lsb technique
Recently Published Documents


TOTAL DOCUMENTS

67
(FIVE YEARS 26)

H-INDEX

4
(FIVE YEARS 0)

Author(s):  
Huda Kadhim Tayyeh ◽  
Ahmed Sabah Ahmed AL-Jumaili

Steganography is one of the cryptography techniques where secret information can be hidden through multimedia files such as images and videos. Steganography can offer a way of exchanging secret and encrypted information in an untypical mechanism where communicating parties can only interpret the secret message. The literature has shown a great interest in the least significant bit (LSB) technique which aims at embedding the secret message bits into the most insignificant bits of the image pixels. Although LSB showed a stable performance of image steganography yet, many works should be done on the message part. This paper aims to propose a combination of LSB and Deflate compression algorithm for image steganography. The proposed Deflate algorithm utilized both LZ77 and Huffman coding. After compressing the message text, LSB has been applied to embed the text within the cover image. Using benchmark images, the proposed method demonstrated an outperformance over the state of the art. This can proof the efficacy of using Deflate as a data compression prior to the LSB embedding.


2022 ◽  
pp. 152-164
Author(s):  
Eimad Abdu Abusham ◽  
Aiysha Ali Majid Al-Marzouqi ◽  
Mahmood Al-Bahri ◽  
Maryam G. Aljabri

The use of digital images has become very common because of the rapid increase of the internet over time. Moving digital images over the internet is easy, but keeping ownership is complex, and serious issues have emerged. Forgery, fraud, and pirating of this content are rising. Different techniques used to protect images, like watermarking and steganography, but these methods are not enough toprotect. So, providing new techniques is essential for protecting image ownership. We have proposed a fusion method of steganography and watermarking in this work. First, the secret message is encoded within the original image using the LSB technique to obtain the stego image. Secondly, the watermarking process is applied on the stego image using text watermarking or image watermarking to provide stego-watermarked-image. The proposed fusion watermarking and steganography method is very useful for protecting image ownership over insecure communication channels. An attacker cannot get the desired watermarked image from the stego-watermarked-image without knowing the secret message hiding inside it using the LSB technique. The proposed method is efficient, simple and secure; it provides significant protection for image ownership.


Author(s):  
Nuku Atta Kordzo Abiew ◽  
Maxwell Dorgbefu Jnr. ◽  
William Brown-Acquaye

The benefits that individuals and organizations derive from the digital era comes with its own challenges. Globally, data has become one of the greatest assets for decision making and operational improvements among businesses, government agencies and even individuals. Data on its own and at its source does not make so much contribution to business processes. Data is transmitted from one location to another towards attainment of its goal as a critical resource in decision making. However, data including sensitive or confidential ones are transmitted via public channels such as the Internet. The data so transmitted via the Internet is vulnerable to interception and unauthorized manipulation. This demands that data in transit is protected from the prying eyes of the malicious internet users. One of such strategies for transmitting data via public channels such as the Internet without attracting attention from intruders is steganography. In this paper, the least significant bit algorithm was used with an audio file for hiding data in transit. The algorithm used in this research proves to be one of the simplest ways of securing data using audio steganography. The method employed the LSB technique by using audio files as the stego object for the final implementation in the Java programming language. The experimental results proved to be one of the best methods of implementing steganography. The accuracy of the stego objects shows high quality, and similarity scores with an improved processing time.  


2021 ◽  
Vol 15 ◽  
pp. 84-88
Author(s):  
Siddeeq Y. Ameen ◽  
Muthana R. Al-Badrany

The paper presents two approaches for destroying steganogrphy content in an image. The first is the overwriting approach where a random data can be written again over steganographic images whereas the second approach is the denoising approach. With the second approach two kinds of destruction techniques have been adopted these are filtering and discrete wavelet techniques. These two approaches have been simulated and evaluated over two types of hiding techniques, Least Significant Bit LSB technique and Discrete Cosine Transform DCT technique. The results of the simulation show the capability of both approaches to destroy the hidden information without any alteration to the cover image except the denoising approach enhance the PSNR in any received image even without hidden information by an average of 4dB.


2021 ◽  
pp. 243-249
Author(s):  
Aiman Jan ◽  
Shabir A. Parah ◽  
Muzamil Hussan ◽  
Bilal A. Malik

Author(s):  
Oluwakemi Christiana Abikoye ◽  
Roseline Oluwaseun Ogundokun

The development of the medical field had led to the transformation of communication from paper information into the digital form. Medical information security had become a great concern as the medical field is moving towards the digital world and hence patient information, disease diagnosis and so on are all being stored in the digital image. Therefore, to improve the medical information security, securing of patient information and the increasing requirements for communication to be transferred between patients, client, medical practitioners, and sponsors is essential to be secured. The core aim of this research is to make available a complete knowledge about the research trends on LSB Steganography Technique, which are applied to securing medical information such as text, image, audio, video and graphics and also discuss the efficiency of the LSB technique. The survey findings show that LSB steganography technique is efficient in securing medical information from intruder.


2021 ◽  
Vol 56 (4) ◽  
pp. 376-384
Author(s):  
Faten H. Mohammed Sediq Al-Kadei

With the widespread usage of the Internet, security takes precedence above anything else when transmitting data. This research proposed a hybrid encoding approach with watermark embedding that provides excellent security. Our novel strategy is based on cryptography, which allows it to recognize higher secrecy and efficiency. In this research, a hybrid method is used to support visual watermarking and cryptography to embed vital data. Our effort aims to improve the security of hidden facts embedded in the cover picture. The embedding and encryption of the watermark image into the cover image document were performed in two steps. To begin, two keys and an XOR bit operation were used to generate a large number of distinct keys for encryption. Second, a modified approach of the least significant bit (LSB) technique was adopted to hide a high-resolution watermark picture in the cover picture. The suggested second stage involved encrypting the cover image using the asymmetric key cryptography method (RSA), which provides additional secrecy during picture transmission. The original picture, the watermark photo, can be recovered and decoded using the permitted techniques. As a result, encoding and watermarking may be combined, giving the term "joint encoding and watermarking" legitimacy. Peak Signal to Noise Ratio (PSNR) and relationship aspects are greater with this method. For the implementation of hiding and encoding for the watermark and encoding the digital cover picture, MATLAB-GUI software was utilized. Experimental results demonstrated a good performance with a good correlation for all encrypted images and very high PSNR of the Stego images.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Roseline Oluwaseun Ogundokun ◽  
Oluwakemi Christiana Abikoye

Safe conveyance of medical data across unsecured networks nowadays is an essential issue in telemedicine. With the exponential growth of multimedia technologies and connected networks, modern healthcare is a huge step ahead. Authentication of a diagnostic image obtained from a specialist at a remote location which is from the sender is one of the most challenging tasks in an automated healthcare setup. Intruders were found to be able to efficiently exploit securely transmitted messages from previous literature since the algorithms were not efficient enough leading to distortion of information. Therefore, this study proposed a modified least significant bit (LSB) technique capable of protecting and hiding medical data to solve the crucial authentication issue. The application was executed and established by utilizing MATLAB 2018a, and it used a logical bit shift operation for execution. The investigational outcomes established that the proposed technique can entrench medical information without leaving a perceptible falsification in the stego image. The result of this implementation shows that the modified LSB image steganography outperformed the standard LSB technique with a higher PSNR value and lower MSE value when compared with previous research works. The number of shifts was added as a new performance metric for the proposed system. The study concluded that the proposed secured medical information system was evidenced to be proficient in secreting medical information and creating undetectable stego images with slight entrenching falsifications when likened to other prevailing approaches.


Sign in / Sign up

Export Citation Format

Share Document