  
Tanvi Bingewar ◽  
Gauri Shende ◽  
...  

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of stenographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This project intends to give an overview of image steganography, its uses and techniques. It also supports steganography in Audio files. For a more secure approach, the project encrypts the message using secret key and then sends it to the receiver. The receiver then decrypts the message to get the original one.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Xinliang Bi ◽  
Xiaoyuan Yang ◽  
Chao Wang ◽  
Jia Liu

Steganography is a technique for publicly transmitting secret information through a cover. Most of the existing steganography algorithms are based on modifying the cover image, generating a stego image that is very similar to the cover image but has different pixel values, or establishing a mapping relationship between the stego image and the secret message. Attackers will discover the existence of secret communications from these modifications or differences. In order to solve this problem, we propose a steganography algorithm ISTNet based on image style transfer, which can convert a cover image into another stego image with a completely different style. We have improved the decoder so that the secret image features can be fused with style features in a variety of sizes to improve the accuracy of secret image extraction. The algorithm has the functions of image steganography and image style transfer at the same time, and the images it generates are both stego images and stylized images. Attackers will pay more attention to the style transfer side of the algorithm, but it is difficult to find the steganography side. Experiments show that our algorithm effectively increases the steganography capacity from 0.06 bpp to 8 bpp, and the generated stylized images are not significantly different from the stylized images on the Internet.


Author(s):  
Wisam Abed Shukur ◽  
Khalid Kadhim Jabbar

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most efficient and speed. An agents population is used in determining process of a required goals at search space for solving of problem. The (Dev.-PSO) algorithm is applied to different images; the number of an image which used in the experiments in this paper is three. For all used images, the Peak Signal to Noise Ratio (PSNR) value is computed. Finally, the PSNR value of the stego-A that obtained from blue sub-band colo is equal (44.87) dB, while the stego-B is equal (44.45) dB, and the PSNR value for the stego-C is (43.97)dB, while the vlue of MSE that obtained from the same color sub-bans is (0.00989), stego-B equal to (0.01869), and stego-C is (0.02041). Furthermore, our proposed method has ability to survive the quality for the stego image befor and after hiding stage or under intended attack that used in the existing paper such as Gaussian noise, and salt &amp; pepper noise.</p>


The goal of watermarking or steganography is not to restrict access to the original image, to ensure that embedded data remain recoverable. Digital watermarking is a technique providing embedded secure information in images, digital watermarking is the process of inserting data into an image in a way that it can be used to make an assertion about the image. But the proposed system studies a comprehensive approach of embedding secret information inside the video. A hybrid video steganographic scheme based on Framelet transform (FT) with Principal Component Analysis (PCA) is introduced. The main purpose of using PCA is to reduce correlation among wavelet coefficients from wavelet decomposition of each video frame. Using this decomposition, the secret message can be dispersed into the uncorrelated coefficients. Framelet transform helps to decompose video file into several frames. The secret message is embedded inside the principal components of low frequency wavelet coefficients. Achieving high bit rate data embedding is the main task. The proposed system is robust against numerous attacks like geometric attack, filtering, contrast adjustment. After embedding the secret information , (2,2_VSSS) as Visual cryptographic encryption is implemented to maintain the secrecy of this information against hackers.The main aim of this study is to obtain impercibility which is the human eye may not be able to detect differences between the original video and reconstructed image. Even after embedding, the quality of the stego image is good, which is proved by achieving better a PSNR value, and the stego image does not give much variation irrespective of different imaging conditions in the proposed VDWT mechanism. The proposed method achieves high PSNR than the existing methods, and nominal computational time is achieved for retrieving the secret information


Author(s):  
Usha B. A.

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exist a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points.. As embedding data in an image, is independent of one another. Parallelism can be used to achieve considerable time gain. nography, although it has made communication safe, it has its own drawbacks. One among it is time required to embed data in pixels of the image. This problem is bugging computer scientists from long time. This paper discusses a method which makes OpenMP parallel library to parallelize embedding of data, which basically reduces the time by almost fifty percent and to achieve PSNR ranging from 30 to 50 after embedding data in the pixels of the image.


Author(s):  
Kemal Tütüncü ◽  
Özcan Çataltaş

This study proposes a new hybrid n-LSB (Least Significant Bit) substitution-based image steganography method in the spatial plane. The previously proposed n-LSB substitution method by authors of this paper is combined with the Rivest-Shamir-Adleman (RSA), RC5, and Data Encryption Standard (DES) encryption algorithms to improve the security of the steganography, which is one of the requirements of steganography, and the Lempel-Ziv-Welch (LZW), Arithmetic and Deflate lossless compression algorithms to increase the secret message capacity. Also, embedding was done randomly using a logistic map-based chaos generator to increase the security more. The classical n-LSB substitution method and the proposed hybrid approaches based on the previously proposed n-LSB were implemented using different secret messages and cover images. When the results were examined, it has been seen that the proposed hybrid n-LSB approach showed improvement in all three criteria of steganography. The proposed hybrid approach that consists of previously proposed n-LSB, RSA, Deflate, and the logistic map had the best results regarding capacity, security, and imperceptibility.


2020 ◽  
Vol 17 (12) ◽  
pp. 5279-5295
Author(s):  
S. Jahnavi ◽  
C. Nandini

With increase in growth of data and digital threat, demand of securing the data communicated over the internet is an essential play in the digital world. In the vision of digitalizing services with the next generation of security to the sensitive data transmitted over the internet by hiding the existence of the data using next generation cryptography by fusing cryptography techniques is one the major technique adopted. With this the aim in traditional Least Significant Bit (LSB) is one of the widely used technique. Where the secret message or image are placed in the cover image in the least significant bits of RGB Channels resulting in a stego image. But the drawback is, on suspecting the differences in the pixels of original and stegoimage in the secret data embedded can be guessed and extracted by attacker. The Proposed visual crypto-mask steganography method overcomes this drawback and support good payload capacity with multi modal approach of embedding biometrics, resulting in ∞ PSNR. The authenticated person face and fingerprint information is transmitted in a cover image and mask image (magic sheet) using proposed steganography and is combined with Random Visual Crypto Technique. Which results in enhanced and advance visual crypto steganography secured model in communicating sensitive (biometric features) information over the internet. Where the complete information cannot be extracted using only cover image. Mask image (magic sheet) is used along with cover image that reveals the secret data in the receiving end.


2022 ◽  
pp. 152-164
Author(s):  
Eimad Abdu Abusham ◽  
Aiysha Ali Majid Al-Marzouqi ◽  
Mahmood Al-Bahri ◽  
Maryam G. Aljabri

The use of digital images has become very common because of the rapid increase of the internet over time. Moving digital images over the internet is easy, but keeping ownership is complex, and serious issues have emerged. Forgery, fraud, and pirating of this content are rising. Different techniques used to protect images, like watermarking and steganography, but these methods are not enough toprotect. So, providing new techniques is essential for protecting image ownership. We have proposed a fusion method of steganography and watermarking in this work. First, the secret message is encoded within the original image using the LSB technique to obtain the stego image. Secondly, the watermarking process is applied on the stego image using text watermarking or image watermarking to provide stego-watermarked-image. The proposed fusion watermarking and steganography method is very useful for protecting image ownership over insecure communication channels. An attacker cannot get the desired watermarked image from the stego-watermarked-image without knowing the secret message hiding inside it using the LSB technique. The proposed method is efficient, simple and secure; it provides significant protection for image ownership.


GIS Business ◽  
2019 ◽  
Vol 14 (6) ◽  
pp. 656-666
Author(s):  
Dr. Entisar Al-Obaidi

Media refers to the channels of communication through which we distribute news, education, movies, music, advertising messages and other information. It includes physical and online newspapers and magazines, television, radio, telephone, the Internet, fax and billboards, are a dominant force in lives of children. Although television is remaining the predominant medium for children and adolescents, the new technologies are become more popular. We have to concern about the potential harmful effects of media "messages and images"; however, the positive and negative effects of media should be recognized. Parents have to establish the plan for all media in family home. Media that are influences on children should be recognized by "schools, policymakers, product advertisers, and entertainment producers".


Sign in / Sign up

Export Citation Format

Share Document