SlideShare a Scribd company logo
1 of 11
Download to read offline
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
DOI: 10.5121/ijcsit.2018.10604 31
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST
SIGNIFICANT BIT DETERMINED THROUGH
ANALYSIS OF THE COVER IMAGE AND THE
ENCRYPTED MESSAGE
Martha Angelica Garcia-Villa, Ricardo Francisco Martinez-Gonzalez
Juan Francisco Mejia-Perez, Miguel Valerio-Canales
and Yesenia Isabel Moreno-Pavan
Tecnologico Nacional de México/IT Veracruz, Veracruz, Mexico
ABSTRACT
The present workproposes to perform an analysis of the similarities between the least significant two bits of
the cover image and multiple series of two-bit-length encrypted frames, all of them from the crypto-
message. After finding the most similar frame, we proceed to substitute it into the cover image;
nevertheless, to provide a proof of the improvement from using itor the least similar one, the statistics from
both cases are obtained.Providing information that the more similar the frame is, the better statistics the
stego-image has. Moreover, the statistics obtained from our work are also compared with other works,
finding that we provide a good scheme for hiding information.
KEYWORDS
Steganographic scheme, Information encryption, Substitution of the least significant bits.
1. INTRODUCTION
Communication is essential for daily life; unfortunately, there are problems on transmitting
messages, given that the information can be intercepted by unwanted readers to whom it was not
originally sent. For this reason, developers work in hiding the transmission and reception of
information by different methods; one of them is the term "data encryption", that it was coined
with the arrival of the digital era. Which consists of rendering the information illegible, and it can
only be read by a specific key holder [1].
There are several techniques of information concealment, being the steganography an art that
consists in the application of different techniques to hide messages into a medium [2], with the
purpose that the information embedded in the cover medium cannot be possible to decrypt, and
also remaining its main characteristics to reduce detection possibility. Even though there are
multiple types of cover medium; in the present manuscript, we put focus on images used to insert
the information to be hidden [3].
The advantage of using a digital image as a cover medium is the digital processing, because it
helps on the purpose of studying steganography by replacing the least significant bit (LSB) [4],
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
given that it allows access to information and location of each pixel in the image. The numerical
value contained in each pixel is responsible for varyin
together within a matrix to form the image. This fact is a great advantage within the
steganography since you can vary the information of the pixels in a minimal way to insert the
hidden message in it without cau
Steganography is a fairly noble weapon when it comes to the concealment of messages since it
has several attributes that allow the medium to maintain its quality and have a distortion not
perceptible by the human senses, which are the following:
• Confidentiality is an attribute of steganography which ensures that only authorized persons,
with the secret key, can access the information embedded in the cover medium.
• Integrity, the attribute that provides the
modified.
• Non-repudiation is the attribute that allows verifying when a sender or receiver denies the
transmitted information.
• Authentication allows confirming sender and receiver identity inside
Figure 1 shows the methodology in the development of steganography [
basically follows it, but with different techniques of encryption and reading of the data. In almost
every method, each author has his/her
transmission.
Figure 1.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
given that it allows access to information and location of each pixel in the image. The numerical
value contained in each pixel is responsible for varying brightness and contrast, and they are put
together within a matrix to form the image. This fact is a great advantage within the
steganography since you can vary the information of the pixels in a minimal way to insert the
hidden message in it without causing a great impact on the image information.
Steganography is a fairly noble weapon when it comes to the concealment of messages since it
has several attributes that allow the medium to maintain its quality and have a distortion not
man senses, which are the following:
• Confidentiality is an attribute of steganography which ensures that only authorized persons,
with the secret key, can access the information embedded in the cover medium.
• Integrity, the attribute that provides the information of when the transmitted message has been
repudiation is the attribute that allows verifying when a sender or receiver denies the
• Authentication allows confirming sender and receiver identity inside communication processes.
Figure 1 shows the methodology in the development of steganography [5], the proposed method
basically follows it, but with different techniques of encryption and reading of the data. In almost
every method, each author has his/her own method to provide security and confidentiality in data
1. General model for steganographic scheme.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
32
given that it allows access to information and location of each pixel in the image. The numerical
g brightness and contrast, and they are put
together within a matrix to form the image. This fact is a great advantage within the
steganography since you can vary the information of the pixels in a minimal way to insert the
Steganography is a fairly noble weapon when it comes to the concealment of messages since it
has several attributes that allow the medium to maintain its quality and have a distortion not
• Confidentiality is an attribute of steganography which ensures that only authorized persons,
information of when the transmitted message has been
repudiation is the attribute that allows verifying when a sender or receiver denies the
communication processes.
], the proposed method
basically follows it, but with different techniques of encryption and reading of the data. In almost
own method to provide security and confidentiality in data
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
33
According to some authors, the term stegoimage refers to the image that already has an embedded
information in it, and it can be considered as the output of a coding function; where such function
takes on the original image, the data and a secret encryption key. The decoding function aims to
reconstruct the hidden data after processing the stegoimage and secret decoding key [6].
To insert the information within a cover medium, it is necessary to statistically generate digital
signals that provide high security and performance [7]; whereby, we use the Bernoulli map. This
map works perfectly with digital implementation, and it is defined as an iterated map of a piece-
wise linear function (PWL) and using the appropriate values for the variables, the Bernoulli map
behaves alike a chaotic dynamic system [8], and its mathematical representation is expressed in
Eq. 1. Besides our current implementation, in the future we do not discard the possibility to
implement a digital system that hides information into “innocent” packages, so developing ideas
with a map easy to implement in digital systems is a milestone for our research.
=
2 ,																	0 ≤		 < 0.5
2 − 1,									0.5 ≤		 < 1
Eq. 1
where:
xn is the result of the iteration in the current time
xn+1 result of the iteration in future time.
µ represents the feedback factor and is in the interval [0,1].
Each pixel in the cover image is in a binary coding, so it is necessary to modify the domain of the
Bernoulli map, to be able to work only with integer values in [0, 255] range. To make the
adjustment, Eq. 2 is applied to the map output,
= ( ∗ 2 ) Eq. 2
where:
X is the resulting output of the iterations of Eq. 1.
Y is the set of well-ranged integer valuesobtained from X.
floor is a function that truncates decimals to only get integer-part of a real number.
2. METHODS
Traditionally, steganographic methods based on the least-significant bit substitution are limited to
replace a number of leastsignificant bits in pixels [9]. The number is determined by the
information that is pretended to send in a hidden manner. In other proposals, the author
introduces another padlock when encrypting the hidden information, thereby increasing security
by preventing possible threats. Another advantage of the last method relies on the fact that the
encrypted information usually has a shape similar to the apparent randomness of the last bits of an
image. Causing the statistics associated with the image not to be seriously affected by the
information substitution, and inherently increasing the degree of imperceptibility.
Even with the advantages of using the data encryption, its apparently low level of impact on the
cover image, it is not possible to ensure because of the lack of a study prior to the substitution. In
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
34
the present paper, we propose a methodology in which the cover image is firstly analyzed, and
then the least significant bits in the image are replaced by the closest encrypted frame.
2.1 Presentation of The Proposed Methodology
The proposed method begins by the cover image reading after that such image is processed to
extract the two least significant bits in each pixel; they are analyzed, obtaining the statistical
analysis of their occurrence. After the analysis, we proceed to obtain the to-be-hidden message. It
is important to note that the maximum information that can be embedded with the proposed
methodology depends on the cover image size, and such limit is the image size divided by four.
The next step is to encrypt the message. For such activity, a sequence generated by Bernoulli map
limited to 32 bits length. It is taken from scaling the double-precision numbers to 32-bit integers.
Because of employing the double precision sequence, the presence of the dynamic system
degradation is greatly reduced from being represented by finite systems, or in this case integer-
only representation.
The double-precision complete sequence must consist of the number of dibits in the to-be-hidden
information. In other words, if you want to hide one kilobyte of information, you will need a
sequence of four thousand elements. The 32-bit scaled sequence is divided into dibits, leaving a
total of sixteen sequences, each of the two bits long.
Despite the statistical similarity between them, the sixteen sequences are not equal, and they do
not have the same occurrence. Moreover, they deliver encrypted messages with certain
characteristics, and we need to choose the more similar to the last two bits in the cover image.
Therefore, the next step is to use the sixteen sequences to encrypt the to-be-hidden message,
giving a total of sixteen encrypted messages.
Every encrypted message is analyzed to know their values occurrence, and later to compare their
analysis with the analysis of the last two bits of the cover image. On next, the encrypted message
whose occurrence is more similar to cover image’s one is selected. Finally, the selected message
is embedded in the corresponding cover image pixel. The complete scheme of the aforementioned
is shown in Figure 2.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
Figur
3. IMPLEMENTATION OF THE
The implementation of the steganographic scheme was done using Matlab, where the first step is
the use of the command imread, that allows to acquire any type of image and generate an array
where each of the pixels is represented in color layer in
in the case of grayscale images, the representation of the image lies on a 1D matrix. For the
present proposal, the image used as the covering is the grayscale Macaw.
The next step is to read the information fil
Lorem-ipsum file. For such, we have the set of functions integrated by
The first one allows to call a file and reserve it for being used by Matlab.
content that is currently reserved, and its content is assigned to a variable for later handling. And
fclose function release the resource back to the operating system so that it can be used by any
program.
After having the information in a
generate the cipher sequences is obtained
be into [0.75, 1] range to exhibit a pseudorandom behavior
not so important as it is in [0,1] range
information to be hidden, so this value is taken from a function named length and multiplied by
four. The calculated value will be used to limit the cycle of the d
generation. The road followed until this point is described in Pseudocode 1.
Pseudocode 1. Carry image and to
001: get carry image from file (im)
002: open to-hide message
003: read to-hide message file
004: store message file in (mg) variable
005: close to-hide message file
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
Figure 2. Proposed steganographic scheme
MPLEMENTATION OF THE PROPOSAL USING MATLAB
The implementation of the steganographic scheme was done using Matlab, where the first step is
imread, that allows to acquire any type of image and generate an array
where each of the pixels is represented in color layer in a 3D matrix of 8-bit integers; nonetheless,
in the case of grayscale images, the representation of the image lies on a 1D matrix. For the
present proposal, the image used as the covering is the grayscale Macaw.
The next step is to read the information file, which in this case is a one-thousand
ipsum file. For such, we have the set of functions integrated by fopen, fread
The first one allows to call a file and reserve it for being used by Matlab. fread
content that is currently reserved, and its content is assigned to a variable for later handling. And
function release the resource back to the operating system so that it can be used by any
After having the information in a variable, the double-precision sequence that will serve to
generate the cipher sequences is obtained. It is important to notice that feedback factor (u) must
be into [0.75, 1] range to exhibit a pseudorandom behavior [10]; meanwhile, the initial value is
not so important as it is in [0,1] range. This sequence must be four times the length of the
information to be hidden, so this value is taken from a function named length and multiplied by
four. The calculated value will be used to limit the cycle of the double-precision sequence
generation. The road followed until this point is described in Pseudocode 1.
Carry image and to-hide message acquisition, as well as primary ciphering
sequence generation.
) variable
006: initialize (u, lm, aux, aux1,
precision variable
007: lms<= calculate mg length
008: initialize (s1) vector of double
withlms length
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
35
The implementation of the steganographic scheme was done using Matlab, where the first step is
, that allows to acquire any type of image and generate an array
bit integers; nonetheless,
in the case of grayscale images, the representation of the image lies on a 1D matrix. For the
thousand-character
fread and fclose.
fread captures file
content that is currently reserved, and its content is assigned to a variable for later handling. And
function release the resource back to the operating system so that it can be used by any
precision sequence that will serve to
. It is important to notice that feedback factor (u) must
; meanwhile, the initial value is
. This sequence must be four times the length of the
information to be hidden, so this value is taken from a function named length and multiplied by
precision sequence
hide message acquisition, as well as primary ciphering
b, c) double-
) vector of double-precision
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
009: s1[1]<= 0.8
009: initialize a for cycle from 2 to
variable
The primary floating-point sequence is scaled and li
sequence that only allows integers in the range of zero to 2
chunked in dibits. For such activity, the two least significant bits are taken by the mod function
with 2; then the sequence divided by 2 and the decimal part is eliminated using the floor function.
The process is repeated sixteen times to cover the complete 32
After having obtained the sixteen two
information to be encrypted, so that it coincides in word width with the two
sequences. To do so, the whole message is taken and separated by characters, placing them in
rows in one array; after that, the characters are divided in dibits, and
columns of the same row. The last step is to vectorize the matrix, letting the last dibit of the first
characters next to the first dibit of the second character, and so on. The complete scheme is
presented in Figure 3.
Figure 3. Vectorization scheme of the container matrix
To finish the second section of the
to encrypt the segmented to-hide
After the encryption, the frames
three. The whole process can be seen in
Pseudocode 2. Scaling and division of the primary encrypting sequence and to
013: s1<=s1 multiplied by (2 powered by 32)
014: s1<=truncate s1
015: initialize (s2) vector of double
with lms length
016: initialize a for cycle from 16 to 1 with
decrements of a variable
017: aux<= divide s1 by 4
018: s2[a,:]<= extract decimal part from
019: s1<= truncate aux
020: end for cycle
021:
022: initialize (mg1) as a matrix of double
precision with lms length and 16 width
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
009: initialize a for cycle from 2 to lms with a
010: aux <= divide s1[a-1] by 2
011: s1[a]<= extract decimal part from
012: end for cycle
point sequence is scaled and limited truncate operation, generating a
sequence that only allows integers in the range of zero to 232
. Once the sequence is scaled, it is
chunked in dibits. For such activity, the two least significant bits are taken by the mod function
quence divided by 2 and the decimal part is eliminated using the floor function.
The process is repeated sixteen times to cover the complete 32-bit sequence.
After having obtained the sixteen two-bit sequences, the proposed algorithm orders the
information to be encrypted, so that it coincides in word width with the two-
sequences. To do so, the whole message is taken and separated by characters, placing them in
rows in one array; after that, the characters are divided in dibits, and each one is ordered in
columns of the same row. The last step is to vectorize the matrix, letting the last dibit of the first
characters next to the first dibit of the second character, and so on. The complete scheme is
Vectorization scheme of the container matrix with the to-hide message characters
To finish the second section of the proposed algorithm, the two-bit ciphering sequences are used
hide information, resulting in a total of sixteen encrypted frames.
frames are analyzed to obtain their histograms, using a range of zero to
three. The whole process can be seen in Pseudocode 2.
Scaling and division of the primary encrypting sequence and to-hide
processing
multiplied by (2 powered by 32)
) vector of double-precision
016: initialize a for cycle from 16 to 1 with
decimal part from aux
) as a matrix of double-
length and 16 width
023: initialize a for cycle from 1 to 4 with
increments of a variable
024: aux<= divide mg by 4
025: mg1[a,:]<= extract decimal part from
aux
026: s1<= truncate aux
027: end for cycle
028:
029: mg1 <= vectorize mg1
030: mg1 <= transpose mg1
031:
032: initialize (c1) as a matrix of double
precision with lms length and 16 positions
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
36
by 2
decimal part from aux
mited truncate operation, generating a
. Once the sequence is scaled, it is
chunked in dibits. For such activity, the two least significant bits are taken by the mod function
quence divided by 2 and the decimal part is eliminated using the floor function.
bit sequences, the proposed algorithm orders the
-bit ciphering
sequences. To do so, the whole message is taken and separated by characters, placing them in
each one is ordered in
columns of the same row. The last step is to vectorize the matrix, letting the last dibit of the first
characters next to the first dibit of the second character, and so on. The complete scheme is
hide message characters
sequences are used
encrypted frames.
histograms, using a range of zero to
hide message
023: initialize a for cycle from 1 to 4 with
<= extract decimal part from
) as a matrix of double-
16 positions
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
37
033: initialize a for cycle from 1 to 16 with
increments of a variable
035: c1[a,:]<= mg1 xor-bitwise s2[a,:]
036: end for cycle
037: initialize (range) vector of double-precision
with 3 positions
038: b <= calculate length of mg1
039:
040: initialize (bc) as a matrix of double-
precision with lms length and 16 positions
041: initialize a for cycle from 1 to 16 with
increments of a variable
042: aux <= calculate histogram of c1[a,:]
according to range
043: bc[a,:]<= aux divided by b
044: end for cycle
With the second part of the algorithm explained, it is time to work with the cover image. Firstly,
it is necessary to extract the least significant two bits, by using the modulus operation between the
pixel information and the number two is possible to extract and store them in a vector for their
further analysis; which consists of finding their occurrence. The occurrence for the last two bits in
cover image is compared with those obtained from the encrypted frames of information. The
comparison method is the mean square error calculation between the occurrence in the cover
image and each of the sixteen encrypted frames, calculating sixteen mean square errors.
According to our proposal, the minimum mean square error represents to the most similar pair
image - encrypted frame. The last two bits of the image are replaced with the most similar two-bit
encrypted frame. The last part of the proposed steganographic mechanism is presented in the
Pseudocode 3.
Pseudocode 3. Extraction and evaluation of the histograms, and the most similar frame
embedding
045: aux <= divide im by 4
046: im1<= extract decimal part from aux
047: aux<= im1
048: im1<= truncate aux
049: aux <= 0
049: initialize a for cycle from 1 to 16 with
increments of a variable
050: aux <= 0
051: initialize a for cycle from 1 to 16 with
increments of b variable
052: aux1 <= subtract bim1[b] from
bc[a,b]
053: aux1 <= absolute value of aux1
054: aux1 <= aux1 powered by 2
055: aux <= aux added to aux1
056: end for cycle
057: ec[a] <= aux divided by 4
058: end for cycle
059: c <= 1
060: im2 <= im
061:
062: initialize a for cycle from 1 to 37 with
increments of 4 in a variable
063: initialize a for cycle from 1 to 13 with
increments of 4 in b variable
064: aux<= divide im2[a,b] by 4
065: im2[a,b] <= truncate aux
066: im2[a,b] <= im2[a,b]
mulpilied by 4
067: im2[a,b] <= im2[a,b] + c1[c]
068: c <= increment c
069: end for cycle
070: end for cycl
4. RESULTS OBTAINED FROM THE IMPLEMENTATION
As it was mentioned, the cover image used to evaluate the proposal is known as Macaw, and it
was modified in grayscale. The grayscale image was created from a color one using the rgb2gray
function, available in Matlab; such conversion was done previous to its usage as the carry image,
but it does not form part of our proposal. Figure 4 shows the original color image and the gray-
scaled version.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
Figure 4. Macaw image in its color (
After obtaining the cover image, the
range, and thenit is scaled to [0,232]
is divided, generating sixteen two
The results ar
Figure 5. Histograms corresponding to the division in sixteen of the sequence scaled to 32
After the histograms corresponding to the encrypting sixteen frames, each of them is used to
encrypt the to-hide message; generating a total of sixteen encrypted messages. Then we proceed
to extract the last two bits of the cover image for analyzing
frames. To make the a fairly comparison, we proceed to calculate the histogram of the last two
bits in the cover image and determine the similarities by the mean square error between it and
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
Macaw image in its color (left) and gray-scaled (right) version.
image, the primary encrypting sequence was generated. It
[0,232] range, allowing only-integer numbers. The 32-
two-bit frames, which were analyzed for obtaining their histograms
The results are presented in Figure 5.
Figure 5. Histograms corresponding to the division in sixteen of the sequence scaled to 32
After the histograms corresponding to the encrypting sixteen frames, each of them is used to
hide message; generating a total of sixteen encrypted messages. Then we proceed
to extract the last two bits of the cover image for analyzing and comparing it with the encrypted
frames. To make the a fairly comparison, we proceed to calculate the histogram of the last two
bits in the cover image and determine the similarities by the mean square error between it and
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
38
primary encrypting sequence was generated. It is in [0, 1]
-bit sequence
their histograms.
Figure 5. Histograms corresponding to the division in sixteen of the sequence scaled to 32 bits.
After the histograms corresponding to the encrypting sixteen frames, each of them is used to
hide message; generating a total of sixteen encrypted messages. Then we proceed
and comparing it with the encrypted
frames. To make the a fairly comparison, we proceed to calculate the histogram of the last two
bits in the cover image and determine the similarities by the mean square error between it and
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
39
each of the encrypted frames. The use of the mean square error is necessary, because all
histograms look very similar, as is seen in Figure 6.
Figure 6. Histograms of the last two bits of the cover image and the encrypted frames.
When the most similar encrypted frameis determined, it is embedded in the last two bits of the
cover image. However, in order to ratify our proposal, we perform an additional comparison.We
proceed to repeat the embedding with two different encrypted frames, the most and the least
similar ones. Table 1 shows the mean square error (MSE), as well as the peak signal to noise ratio
(PSNR) between the aunatural cover image and the images with the embedded information.
Table 1. Comparison between the metrics of the images embedded with the most and the least similar
encrypted frames
least similar most similar
PSNR 67.9913 68.4405
MSE 0.0103 0.0093
5. DISCUSSION
In order to compare the proposed scheme, some related works were used to provide a reference,
they are detailed on next. Miri and Faez present a work that is a novel approach for the data
concealment in the frequency domain with the use of a genetic algorithm. In the beginning, the
carrier image is mapped to a domain of the appropriate frequency using the concepts of adaptive
wavelet transform and genetic algorithms. The information in the proper space is encrypted to be
later embedded in the frequency coefficients that represent the edges of the image in the space
domain; in such a way that the cover image is minimally changed, and it has the maximum
compatibility with the human vision system [11].
On the other hand, Kumar and Kumar present a work where their technique is based on the
Discrete Wavelet Transformation, together with the union of two concepts: Secret key computing,
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
40
which will make the method more robust and resistant to steganalysis. And the concept is known
as In-Blocks, whose purpose is to ensure the least variation in the cover image [12].
And the last comparison work is the one presented by [13]. They present a work based on three-
dimensional chaotic mapping Cat and discrete wavelet transforms. In their work, they use the
irregular outputs of the Cat mapping to embed the secret message in the cover image, while the
discrete Wavelet transforms are used to provide robustness to the scheme.
Finally, with the established reference framework, the comparison between the three works and
our proposal is presented in Table 2.
Table 2. Comparison between the current work and the reference framework
Scheme Carry image To-hide message PNSR
Miri y Faez multiples, and they present
mean values as results
6.3 Kbno-specified type
message
64.76 dB
Kumar y Kumar Lena Cameraman image, no-
specified length, or any other
characteristic.
44.84 dB
Ghebleh y Kanso Lena 39 Kbrandom message 61.128 dB
Our proposal Baboon 8 Kb, Lorem-ipsummesage 68.44 dB
According to the previous comparison, the proposed work has good features, and if we used the
results obtained in Table 1 for the least similar encrypted frame. The fact is maybe because of
dividing the encrypting sequence in two-bit frames has a positive influence, causing smaller
distortions in the carrier image; however, there is not enough evidence to affirm it. On the other
hand, the obtained results from our proposal have an opportunity to be compared again other
similar methods, and also to continue in our pursuit to develop a digital system able to transmit
data in a hidden from using steganographic schemes.
6. CONCLUSIONS
With the present work, it is demonstrated that in the least significant bit substitution algorithms is
possible to enhance its performance, if an analysis of the cover image is previously made to the
substitution. To refine our proposal some tests are needed to be applied to other carrier images,
other types of message.
As it was presented in the discussion, the effect of dividing the coding frame must be
characterized more deeply and finding a relationship that is easily exploited in the future. Since
not only can it contribute a reduction in the impact on the carrier image, but the robustness of the
scheme is favored, by presenting a very complicated plot to determine its origin.
7. ACKNOWLEDGMENTS
Tecnologico Nacional de Mexico is thanked for the support provided with the funded project
"Generación de un esquemaesteganográficocaótico de bajo impacto para la imagen portadora"
with reference number 6622.18P.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
41
REFERENCES
[1] Brandao, A. S., & Jorge, D. C. (2016). Artificial neural networks applied to image steganography.
IEEE Latin America Transactions, 14(3), 1361-1366.
[2] Fridrich, J., Goljan, M., & Du, R. (2001). Detecting LSB steganography in color, and gray-scale
images. IEEE multimedia, 8(4), 22-28.
[3] Isaza, G. A., Espinosa, C. A., & Ocampo, S. M. (2018) Análisis de técnicasesteganograficas y
estegoanalisisencanalesencubiertos, imágenes y archivos de sonido.
[4] Divya, S. S., & Reddy, M. R. M. (2012). Hiding text in audio using multiple LSB steganography and
provide security using cryptography. International journal of scientific & technology research, 1(6),
68-70.
[5] Jamal A. Othman.(2014). Steganographic scheme to avoid statistical Steganalysis. JOURNAL OF
THE COLLEGE OF EDUCATION FOR WOMEN, 25(1), 249-256.
[6] Wu, H. Z., Wang, H. X., & Shi, Y. Q. (2016). Can Machine Learn Steganography?-Implementing
LSB Substitution and Matrix Coding Steganography with Feed-Forward Neural Networks. arXiv
preprint arXiv:1606.05294.
[7] Anees, A., Siddiqui, A. M., Ahmed, J., & Hussain, I. (2014). A technique for digital steganography
using chaotic maps. Nonlinear Dynamics, 75(4), 807-816.
[8] Li, S., Chen, G., &Mou, X. (2005). On the dynamical degradation of digital piecewise linear chaotic
maps. International journal of Bifurcation and Chaos, 15(10), 3119-3151.
[9] Zhang, T., & Ping, X. (2003). A new approach to reliable detection of LSB steganography in natural
images. Signal processing, 83(10), 2085-2093.
[10] Al-Fadhel, T. A. (2007). Gauss map vs Bernoulli shift. Applied Mathematics and Computation,
194(2), 520-526.
[11] Miri, A., &Faez, K. (2017). Adaptive image steganography based on transform domain via genetic
algorithm. Optik-International Journal for Light and Electron Optics, 145, 158-168.
[12] Kumar, V., & Kumar, D. (2017). A modified DWT-based image steganography technique.
Multimedia Tools and Applications, 1-30.
[13] Ghebleh, M., &Kanso, Ax. (2014). A robust chaotic algorithm for digital image steganography.
Communications in Nonlinear Science and Numerical Simulation, 19(6), 1898-1907.

More Related Content

What's hot

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...IJCSIS Research Publications
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
 
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...sipij
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security Systemijtsrd
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryptionAnsabArshad
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...Budi Prasetiyo
 
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEIMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEJournal For Research
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...CSCJournals
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd Iaetsd
 
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYTEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYIJCSEA Journal
 

What's hot (15)

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
 
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security System
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
 
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEIMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
 
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYTEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
 

Similar to IJCSIT Vol 10 No 6 Steganographic Substitution LSB Analysis

A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueJeff Brooks
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hidingijcses
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYIRJET Journal
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...IJNSA Journal
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
 
B03208016
B03208016B03208016
B03208016inventy
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
 
Securing Web Communication Using Three Layer Image Shielding
Securing Web Communication Using Three Layer Image ShieldingSecuring Web Communication Using Three Layer Image Shielding
Securing Web Communication Using Three Layer Image ShieldingKamal Pradhan
 
Public key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural networkPublic key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural networkIAEME Publication
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
 
Image Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyImage Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyMonica Turner
 

Similar to IJCSIT Vol 10 No 6 Steganographic Substitution LSB Analysis (20)

A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hiding
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
B03208016
B03208016B03208016
B03208016
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
 
Securing Web Communication Using Three Layer Image Shielding
Securing Web Communication Using Three Layer Image ShieldingSecuring Web Communication Using Three Layer Image Shielding
Securing Web Communication Using Three Layer Image Shielding
 
Public key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural networkPublic key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural network
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
Image Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyImage Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image Steganography
 

Recently uploaded

(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...Call girls in Ahmedabad High profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

IJCSIT Vol 10 No 6 Steganographic Substitution LSB Analysis

  • 1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018 DOI: 10.5121/ijcsit.2018.10604 31 STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH ANALYSIS OF THE COVER IMAGE AND THE ENCRYPTED MESSAGE Martha Angelica Garcia-Villa, Ricardo Francisco Martinez-Gonzalez Juan Francisco Mejia-Perez, Miguel Valerio-Canales and Yesenia Isabel Moreno-Pavan Tecnologico Nacional de México/IT Veracruz, Veracruz, Mexico ABSTRACT The present workproposes to perform an analysis of the similarities between the least significant two bits of the cover image and multiple series of two-bit-length encrypted frames, all of them from the crypto- message. After finding the most similar frame, we proceed to substitute it into the cover image; nevertheless, to provide a proof of the improvement from using itor the least similar one, the statistics from both cases are obtained.Providing information that the more similar the frame is, the better statistics the stego-image has. Moreover, the statistics obtained from our work are also compared with other works, finding that we provide a good scheme for hiding information. KEYWORDS Steganographic scheme, Information encryption, Substitution of the least significant bits. 1. INTRODUCTION Communication is essential for daily life; unfortunately, there are problems on transmitting messages, given that the information can be intercepted by unwanted readers to whom it was not originally sent. For this reason, developers work in hiding the transmission and reception of information by different methods; one of them is the term "data encryption", that it was coined with the arrival of the digital era. Which consists of rendering the information illegible, and it can only be read by a specific key holder [1]. There are several techniques of information concealment, being the steganography an art that consists in the application of different techniques to hide messages into a medium [2], with the purpose that the information embedded in the cover medium cannot be possible to decrypt, and also remaining its main characteristics to reduce detection possibility. Even though there are multiple types of cover medium; in the present manuscript, we put focus on images used to insert the information to be hidden [3]. The advantage of using a digital image as a cover medium is the digital processing, because it helps on the purpose of studying steganography by replacing the least significant bit (LSB) [4],
  • 2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018 given that it allows access to information and location of each pixel in the image. The numerical value contained in each pixel is responsible for varyin together within a matrix to form the image. This fact is a great advantage within the steganography since you can vary the information of the pixels in a minimal way to insert the hidden message in it without cau Steganography is a fairly noble weapon when it comes to the concealment of messages since it has several attributes that allow the medium to maintain its quality and have a distortion not perceptible by the human senses, which are the following: • Confidentiality is an attribute of steganography which ensures that only authorized persons, with the secret key, can access the information embedded in the cover medium. • Integrity, the attribute that provides the modified. • Non-repudiation is the attribute that allows verifying when a sender or receiver denies the transmitted information. • Authentication allows confirming sender and receiver identity inside Figure 1 shows the methodology in the development of steganography [ basically follows it, but with different techniques of encryption and reading of the data. In almost every method, each author has his/her transmission. Figure 1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018 given that it allows access to information and location of each pixel in the image. The numerical value contained in each pixel is responsible for varying brightness and contrast, and they are put together within a matrix to form the image. This fact is a great advantage within the steganography since you can vary the information of the pixels in a minimal way to insert the hidden message in it without causing a great impact on the image information. Steganography is a fairly noble weapon when it comes to the concealment of messages since it has several attributes that allow the medium to maintain its quality and have a distortion not man senses, which are the following: • Confidentiality is an attribute of steganography which ensures that only authorized persons, with the secret key, can access the information embedded in the cover medium. • Integrity, the attribute that provides the information of when the transmitted message has been repudiation is the attribute that allows verifying when a sender or receiver denies the • Authentication allows confirming sender and receiver identity inside communication processes. Figure 1 shows the methodology in the development of steganography [5], the proposed method basically follows it, but with different techniques of encryption and reading of the data. In almost every method, each author has his/her own method to provide security and confidentiality in data 1. General model for steganographic scheme. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018 32 given that it allows access to information and location of each pixel in the image. The numerical g brightness and contrast, and they are put together within a matrix to form the image. This fact is a great advantage within the steganography since you can vary the information of the pixels in a minimal way to insert the Steganography is a fairly noble weapon when it comes to the concealment of messages since it has several attributes that allow the medium to maintain its quality and have a distortion not • Confidentiality is an attribute of steganography which ensures that only authorized persons, information of when the transmitted message has been repudiation is the attribute that allows verifying when a sender or receiver denies the communication processes. ], the proposed method basically follows it, but with different techniques of encryption and reading of the data. In almost own method to provide security and confidentiality in data
  • 3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018 33 According to some authors, the term stegoimage refers to the image that already has an embedded information in it, and it can be considered as the output of a coding function; where such function takes on the original image, the data and a secret encryption key. The decoding function aims to reconstruct the hidden data after processing the stegoimage and secret decoding key [6]. To insert the information within a cover medium, it is necessary to statistically generate digital signals that provide high security and performance [7]; whereby, we use the Bernoulli map. This map works perfectly with digital implementation, and it is defined as an iterated map of a piece- wise linear function (PWL) and using the appropriate values for the variables, the Bernoulli map behaves alike a chaotic dynamic system [8], and its mathematical representation is expressed in Eq. 1. Besides our current implementation, in the future we do not discard the possibility to implement a digital system that hides information into “innocent” packages, so developing ideas with a map easy to implement in digital systems is a milestone for our research. = 2 , 0 ≤ < 0.5 2 − 1, 0.5 ≤ < 1 Eq. 1 where: xn is the result of the iteration in the current time xn+1 result of the iteration in future time. µ represents the feedback factor and is in the interval [0,1]. Each pixel in the cover image is in a binary coding, so it is necessary to modify the domain of the Bernoulli map, to be able to work only with integer values in [0, 255] range. To make the adjustment, Eq. 2 is applied to the map output, = ( ∗ 2 ) Eq. 2 where: X is the resulting output of the iterations of Eq. 1. Y is the set of well-ranged integer valuesobtained from X. floor is a function that truncates decimals to only get integer-part of a real number. 2. METHODS Traditionally, steganographic methods based on the least-significant bit substitution are limited to replace a number of leastsignificant bits in pixels [9]. The number is determined by the information that is pretended to send in a hidden manner. In other proposals, the author introduces another padlock when encrypting the hidden information, thereby increasing security by preventing possible threats. Another advantage of the last method relies on the fact that the encrypted information usually has a shape similar to the apparent randomness of the last bits of an image. Causing the statistics associated with the image not to be seriously affected by the information substitution, and inherently increasing the degree of imperceptibility. Even with the advantages of using the data encryption, its apparently low level of impact on the cover image, it is not possible to ensure because of the lack of a study prior to the substitution. In
  • 4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018 34 the present paper, we propose a methodology in which the cover image is firstly analyzed, and then the least significant bits in the image are replaced by the closest encrypted frame. 2.1 Presentation of The Proposed Methodology The proposed method begins by the cover image reading after that such image is processed to extract the two least significant bits in each pixel; they are analyzed, obtaining the statistical analysis of their occurrence. After the analysis, we proceed to obtain the to-be-hidden message. It is important to note that the maximum information that can be embedded with the proposed methodology depends on the cover image size, and such limit is the image size divided by four. The next step is to encrypt the message. For such activity, a sequence generated by Bernoulli map limited to 32 bits length. It is taken from scaling the double-precision numbers to 32-bit integers. Because of employing the double precision sequence, the presence of the dynamic system degradation is greatly reduced from being represented by finite systems, or in this case integer- only representation. The double-precision complete sequence must consist of the number of dibits in the to-be-hidden information. In other words, if you want to hide one kilobyte of information, you will need a sequence of four thousand elements. The 32-bit scaled sequence is divided into dibits, leaving a total of sixteen sequences, each of the two bits long. Despite the statistical similarity between them, the sixteen sequences are not equal, and they do not have the same occurrence. Moreover, they deliver encrypted messages with certain characteristics, and we need to choose the more similar to the last two bits in the cover image. Therefore, the next step is to use the sixteen sequences to encrypt the to-be-hidden message, giving a total of sixteen encrypted messages. Every encrypted message is analyzed to know their values occurrence, and later to compare their analysis with the analysis of the last two bits of the cover image. On next, the encrypted message whose occurrence is more similar to cover image’s one is selected. Finally, the selected message is embedded in the corresponding cover image pixel. The complete scheme of the aforementioned is shown in Figure 2.
  • 5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018 Figur 3. IMPLEMENTATION OF THE The implementation of the steganographic scheme was done using Matlab, where the first step is the use of the command imread, that allows to acquire any type of image and generate an array where each of the pixels is represented in color layer in in the case of grayscale images, the representation of the image lies on a 1D matrix. For the present proposal, the image used as the covering is the grayscale Macaw. The next step is to read the information fil Lorem-ipsum file. For such, we have the set of functions integrated by The first one allows to call a file and reserve it for being used by Matlab. content that is currently reserved, and its content is assigned to a variable for later handling. And fclose function release the resource back to the operating system so that it can be used by any program. After having the information in a generate the cipher sequences is obtained be into [0.75, 1] range to exhibit a pseudorandom behavior not so important as it is in [0,1] range information to be hidden, so this value is taken from a function named length and multiplied by four. The calculated value will be used to limit the cycle of the d generation. The road followed until this point is described in Pseudocode 1. Pseudocode 1. Carry image and to 001: get carry image from file (im) 002: open to-hide message 003: read to-hide message file 004: store message file in (mg) variable 005: close to-hide message file International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018 Figure 2. Proposed steganographic scheme MPLEMENTATION OF THE PROPOSAL USING MATLAB The implementation of the steganographic scheme was done using Matlab, where the first step is imread, that allows to acquire any type of image and generate an array where each of the pixels is represented in color layer in a 3D matrix of 8-bit integers; nonetheless, in the case of grayscale images, the representation of the image lies on a 1D matrix. For the present proposal, the image used as the covering is the grayscale Macaw. The next step is to read the information file, which in this case is a one-thousand ipsum file. For such, we have the set of functions integrated by fopen, fread The first one allows to call a file and reserve it for being used by Matlab. fread content that is currently reserved, and its content is assigned to a variable for later handling. And function release the resource back to the operating system so that it can be used by any After having the information in a variable, the double-precision sequence that will serve to generate the cipher sequences is obtained. It is important to notice that feedback factor (u) must be into [0.75, 1] range to exhibit a pseudorandom behavior [10]; meanwhile, the initial value is not so important as it is in [0,1] range. This sequence must be four times the length of the information to be hidden, so this value is taken from a function named length and multiplied by four. The calculated value will be used to limit the cycle of the double-precision sequence generation. The road followed until this point is described in Pseudocode 1. Carry image and to-hide message acquisition, as well as primary ciphering sequence generation. ) variable 006: initialize (u, lm, aux, aux1, precision variable 007: lms<= calculate mg length 008: initialize (s1) vector of double withlms length International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018 35 The implementation of the steganographic scheme was done using Matlab, where the first step is , that allows to acquire any type of image and generate an array bit integers; nonetheless, in the case of grayscale images, the representation of the image lies on a 1D matrix. For the thousand-character fread and fclose. fread captures file content that is currently reserved, and its content is assigned to a variable for later handling. And function release the resource back to the operating system so that it can be used by any precision sequence that will serve to . It is important to notice that feedback factor (u) must ; meanwhile, the initial value is . This sequence must be four times the length of the information to be hidden, so this value is taken from a function named length and multiplied by precision sequence hide message acquisition, as well as primary ciphering b, c) double- ) vector of double-precision
  • 6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018 009: s1[1]<= 0.8 009: initialize a for cycle from 2 to variable The primary floating-point sequence is scaled and li sequence that only allows integers in the range of zero to 2 chunked in dibits. For such activity, the two least significant bits are taken by the mod function with 2; then the sequence divided by 2 and the decimal part is eliminated using the floor function. The process is repeated sixteen times to cover the complete 32 After having obtained the sixteen two information to be encrypted, so that it coincides in word width with the two sequences. To do so, the whole message is taken and separated by characters, placing them in rows in one array; after that, the characters are divided in dibits, and columns of the same row. The last step is to vectorize the matrix, letting the last dibit of the first characters next to the first dibit of the second character, and so on. The complete scheme is presented in Figure 3. Figure 3. Vectorization scheme of the container matrix To finish the second section of the to encrypt the segmented to-hide After the encryption, the frames three. The whole process can be seen in Pseudocode 2. Scaling and division of the primary encrypting sequence and to 013: s1<=s1 multiplied by (2 powered by 32) 014: s1<=truncate s1 015: initialize (s2) vector of double with lms length 016: initialize a for cycle from 16 to 1 with decrements of a variable 017: aux<= divide s1 by 4 018: s2[a,:]<= extract decimal part from 019: s1<= truncate aux 020: end for cycle 021: 022: initialize (mg1) as a matrix of double precision with lms length and 16 width International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018 009: initialize a for cycle from 2 to lms with a 010: aux <= divide s1[a-1] by 2 011: s1[a]<= extract decimal part from 012: end for cycle point sequence is scaled and limited truncate operation, generating a sequence that only allows integers in the range of zero to 232 . Once the sequence is scaled, it is chunked in dibits. For such activity, the two least significant bits are taken by the mod function quence divided by 2 and the decimal part is eliminated using the floor function. The process is repeated sixteen times to cover the complete 32-bit sequence. After having obtained the sixteen two-bit sequences, the proposed algorithm orders the information to be encrypted, so that it coincides in word width with the two- sequences. To do so, the whole message is taken and separated by characters, placing them in rows in one array; after that, the characters are divided in dibits, and each one is ordered in columns of the same row. The last step is to vectorize the matrix, letting the last dibit of the first characters next to the first dibit of the second character, and so on. The complete scheme is Vectorization scheme of the container matrix with the to-hide message characters To finish the second section of the proposed algorithm, the two-bit ciphering sequences are used hide information, resulting in a total of sixteen encrypted frames. frames are analyzed to obtain their histograms, using a range of zero to three. The whole process can be seen in Pseudocode 2. Scaling and division of the primary encrypting sequence and to-hide processing multiplied by (2 powered by 32) ) vector of double-precision 016: initialize a for cycle from 16 to 1 with decimal part from aux ) as a matrix of double- length and 16 width 023: initialize a for cycle from 1 to 4 with increments of a variable 024: aux<= divide mg by 4 025: mg1[a,:]<= extract decimal part from aux 026: s1<= truncate aux 027: end for cycle 028: 029: mg1 <= vectorize mg1 030: mg1 <= transpose mg1 031: 032: initialize (c1) as a matrix of double precision with lms length and 16 positions International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018 36 by 2 decimal part from aux mited truncate operation, generating a . Once the sequence is scaled, it is chunked in dibits. For such activity, the two least significant bits are taken by the mod function quence divided by 2 and the decimal part is eliminated using the floor function. bit sequences, the proposed algorithm orders the -bit ciphering sequences. To do so, the whole message is taken and separated by characters, placing them in each one is ordered in columns of the same row. The last step is to vectorize the matrix, letting the last dibit of the first characters next to the first dibit of the second character, and so on. The complete scheme is hide message characters sequences are used encrypted frames. histograms, using a range of zero to hide message 023: initialize a for cycle from 1 to 4 with <= extract decimal part from ) as a matrix of double- 16 positions
  • 7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018 37 033: initialize a for cycle from 1 to 16 with increments of a variable 035: c1[a,:]<= mg1 xor-bitwise s2[a,:] 036: end for cycle 037: initialize (range) vector of double-precision with 3 positions 038: b <= calculate length of mg1 039: 040: initialize (bc) as a matrix of double- precision with lms length and 16 positions 041: initialize a for cycle from 1 to 16 with increments of a variable 042: aux <= calculate histogram of c1[a,:] according to range 043: bc[a,:]<= aux divided by b 044: end for cycle With the second part of the algorithm explained, it is time to work with the cover image. Firstly, it is necessary to extract the least significant two bits, by using the modulus operation between the pixel information and the number two is possible to extract and store them in a vector for their further analysis; which consists of finding their occurrence. The occurrence for the last two bits in cover image is compared with those obtained from the encrypted frames of information. The comparison method is the mean square error calculation between the occurrence in the cover image and each of the sixteen encrypted frames, calculating sixteen mean square errors. According to our proposal, the minimum mean square error represents to the most similar pair image - encrypted frame. The last two bits of the image are replaced with the most similar two-bit encrypted frame. The last part of the proposed steganographic mechanism is presented in the Pseudocode 3. Pseudocode 3. Extraction and evaluation of the histograms, and the most similar frame embedding 045: aux <= divide im by 4 046: im1<= extract decimal part from aux 047: aux<= im1 048: im1<= truncate aux 049: aux <= 0 049: initialize a for cycle from 1 to 16 with increments of a variable 050: aux <= 0 051: initialize a for cycle from 1 to 16 with increments of b variable 052: aux1 <= subtract bim1[b] from bc[a,b] 053: aux1 <= absolute value of aux1 054: aux1 <= aux1 powered by 2 055: aux <= aux added to aux1 056: end for cycle 057: ec[a] <= aux divided by 4 058: end for cycle 059: c <= 1 060: im2 <= im 061: 062: initialize a for cycle from 1 to 37 with increments of 4 in a variable 063: initialize a for cycle from 1 to 13 with increments of 4 in b variable 064: aux<= divide im2[a,b] by 4 065: im2[a,b] <= truncate aux 066: im2[a,b] <= im2[a,b] mulpilied by 4 067: im2[a,b] <= im2[a,b] + c1[c] 068: c <= increment c 069: end for cycle 070: end for cycl 4. RESULTS OBTAINED FROM THE IMPLEMENTATION As it was mentioned, the cover image used to evaluate the proposal is known as Macaw, and it was modified in grayscale. The grayscale image was created from a color one using the rgb2gray function, available in Matlab; such conversion was done previous to its usage as the carry image, but it does not form part of our proposal. Figure 4 shows the original color image and the gray- scaled version.
  • 8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018 Figure 4. Macaw image in its color ( After obtaining the cover image, the range, and thenit is scaled to [0,232] is divided, generating sixteen two The results ar Figure 5. Histograms corresponding to the division in sixteen of the sequence scaled to 32 After the histograms corresponding to the encrypting sixteen frames, each of them is used to encrypt the to-hide message; generating a total of sixteen encrypted messages. Then we proceed to extract the last two bits of the cover image for analyzing frames. To make the a fairly comparison, we proceed to calculate the histogram of the last two bits in the cover image and determine the similarities by the mean square error between it and International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018 Macaw image in its color (left) and gray-scaled (right) version. image, the primary encrypting sequence was generated. It [0,232] range, allowing only-integer numbers. The 32- two-bit frames, which were analyzed for obtaining their histograms The results are presented in Figure 5. Figure 5. Histograms corresponding to the division in sixteen of the sequence scaled to 32 After the histograms corresponding to the encrypting sixteen frames, each of them is used to hide message; generating a total of sixteen encrypted messages. Then we proceed to extract the last two bits of the cover image for analyzing and comparing it with the encrypted frames. To make the a fairly comparison, we proceed to calculate the histogram of the last two bits in the cover image and determine the similarities by the mean square error between it and International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018 38 primary encrypting sequence was generated. It is in [0, 1] -bit sequence their histograms. Figure 5. Histograms corresponding to the division in sixteen of the sequence scaled to 32 bits. After the histograms corresponding to the encrypting sixteen frames, each of them is used to hide message; generating a total of sixteen encrypted messages. Then we proceed and comparing it with the encrypted frames. To make the a fairly comparison, we proceed to calculate the histogram of the last two bits in the cover image and determine the similarities by the mean square error between it and
  • 9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018 39 each of the encrypted frames. The use of the mean square error is necessary, because all histograms look very similar, as is seen in Figure 6. Figure 6. Histograms of the last two bits of the cover image and the encrypted frames. When the most similar encrypted frameis determined, it is embedded in the last two bits of the cover image. However, in order to ratify our proposal, we perform an additional comparison.We proceed to repeat the embedding with two different encrypted frames, the most and the least similar ones. Table 1 shows the mean square error (MSE), as well as the peak signal to noise ratio (PSNR) between the aunatural cover image and the images with the embedded information. Table 1. Comparison between the metrics of the images embedded with the most and the least similar encrypted frames least similar most similar PSNR 67.9913 68.4405 MSE 0.0103 0.0093 5. DISCUSSION In order to compare the proposed scheme, some related works were used to provide a reference, they are detailed on next. Miri and Faez present a work that is a novel approach for the data concealment in the frequency domain with the use of a genetic algorithm. In the beginning, the carrier image is mapped to a domain of the appropriate frequency using the concepts of adaptive wavelet transform and genetic algorithms. The information in the proper space is encrypted to be later embedded in the frequency coefficients that represent the edges of the image in the space domain; in such a way that the cover image is minimally changed, and it has the maximum compatibility with the human vision system [11]. On the other hand, Kumar and Kumar present a work where their technique is based on the Discrete Wavelet Transformation, together with the union of two concepts: Secret key computing,
  • 10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018 40 which will make the method more robust and resistant to steganalysis. And the concept is known as In-Blocks, whose purpose is to ensure the least variation in the cover image [12]. And the last comparison work is the one presented by [13]. They present a work based on three- dimensional chaotic mapping Cat and discrete wavelet transforms. In their work, they use the irregular outputs of the Cat mapping to embed the secret message in the cover image, while the discrete Wavelet transforms are used to provide robustness to the scheme. Finally, with the established reference framework, the comparison between the three works and our proposal is presented in Table 2. Table 2. Comparison between the current work and the reference framework Scheme Carry image To-hide message PNSR Miri y Faez multiples, and they present mean values as results 6.3 Kbno-specified type message 64.76 dB Kumar y Kumar Lena Cameraman image, no- specified length, or any other characteristic. 44.84 dB Ghebleh y Kanso Lena 39 Kbrandom message 61.128 dB Our proposal Baboon 8 Kb, Lorem-ipsummesage 68.44 dB According to the previous comparison, the proposed work has good features, and if we used the results obtained in Table 1 for the least similar encrypted frame. The fact is maybe because of dividing the encrypting sequence in two-bit frames has a positive influence, causing smaller distortions in the carrier image; however, there is not enough evidence to affirm it. On the other hand, the obtained results from our proposal have an opportunity to be compared again other similar methods, and also to continue in our pursuit to develop a digital system able to transmit data in a hidden from using steganographic schemes. 6. CONCLUSIONS With the present work, it is demonstrated that in the least significant bit substitution algorithms is possible to enhance its performance, if an analysis of the cover image is previously made to the substitution. To refine our proposal some tests are needed to be applied to other carrier images, other types of message. As it was presented in the discussion, the effect of dividing the coding frame must be characterized more deeply and finding a relationship that is easily exploited in the future. Since not only can it contribute a reduction in the impact on the carrier image, but the robustness of the scheme is favored, by presenting a very complicated plot to determine its origin. 7. ACKNOWLEDGMENTS Tecnologico Nacional de Mexico is thanked for the support provided with the funded project "Generación de un esquemaesteganográficocaótico de bajo impacto para la imagen portadora" with reference number 6622.18P.
  • 11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018 41 REFERENCES [1] Brandao, A. S., & Jorge, D. C. (2016). Artificial neural networks applied to image steganography. IEEE Latin America Transactions, 14(3), 1361-1366. [2] Fridrich, J., Goljan, M., & Du, R. (2001). Detecting LSB steganography in color, and gray-scale images. IEEE multimedia, 8(4), 22-28. [3] Isaza, G. A., Espinosa, C. A., & Ocampo, S. M. (2018) Análisis de técnicasesteganograficas y estegoanalisisencanalesencubiertos, imágenes y archivos de sonido. [4] Divya, S. S., & Reddy, M. R. M. (2012). Hiding text in audio using multiple LSB steganography and provide security using cryptography. International journal of scientific & technology research, 1(6), 68-70. [5] Jamal A. Othman.(2014). Steganographic scheme to avoid statistical Steganalysis. JOURNAL OF THE COLLEGE OF EDUCATION FOR WOMEN, 25(1), 249-256. [6] Wu, H. Z., Wang, H. X., & Shi, Y. Q. (2016). Can Machine Learn Steganography?-Implementing LSB Substitution and Matrix Coding Steganography with Feed-Forward Neural Networks. arXiv preprint arXiv:1606.05294. [7] Anees, A., Siddiqui, A. M., Ahmed, J., & Hussain, I. (2014). A technique for digital steganography using chaotic maps. Nonlinear Dynamics, 75(4), 807-816. [8] Li, S., Chen, G., &Mou, X. (2005). On the dynamical degradation of digital piecewise linear chaotic maps. International journal of Bifurcation and Chaos, 15(10), 3119-3151. [9] Zhang, T., & Ping, X. (2003). A new approach to reliable detection of LSB steganography in natural images. Signal processing, 83(10), 2085-2093. [10] Al-Fadhel, T. A. (2007). Gauss map vs Bernoulli shift. Applied Mathematics and Computation, 194(2), 520-526. [11] Miri, A., &Faez, K. (2017). Adaptive image steganography based on transform domain via genetic algorithm. Optik-International Journal for Light and Electron Optics, 145, 158-168. [12] Kumar, V., & Kumar, D. (2017). A modified DWT-based image steganography technique. Multimedia Tools and Applications, 1-30. [13] Ghebleh, M., &Kanso, Ax. (2014). A robust chaotic algorithm for digital image steganography. Communications in Nonlinear Science and Numerical Simulation, 19(6), 1898-1907.