scholarly journals Two Stage Steganography on Compressed and Encrypted Message

Author(s):  
Kamal Jadidy Aval ◽  
Masumeh Damrudi

Security of confidential information in the insecure era of information transmission (Internet) is still one of the most important challenges of the day. The combination of cryptography and steganography increases the security of embedded data to avoid from unauthorized access. Furthermore, compression of secret data reduces the size of transmitted message. In addition to compression and encryption, in this paper, two stage steganography is employed to enhance the security. In the proposed approach, the Huffman coding as lossless compression, the Blowfish, DES, 3DES, AES, and RSA as cryptography algorithms and LSB (Least significant Bit) as steganography technique are employed with enhancement of security by two stage steganography. The results are analyzed through quality parameters including MSE (Mean Square Error) and PSNR (Peak Signal to Noise Ratio), and histogram of images.

2021 ◽  
Vol 13 (1) ◽  
pp. 67-77
Author(s):  
Guntoro Barovih ◽  
Fadhila Tangguh Admojo ◽  
Yoda Hersaputra

A message is a form of conveying information. Various ways are used to secure the information conveyed in the form of messages either in encrypted form or in the form of applying a password in the message. Messages can also be encrypted and embedded in other media such as images (steganography). This research aimed to insert a message into the form of an image by combining the Modified Least Significant Bit (MLSB) method in encrypting messages and reshape modification technique to determine at which position the message encryption will be embedded in the image. Tests were carried out to obtain the quality of the encryption process using the parameters of Fidelity, mean square error, peak signal to noise ratio, testing on file type, robustness, and comparison of message contents. The results of the tests showed that the files that can be used are files with the image file type in the lossless compression category, the rotation can be done at 90, 180, 270 without destroying the message in it, and changing the pixel in the image file will destroy the message inside


2020 ◽  
Vol 10 (1) ◽  
pp. 25
Author(s):  
Ranida Pradita ◽  
Ida Nurhaida

Seiring dengan perkembangan teknologi 5G, penyebaran dengan menggunakan video semakin besar dan mudah. Penyebaran informasi baik yang tersembunyi atau tidak semakin mudah disebarluaskan dengan menggunakan internet. Steganografi adalah cara menyembunyikan informasi dalam image atau video. Steganografi berbentuk digital image, text, audio, video, 3D model, dan lain-lain. Media digital yang popularitasnya paling tinggi dalam penelitian algoritma steganografi dengan menggunakan media digital image. Tulisan ini menggunakan media digital video karna media penelitian sebelumnya menggunakan media digital image. Pada tulisan ini akan diulas dan dianalis tentang video steganografi dengan menggunakan metode Egypt, Least Significant Bit (LSB), dan Least Significant Bit (LSB) Fibonacci Edge Pixel. Analisis video steganografi ini bertujuan untuk mendeteksi video yang mengandung unsur pesan rahasia yang kemungkinan untuk pengintaian. Hasil Peak Signal-to-Noise Ratio (PSNR) yang didapat dari penelitian ini rata-rata 40.46 dB dan menghasilkan rata-rata presentase similarity 30.67 %. Rata-rata Mean Square Error (MSE) pada penelitian ini adalah sebesar 0.50657. Untuk metode yang paling optimal yang digunakan dalam video steganografi adalah dengan menggunakan Metode Egypt.


2018 ◽  
Vol 7 (1.8) ◽  
pp. 123
Author(s):  
B. Bhaskara Rao ◽  
B. Prabhakara Rao

Electrocardiogram (ECG) is a measure of the electrical movement of the heart, and is obtained by surface electrodes at standardized locations on the patient’s chest. During acquisition, various artifacts/noises such as power-line interference (PLI), baseline wander (BW), muscle artifacts (MA) and motion artifacts (EM) obscure the ECG. It is important that these artifacts are minimized for the clinicians to make better diagnosis on heart problems. This paper researches the creative idea of adaptive noise cancellation (ANC) using two stage form of adaptive filters. The concept of cascading and its algorithm for real-time application is simulated on MATLAB. The proposed algorithm utilizes two adaptive filters to estimate gradients accurately which results in good adaptation and performance. The objective of the present investigation is to provide solution in order to improve the performance of noise canceller in terms of filter parameters which are obtained with the help of adaptive algorithms. Different kinds of two stage ANC algorithms are used to eliminate artifacts in ECG by considering the noises such as power line interference and baseline wander. The simulation results show that the performance of the two stage ANC is superior to the conventional single stage ANC system in terms of higher signal-to-noise ratio. Two stage adaptive algorithms are applied on real time ECG signals and compared their performance with the conventional single stage adaptive algorithms in terms of parameters Signal-to-Noise Ratio (SNR), Mean Square Error (MSE), Root Mean Square Error (RMSE) and Distortion.


Author(s):  
Mahmuddin Yunus ◽  
Agus Harjoko

AbstrakPenyembunyian data pada file video dikenal dengan istilah steganografi video. Metode steganografi yang dikenal diantaranya metode Least Significant Bit (LSB) dan Discrete Cosine Transform (DCT). Dalam penelitian ini dilakukan penyembunyian data pada file video dengan menggunakan metode LSB, metode DCT, dan gabungan metode LSB-DCT. Sedangkan kualitas file video yang dihasilkan setelah penyisipan dihitung dengan menggunakan Mean Square Error (MSE) dan Peak Signal to Noise Ratio (PSNR).Uji eksperimen dilakukan berdasarkan ukuran file video, ukuran file berkas rahasia yang disisipkan, dan resolusi video.Hasil pengujian menunjukkan tingkat keberhasilan steganografi video dengan menggunakan metode LSB adalah 38%, metode DCT adalah 90%, dan gabungan metode LSB-DCT adalah 64%. Sedangkan hasil perhitungan MSE, nilai MSE metode DCT paling rendah dibandingkan metode LSB dan gabungan metode LSB-DCT. Sedangkan metode LSB-DCT mempunyai nilai yang lebih kecil dibandingkan metode LSB. Pada pengujian PSNR diperoleh databahwa nilai PSNR metode DCTlebih tinggi dibandingkan metode LSB dan gabungan metode LSB-DCT. Sedangkan nilai PSNR metode gabungan LSB-DCT lebih tinggi dibandingkan metode LSB.  Kata Kunci—Steganografi, Video, Least Significant Bit (LSB), Discrete Cosine Transform (DCT), Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR)                           AbstractHiding data in video files is known as video steganography. Some of the well known steganography methods areLeast Significant Bit (LSB) and Discrete Cosine Transform (DCT) method. In this research, data will be hidden on the video file with LSB method, DCT method, and the combined method of LSB-DCT. While the quality result of video file after insertion is calculated using the Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR). The experiments were conducted based on the size of the video file, the file size of the inserted secret files, and video resolution.The test results showed that the success rate of the video steganography using LSB method was 38%, DCT method was 90%, and the combined method of LSB-DCT was 64%. While the calculation of MSE, the MSE method DCT lower than the combined method of LSB and LSB-DCT method. While LSB-DCT method has asmaller value than the LSB method. The PNSR experiment showed that the DCT method PSNR value is higher than the combined method of LSB and LSB-DCT method. While PSNR combined method LSB-DCT higher compared LSB method.  Keywords—Steganography, Video, Least Significant Bit (LSB), Discrete Cosine Transform (DCT), Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR)


2018 ◽  
Vol 7 (3.12) ◽  
pp. 1222
Author(s):  
Rohith S ◽  
B K Sujatha

In this research work a novel idea of compressed, encrypted and encoded watermark embedding scheme for digital images is proposed. Initially watermark is compressed using Huffman encoder. Compressed watermark is encrypted using combined binary key sequence {Ki} derived from sequence of logistic map and Lozi map. The compressed and encrypted binary watermark is encoded using (n,1) repetition code. This compressed, encrypted and encoded binary watermark is embedded in alternate locations of cover image pixels using of Least Significant Bit (LSB) and Second Least Significant Bit (SLSB). To study the watermarked image quality, parameters such as Signal to Noise Ratio (SNR) and Mean Square Error (MSE) are used.  Also performance of the proposed system is compared with uncompressed, encrypted, encoded watermark embedding scheme. There is a significant improvement in MSE, SNR of watermarked image, when compressed watermark embedding scheme is compared to uncompressed watermark embedding scheme.  


This paper illustrates a unique approach for embedding binary image watermarks into the digital images. or the purpose of watermarking; we made use of three most influential transforms in the field of image processing i.e. Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD). For the sake of estimation, comparison and calculation of our approach we calculated three image quality parameters specifically peak signal to noise ratio (PSNR), Mean square error (MSE) and Correlation.


In today’s world, confidential information is growing due to various areas of works. Internet is the main area of transmission of digital data, so security must be more considered. Two common ways of providing security is cryptography and steganography. Employing a hybrid of cryptography and steganography enhances the security of data. This paper employs LSB (Least significant Bit) as the steganography algorithm and AES, RSA, DES, 3DES, and Blowfish algorithms as cryptographic algorithms to encrypt a message that should be hidden in a cover image. The results are represented in the form of execution time, PSNR (Peak Signal to Noise Ratio), MSE (Mean Square Error) and the histogram of main and covered image. The experimental results reveal that all the algorithms achieve appropriate quality of stego image. They can be used as cryptographic algorithms to encrypt a message before applying steganography algorithms.


2018 ◽  
Vol 8 (2) ◽  
pp. 109-122
Author(s):  
Hillman Akhyar Damanik ◽  
Merry Anggraeni

Internet adalah media komunikasi paling populer saat ini, tetapi komunikasi melalui internet menghadapi beberapa masalah seperti keamanan data, kontrol hak cipta, kapasitas ukuran data, otentikasi dan lain sebagainya. Pada penelitian ini peneliti memperkenalkan skema untuk menyembunyikan data yang terenkripsi. Dengan menggunakan citra sebagai embedding dan cover image untuk text hiding. Fitur utama skema adalah cara penyematan data teks ke cover image terenkripsi. Peneliti berkonsentrasi menggunakan metode Red-Green-Blue Least Significant Bit (RGB-LSB). Penyematan data teks dan memverifikasi kinerja menggunakan metode RGB-LSB dalam hal indeks kualitas yaitu Peak Signal-to-Noise Ratio (PSNR) dan Mean Square Error (MSE) , imperceptibility dan indeks recovery. Nilai SME pada jumlah pesan yang disisipi sebanyak 407 kata adalah nilai MSE 0.8310 dan nilai PSNR 48.9348. pada jumlah pesan yang disisipi sebanyak 507 kata adalah nilai MSE 0.8322 dan nilai PSNR 48.9285. Nilai kriteria imperceptibility pada stego image menghasilkan image dan nilai-nilai pixel pada masing-masing cover image tidak mengalami perubahan. Aspek recovery pada penyembunyian pesan teks pada masing-masing cover image pada proses embedding, dimensi citra yang berbeda dan sampai proses ekstraksi juga menghasilkan panjang pesan asli terungkap. Berdasarkan hasil perbandingan ini dapat diketahui bahwa algoritma LSB memiliki hasil yang baik pada teknik penyisipan sebuah pesan pada file citra.


Author(s):  
Noor Alhuda F. Abbas ◽  
Nida Abdulredha ◽  
Raed Khalid Ibrahim ◽  
Adnan Hussein Ali

Information security is one of the main aspects of processes and methodologies in the technical age of information and communication. The security of information should be a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies that are used, and they include steganography and cryptography. An effective digital image-steganographic method based on odd/even pixel allocation and random function to increase the security and imperceptibility has been improved. This lately developed outline has been verified for increasing the security and imperceptibility to determine the existent problems. Huffman coding has been used to modify secret data prior embedding stage; this modified equivalent secret data that prevent the secret data from attackers to increase the secret data capacities. The main objective of our scheme is to boost the peak-signal-to-noise-ratio (PSNR) of the stego cover and stop against any attack. The size of the secret data also increases. The results confirm good PSNR values in addition of these findings confirmed the proposed method eligibility.


Sign in / Sign up

Export Citation Format

Share Document