scholarly journals Using of JPEG image as a cover media for text hiding

2019 ◽  
Vol 17 (71) ◽  
pp. 1-12
Author(s):  
Naseef Husam Mohammad ◽  
Ahmed Abdul-latief Mohammed

This paper, will overview the use of data hiding techniques in JPEG digital image file format. In particular, will describe how one can use Steganography to hide information in a JPEG digital image. This research will review of hiding data by using Least Significant Bit (LSB) as a method, and hiding a text (document) in a JPEG image as a media cover. This paper was implemented by using matlab to complete hiding data. Data hiding is a technique that is used to embed secret information into a cover media. However, the transmitted images may be compressed or not. When it is transmitted, an errors transmitting may occur. If such errors occurred, the receiver cannot extract the information correctly from the cover_image. Digital media have been massively produced, easily manipulated, and swiftly transmitted to almost anywhere in the world at anytime.

Author(s):  
Dakhaz Mustafa Abdullah ◽  
Siddeeq Y. Ameen ◽  
Naaman Omar ◽  
Azar Abid Salih ◽  
Dindar Mikaeel Ahmed ◽  
...  

Whether it's for work or personal well-being, keeping secrets or private information has become part of our everyday existence. Therefore, several researchers acquire an entire focus on secure transmitting secret information. Confidential information is collectively referred to as Steganography for inconspicuous digital media such as video, audio, and images. In disguising information, Steganography plays a significant role. Traditional Steganography faces a further concern of discovery as steganalysis develops. The safety of present steganographic technologies thus has to be improved. In this research, some of the techniques that have been used to hide information inside images have been reviewed. According to the hiding domain, these techniques can be divided into two main parts: The spatial Domain and Transform Domain. In this paper, three methods for each Domain have been chosen to be studied and evaluated. These are; Least Significant Bit (LSB), Pixel Value Difference (PVD), Exploiting Modification Direction (EMD), contourlet transform, Discrete Wavelet Transformation (DWT), and, Discrete Cosine Transformation (DCT). Finally, the best results that have been obtained in terms of higher PSNR, Capacity, and more robustness and security are discussed.


CCIT Journal ◽  
2016 ◽  
Vol 9 (2) ◽  
pp. 214-224
Author(s):  
Sugeng Santoso ◽  
Arisman Arisman ◽  
Windy Sentanu

Security of distributed information is essential for maintaining the confidentiality of the information. The process of securing is done by hiding the information on other digital media that are not visible existence. This technique is called steganography, the art of hiding data into digital media with a particular method so that other people do not realize there is something in the digital media. In this paper conducted a study to hide information into digital audio file is not compressed (. Wav) as a carrier file using the Least Significant Bit Modification. Least Significant Bit Modification is a method of hiding information by modifying the last bits of carrier files with the bits of information and only cause changes in the value of a bit higher or a lower one. The system was designed with two main processes, namely phase Embedding and Extracting stage


2012 ◽  
Vol 4 (1) ◽  
pp. 24-32
Author(s):  
Shinta Puspita Sari ◽  
Winarno Winarno ◽  
Dodick Z. Sudirman

Nowadays, the development of celluler device especially mobile phone is very rapid. The security of information in mobile phone becoming such an important thing, because users do not want other people can access their essential information. It means in the security in mobile phone. One way to secure the data is steganograpgy technique. This technique hides the data in a digital media. In this research the steganography technique that the is used is the Least Significant Bit (LSB) which implemented to cellular equipment with android as the operating system. The digital image which is used to hide the data is PNG. The test result shows that steganography has been implemented successfully in android phone. In the imprecebility aspect, user cannot different between the picture with message and the original picture bare eyedly. In recovery aspect, the message successfully encrypted and decrypted without changing the original content of the message. The lack occurs in fidelity aspect which the expansion of PNG file happens. Index Terms—LSB, least significant bit, png, android, handphone


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Dinh-Chien Nguyen ◽  
Thai-Son Nguyen ◽  
Chin-Chen Chang ◽  
Huan-Sheng Hsueh ◽  
Fang-Rong Hsu

Data hiding is a technique that allows secret data to be delivered securely by embedding the data into cover digital media. In this paper, we propose a new data hiding algorithm for H.264/advanced video coding (AVC) of video sequences with high embedding capacity. In the proposed scheme, to embed secret data into the quantized discrete cosine transform (QDCT) coefficients of I frames without any intraframe distortion drift, some embeddable coefficient pairs are selected in each block, and they are divided into two different groups, i.e., the embedding group and the averting group. The embedding group is used to carry the secret data, and the averting group is used to prevent distortion drift in the adjacent blocks. The experimental results show that the proposed scheme can avoid intraframe distortion drift and guarantee low distortion of video sequences. In addition, the proposed scheme provides enhanced embedding capacity compared to previous schemes. Moreover, the embedded secret data can be extracted completely without the requirement of the original secret data.


2021 ◽  
Vol 6 (1) ◽  
Author(s):  
Fayyad Kazan H

In the context of forensic investigations, the traditional understanding of evidence is changing nowadays where most prosecutors, lawyers and judges heavily rely on multimedia substantiations. However, the evolution of easy-to-use media manipulating tools, made it very easy for almost any (technical) person to alter the content of a digital media (e.g. digital image, audio or video) without leaving any traces that can be detectable by human's basic perceptions. Therefore, the validity of the digital media can no longer be guaranteed which in turn leads to a serious problem regarding digital crime investigation. As there are tools which can tamper media, there are also ones that can do the reverse: detect the tampering. This paper sheds the light on the available anti-forensics tools. Experiments were done using some of these tools to detect tampered media – more specifically video tampering. Our experiments showed the efficiency of these tools by differentiating between original and altered evidences.


Author(s):  
Musa. M. Yahaya ◽  
Aminat Ajibola

Recently, the rate of data transfer over the internet globally has increased and this called for more data security as security of data is of great concern for individuals as well as business owners. Cryptography and steganography are two major key players for data security technique. Cryptography is use to perform encryption on the secrete message while steganography hides the secrete message in digital media, image in this regards. This paper employed these two techniques using Advanced Encryption Standard (AES) for the cryptography and Least Significant Bit (LSB) for the steganography. Combining the two algorithms ensured data integrity, data security, and flexibility. The changes in the secrete message carrier (Stego) is insignificant and is often not noticeable by the nicked eyes, thus this make the interception of the message often difficult by intruder.


2020 ◽  
Vol 189 ◽  
pp. 03013
Author(s):  
Shan Li

In the context of the development of digital image era and digital media art, watercolor art, as a traditional form of painting, will inevitably experience a subversive change and transformation of painting methods and ideas. By analyzing the artistic expression and construction process of watercolor art in digital painting, this paper finds out the aesthetic value and significance of watercolor art in digital painting, discusses the relationship between traditional watercolor painting and digital painting and the new space of watercolor development in the future.


2019 ◽  
Vol 7 (4) ◽  
pp. 254
Author(s):  
Nada E. Tawfiq

Image files can hide text without their size being affected too much. This process called steganography which allows hiding text in images without any suspicions from intruders. This paper addresses an improved LSB substitution algorithm for hiding Kurdish text information written in text file into digital image as steganography technique. The algorithm consists of two main phases, the first phase holds the encryption of the Kurdish text message and the embedded technique while the second phase hold the message extraction followed by decryption to get the original code of each character. The algorithm contains many procedures to enhance this process. Least Significant Bit method is used to hide the Kurdish text, in order to keep the features and characteristics of the original image. Applying the proposed approach shows that it seems work in a best case by hiding and retrieving text from the digital image which is used as a carrier of this text. Delphi 2010 was used to simulate both encrypt-embedded phase and extract-decrypt phase, and the results were obtained with high and security which proved the efficiency of the algorithm, where the hidden Kurdish text didn’t make any distortion or change over the cover image.


Sign in / Sign up

Export Citation Format

Share Document