Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...IJNSA Journal
Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation
Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert
the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using
a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary
sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted
binary sequence into BMP image file format. The performance of algorithm was given a preliminary
evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited
number of experiments comprised hiding text files of various sizes into BMP images. This paper presents a
deeper algorithm performance evaluation; in particular, it evaluates the effects of length of permutation
and occupation ratio on stego image quality and steganography processing time. Furthermore, it evaluates
the algorithm performance for concealing different types of secret media, such as MS office file formats,
image files, PDF files, executable files, and compressed files.
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...IJNSA Journal
Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding text files of various sizes into BMP images. This paper presents a deeper algorithm performance evaluation; in particular, it evaluates the effects of length of permutation and occupation ratio on stego image quality and steganography processing time. Furthermore, it evaluates the algorithm performance for concealing different types of secret media, such as MS office file formats, image files, PDF files, executable files, and compressed files.
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
Security of data is one of the most challenging problems in todays technological world. In order to secure the transmission of secret data over the public network Internet , numerous data security and hiding algorithms have been developed in the last decade. Steganography combined with cryptography can be one of the best choices for solving this problem. In this paper, the proposed framework is the dual layer of security, in which the first layer is to encrypt the secret text message using advanced encryption standard AES algorithm and in the second layer to embed this message using the indicator based least significant bit LSB method which is used to hide the encrypted text message into the cover image. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually, it depends on indicators to determine where and how many bits to embed at a time. The Mean Square Error MSE and Peak Signal to Noise Ratio PSNR measure the imperceptibility of the system. Experimental results show that the stego image is usually indistinguishable from the cover image. Myo Ma Ma | Zar Zar Hnin | Yin Min Htwe "Secure Data Hiding System by using AES Algorithm and Indicator-Based LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26500.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26500/secure-data-hiding-system-by-using-aes-algorithm-and-indicator-based-lsb-method/myo-ma-ma
LSB Based Image Steganography for Information Security Systemijtsrd
Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a cover image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography with various file sizes is analyzed and illustrated their results. Bitmap .bmp image is used as a cover image file to implement the proposed system. The detail Least Significant Bit LSB based image steganography is introduced. In this paper, the new embedding algorithm and extracting algorithm are presented. While embedding the secret message in a cover image file, the starting embedded pixel is chosen according to public shared key between sender and receiver. The original cover image and embedded image with secret message are analyzed with PSNR values and SNR values to achieve security. The resulting embedded image shows the acceptable PSNR and SNR values while comparing with the original cover image. The proposed system can help the information exchanging system over communication media. Aung Myint Aye "LSB Based Image Steganography for Information Security System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-1 , December 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18995.pdf
http://www.ijtsrd.com/computer-science/computer-security/18995/lsb-based-image-steganography-for-information-security-system/aung-myint-aye
This document discusses various techniques for hiding secret information in digital video files for secure communication, known as video steganography. It begins by explaining steganography and comparing it to cryptography. It then discusses different video steganography methods, including least significant bit and spread spectrum approaches. It also covers combining steganography with encryption algorithms like AES. Previous research on video steganography is summarized, focusing on techniques that embed data in wavelet coefficients or motion vectors. The document concludes that further research could explore hiding moving images within video files using steganography and cryptography methods.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
The document presents an algorithm for detecting hidden messages in PNG images based on fuzzy logic techniques. It discusses steganography and steganalysis techniques such as LSB substitution and discusses their limitations in detecting hidden data in PNG files. The proposed system uses fuzzy logic for classifying images as clean or containing hidden messages. Experimental results show the fuzzy logic system achieved high performance in classifying PNG images.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
This document summarizes a research paper that proposes a new steganalysis algorithm for detecting hidden messages in PNG images using fuzzy logic techniques. The paper begins with an introduction to steganography and steganalysis. It then provides an overview of common steganography techniques such as LSB substitution and discusses existing steganalysis methods. The paper proposes a steganalysis system for PNG images based on fuzzy logic and evaluates its performance at classifying images as clean or containing hidden messages compared to other artificial intelligence techniques.
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
Least-Significant-Bit (LSB) is one of the popular and frequently used steganography techniques to hide a secret message in a digital medium. Its popularity is due to its simplicity in implementation and ease of use. However, such simplicity comes with vulnerabilities. An embedded secret message using the traditional LSB insertion is easily decodable when the stego image is suspected to be hiding a secret message. In this paper, we propose a novel secure and high quality LSB embedding technique. The security of the embedded payload is employed through introducing a novel quadratic embedding sequence. The embedding technique is also text dependent and has non-bounded inputs, making the possibilities of decoding infinite. Due to the exponential growth of and quadratic embedding, a novel cyclic technique is also introduced for the sequence that goes beyond the limits of the cover medium. The proposed method also aims to reduce the noise arising from embedding the secret message by reducing bits changed. This is done by partitioning the cover medium and the secret message into N partitions and artificially creating an assignment problem based on bit change criteria. The assignment problem will be solved using the Hungarian algorithm that will puzzle the secret message partition for an overall least bit change.
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...IJNSA Journal
Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation
Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert
the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using
a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary
sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted
binary sequence into BMP image file format. The performance of algorithm was given a preliminary
evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited
number of experiments comprised hiding text files of various sizes into BMP images. This paper presents a
deeper algorithm performance evaluation; in particular, it evaluates the effects of length of permutation
and occupation ratio on stego image quality and steganography processing time. Furthermore, it evaluates
the algorithm performance for concealing different types of secret media, such as MS office file formats,
image files, PDF files, executable files, and compressed files.
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...IJNSA Journal
Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding text files of various sizes into BMP images. This paper presents a deeper algorithm performance evaluation; in particular, it evaluates the effects of length of permutation and occupation ratio on stego image quality and steganography processing time. Furthermore, it evaluates the algorithm performance for concealing different types of secret media, such as MS office file formats, image files, PDF files, executable files, and compressed files.
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
Security of data is one of the most challenging problems in todays technological world. In order to secure the transmission of secret data over the public network Internet , numerous data security and hiding algorithms have been developed in the last decade. Steganography combined with cryptography can be one of the best choices for solving this problem. In this paper, the proposed framework is the dual layer of security, in which the first layer is to encrypt the secret text message using advanced encryption standard AES algorithm and in the second layer to embed this message using the indicator based least significant bit LSB method which is used to hide the encrypted text message into the cover image. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually, it depends on indicators to determine where and how many bits to embed at a time. The Mean Square Error MSE and Peak Signal to Noise Ratio PSNR measure the imperceptibility of the system. Experimental results show that the stego image is usually indistinguishable from the cover image. Myo Ma Ma | Zar Zar Hnin | Yin Min Htwe "Secure Data Hiding System by using AES Algorithm and Indicator-Based LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26500.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26500/secure-data-hiding-system-by-using-aes-algorithm-and-indicator-based-lsb-method/myo-ma-ma
LSB Based Image Steganography for Information Security Systemijtsrd
Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a cover image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography with various file sizes is analyzed and illustrated their results. Bitmap .bmp image is used as a cover image file to implement the proposed system. The detail Least Significant Bit LSB based image steganography is introduced. In this paper, the new embedding algorithm and extracting algorithm are presented. While embedding the secret message in a cover image file, the starting embedded pixel is chosen according to public shared key between sender and receiver. The original cover image and embedded image with secret message are analyzed with PSNR values and SNR values to achieve security. The resulting embedded image shows the acceptable PSNR and SNR values while comparing with the original cover image. The proposed system can help the information exchanging system over communication media. Aung Myint Aye "LSB Based Image Steganography for Information Security System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-1 , December 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18995.pdf
http://www.ijtsrd.com/computer-science/computer-security/18995/lsb-based-image-steganography-for-information-security-system/aung-myint-aye
This document discusses various techniques for hiding secret information in digital video files for secure communication, known as video steganography. It begins by explaining steganography and comparing it to cryptography. It then discusses different video steganography methods, including least significant bit and spread spectrum approaches. It also covers combining steganography with encryption algorithms like AES. Previous research on video steganography is summarized, focusing on techniques that embed data in wavelet coefficients or motion vectors. The document concludes that further research could explore hiding moving images within video files using steganography and cryptography methods.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
The document presents an algorithm for detecting hidden messages in PNG images based on fuzzy logic techniques. It discusses steganography and steganalysis techniques such as LSB substitution and discusses their limitations in detecting hidden data in PNG files. The proposed system uses fuzzy logic for classifying images as clean or containing hidden messages. Experimental results show the fuzzy logic system achieved high performance in classifying PNG images.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
This document summarizes a research paper that proposes a new steganalysis algorithm for detecting hidden messages in PNG images using fuzzy logic techniques. The paper begins with an introduction to steganography and steganalysis. It then provides an overview of common steganography techniques such as LSB substitution and discusses existing steganalysis methods. The paper proposes a steganalysis system for PNG images based on fuzzy logic and evaluates its performance at classifying images as clean or containing hidden messages compared to other artificial intelligence techniques.
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
Least-Significant-Bit (LSB) is one of the popular and frequently used steganography techniques to hide a secret message in a digital medium. Its popularity is due to its simplicity in implementation and ease of use. However, such simplicity comes with vulnerabilities. An embedded secret message using the traditional LSB insertion is easily decodable when the stego image is suspected to be hiding a secret message. In this paper, we propose a novel secure and high quality LSB embedding technique. The security of the embedded payload is employed through introducing a novel quadratic embedding sequence. The embedding technique is also text dependent and has non-bounded inputs, making the possibilities of decoding infinite. Due to the exponential growth of and quadratic embedding, a novel cyclic technique is also introduced for the sequence that goes beyond the limits of the cover medium. The proposed method also aims to reduce the noise arising from embedding the secret message by reducing bits changed. This is done by partitioning the cover medium and the secret message into N partitions and artificially creating an assignment problem based on bit change criteria. The assignment problem will be solved using the Hungarian algorithm that will puzzle the secret message partition for an overall least bit change.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
This document proposes a new technique for image steganography that combines hash-LSB and RSA encryption algorithms to provide more secure data hiding. The technique first encrypts a message using RSA encryption before hiding it in the least significant bit of pixel values in a cover image, selected using a hash function. This ensures that even if the stego-image is analyzed, an interceptor would only obtain the encrypted ciphertext and not be able to access the original message without the decryption key. The document provides background on steganography, cryptography techniques like RSA and LSB, reviews related work, and describes the proposed hash-LSB with RSA encryption approach.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
This document describes a proposed dual security image steganography technique using matrix partitioning. It involves three main steps: 1) partitioning a secret image into matrices to increase embedding capacity, 2) scrambling secret data bits by replacing the most significant bits instead of least significant bits to provide an additional level of security, and 3) embedding the secret data into a cover image in the spatial domain using least significant bit substitution. The technique can embed grayscale or color images, messages, or images with messages into grayscale or color cover images of any size for enhanced security beyond typical steganography. Diagrams illustrate the embedding and extraction processes.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
This document summarizes a research paper that proposes a dual security image steganography technique using matrix partitioning. The technique has three stages: 1) It partitions a secret image into matrices to increase embedding capacity. 2) It scrambles secret data bits by replacing the most significant bits instead of least significant bits to provide another level of security. 3) It uses least significant bit steganography to conceal grayscale or color images, messages, or images with messages into grayscale or color cover images of any size. The technique aims to improve security over traditional steganography by partitioning and scrambling the secret data before embedding. Simulation results showed the proposed algorithm had better performance than other techniques.
This document summarizes a research paper that proposes a novel two-layer security mechanism combining cryptography and steganography techniques. The paper begins with an introduction discussing security issues with traditional cryptography and steganography methods. It then reviews related work in the fields. The proposed approach encrypts a secret message using AES encryption, splits the cipher file into frames, and embeds the cipher text in video frames using DCT-based steganography. Experimental results show the proposed approach achieves higher PSNR quality measurements than an existing HLSB technique, indicating better quality of stego frames. In addition, the proposed approach does not change file sizes compared to another existing approach.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
1. The document discusses new and unconventional techniques in pictorial steganography and steganalysis. It introduces MPSteg-color, a new steganographic technique that hides messages in color image coefficients obtained through image decomposition, making the messages harder for steganalysts to detect.
2. The document also proposes a methodology for comparing different steganalysis techniques. An empirical evaluation of four steganalysis algorithms showed that their performance is highly dependent on the training and testing images used.
3. Two targeted steganalysis techniques designed to detect messages hidden using MPSteg-color are also introduced. One detects blocking artifacts introduced during embedding, while the other analyzes histograms of the decomposition
This document presents an adaptive steganography technique based on an enhanced cipher hiding method for secure data transfer. It combines cryptography and audio steganography. The secret message is first encrypted using a modified least significant bit algorithm and 2's complement operations. The encrypted data is then embedded into the least significant bits of an audio file. Keys are generated and sent with the stego audio to the receiver. The receiver uses the keys to extract the encrypted data from the audio and decrypt it back to the original message. The technique aims to provide better security for data transmission over unsecured networks by taking advantage of both cryptography and steganography.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
Steganography refers to information or a file that has been hidden inside a digital image, video
or audio file. There are different carrier file formats can be used such as Text Steganography, Image
Steganography, Audio/Video Steganography, but Image Steganography are the most popular because of their
frequency on the Internet. It is the first common methods used for hiding the information in the cover image.
The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image
is replaced with data bit. steganographic algorithm for 8bit (gray scale) or 24 bit (colour image) is presented in
this paper. Sometime steganography will not cover the total security of secret massage. So an additional security
need to the secret massage. For this purpose blowfish encryption Algorithm is used in the proposed
Steganographic system This work is concerned with implementing Steganography for images, with an
improvement security and image quality.
The experimental result shows that the stego-image is visually indistinguishable from the original cover-image
It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is
always to cover up the very existence of the embedded data. and that the algorithm has a high capacity and a
good invisibility.
A Survey Paper On Different Steganography TechniqueJeff Brooks
This document summarizes a survey paper on different steganography techniques. It begins by defining steganography and its types such as linguistic, image, network, video, audio, and text steganography. It then focuses on least significant bit (LSB) steganography, explaining how it works by replacing the LSB of image pixel values with secret message bits. The paper compares the histograms of cover and stego images, showing they are almost identical. It discusses the advantages of steganography and concludes by analyzing steganography methods and suggesting areas for future work such as increasing embedding capacity while maintaining secrecy.
Hiding Text within Image Using LSB ReplacementIOSR Journals
The document proposes a new algorithm for hiding text within a gray image using least significant bit (LSB) replacement with increased security. The algorithm generates a random key between 1-256 to encrypt the text before embedding it in the image. It uses XOR and AND logic operations to modify the LSB of pixel values and embed the encrypted text. Experimental results show the embedded text can be concealed within the image while maintaining high image quality with PSNR values over 75dB. The algorithm aims to improve upon basic LSB techniques by adding an encryption step using a random key to enhance security of the hidden text.
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
Digital communication witnesses a noticeable and continuous development in many
applications in the Internet. Hence, a secure communication sessions must be provided. The
security of data transmitted across a global network has turned into a key factor on the network
performance measures. Cryptography and steganography are two important techniques that are
used to provide network security. In this paper, we conduct a comparative study of
steganography and cryptography. We survey a number of methods combining cryptography and
steganography techniques in one system. Moreover, we present a classification of these
methods, and compare them in terms of the algorithm used for encryption, the steganography
technique and the file type used for covering the information.
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
A Comparitive Analysis Of Steganography Techniquestheijes
With the increase in rate of unauthorized access and attacks security of confidential data is important. Now a day Cryptography and Steganography are the secure communication media for security purposes. This paper focuses on quantitative comparision of steganography technique such as improved LSB technique for RGB images, pattern based steganography technique and raster scan technique. The simulation has been done on MATLAB 2013 using 20 images and output of few has been shown in this paper. It has been concluded that the on the basis of various factors such as quantitative measures of the three techniques, pattern based steganography technique is the best among the other techniques w.r.t to security , irrespective of the fact that this technique has low capacity.
This document proposes a system to hide information using four algorithms for image steganography. The system first encrypts data using a modified AES algorithm. It then encrypts the encrypted data using a modified RSA algorithm. Next, it uses a fuzzy stream algorithm to add ambiguity. Finally, it hides the encrypted data in the least significant bits of cover images using LSB steganography. The document evaluates the proposed system using metrics like PSNR, MSE, and SSIM to analyze image quality and the ability to hide data imperceptibly compared to other techniques. It selects four color images as cover files and tests the system on them.
This document proposes a technique for hiding one image within another image using a combination of two steganography algorithms: the five modulus method (FMM) and least significant bit (LSB) substitution. The secret image is partitioned into two parts, with 75% hidden using FMM and 25% hidden using LSB substitution within the cover image. Additionally, a private stego-key is used with FMM to increase security. This nesting of algorithms along with a password is intended to make unauthorized extraction of the hidden image from the cover image more difficult. The document discusses related work in image steganography techniques and provides details of the proposed methodology. It is expected that this approach will achieve a good balance between security and
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
This document proposes a new technique for image steganography that combines hash-LSB and RSA encryption algorithms to provide more secure data hiding. The technique first encrypts a message using RSA encryption before hiding it in the least significant bit of pixel values in a cover image, selected using a hash function. This ensures that even if the stego-image is analyzed, an interceptor would only obtain the encrypted ciphertext and not be able to access the original message without the decryption key. The document provides background on steganography, cryptography techniques like RSA and LSB, reviews related work, and describes the proposed hash-LSB with RSA encryption approach.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
This document describes a proposed dual security image steganography technique using matrix partitioning. It involves three main steps: 1) partitioning a secret image into matrices to increase embedding capacity, 2) scrambling secret data bits by replacing the most significant bits instead of least significant bits to provide an additional level of security, and 3) embedding the secret data into a cover image in the spatial domain using least significant bit substitution. The technique can embed grayscale or color images, messages, or images with messages into grayscale or color cover images of any size for enhanced security beyond typical steganography. Diagrams illustrate the embedding and extraction processes.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
This document summarizes a research paper that proposes a dual security image steganography technique using matrix partitioning. The technique has three stages: 1) It partitions a secret image into matrices to increase embedding capacity. 2) It scrambles secret data bits by replacing the most significant bits instead of least significant bits to provide another level of security. 3) It uses least significant bit steganography to conceal grayscale or color images, messages, or images with messages into grayscale or color cover images of any size. The technique aims to improve security over traditional steganography by partitioning and scrambling the secret data before embedding. Simulation results showed the proposed algorithm had better performance than other techniques.
This document summarizes a research paper that proposes a novel two-layer security mechanism combining cryptography and steganography techniques. The paper begins with an introduction discussing security issues with traditional cryptography and steganography methods. It then reviews related work in the fields. The proposed approach encrypts a secret message using AES encryption, splits the cipher file into frames, and embeds the cipher text in video frames using DCT-based steganography. Experimental results show the proposed approach achieves higher PSNR quality measurements than an existing HLSB technique, indicating better quality of stego frames. In addition, the proposed approach does not change file sizes compared to another existing approach.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
1. The document discusses new and unconventional techniques in pictorial steganography and steganalysis. It introduces MPSteg-color, a new steganographic technique that hides messages in color image coefficients obtained through image decomposition, making the messages harder for steganalysts to detect.
2. The document also proposes a methodology for comparing different steganalysis techniques. An empirical evaluation of four steganalysis algorithms showed that their performance is highly dependent on the training and testing images used.
3. Two targeted steganalysis techniques designed to detect messages hidden using MPSteg-color are also introduced. One detects blocking artifacts introduced during embedding, while the other analyzes histograms of the decomposition
This document presents an adaptive steganography technique based on an enhanced cipher hiding method for secure data transfer. It combines cryptography and audio steganography. The secret message is first encrypted using a modified least significant bit algorithm and 2's complement operations. The encrypted data is then embedded into the least significant bits of an audio file. Keys are generated and sent with the stego audio to the receiver. The receiver uses the keys to extract the encrypted data from the audio and decrypt it back to the original message. The technique aims to provide better security for data transmission over unsecured networks by taking advantage of both cryptography and steganography.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
Steganography refers to information or a file that has been hidden inside a digital image, video
or audio file. There are different carrier file formats can be used such as Text Steganography, Image
Steganography, Audio/Video Steganography, but Image Steganography are the most popular because of their
frequency on the Internet. It is the first common methods used for hiding the information in the cover image.
The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image
is replaced with data bit. steganographic algorithm for 8bit (gray scale) or 24 bit (colour image) is presented in
this paper. Sometime steganography will not cover the total security of secret massage. So an additional security
need to the secret massage. For this purpose blowfish encryption Algorithm is used in the proposed
Steganographic system This work is concerned with implementing Steganography for images, with an
improvement security and image quality.
The experimental result shows that the stego-image is visually indistinguishable from the original cover-image
It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is
always to cover up the very existence of the embedded data. and that the algorithm has a high capacity and a
good invisibility.
A Survey Paper On Different Steganography TechniqueJeff Brooks
This document summarizes a survey paper on different steganography techniques. It begins by defining steganography and its types such as linguistic, image, network, video, audio, and text steganography. It then focuses on least significant bit (LSB) steganography, explaining how it works by replacing the LSB of image pixel values with secret message bits. The paper compares the histograms of cover and stego images, showing they are almost identical. It discusses the advantages of steganography and concludes by analyzing steganography methods and suggesting areas for future work such as increasing embedding capacity while maintaining secrecy.
Hiding Text within Image Using LSB ReplacementIOSR Journals
The document proposes a new algorithm for hiding text within a gray image using least significant bit (LSB) replacement with increased security. The algorithm generates a random key between 1-256 to encrypt the text before embedding it in the image. It uses XOR and AND logic operations to modify the LSB of pixel values and embed the encrypted text. Experimental results show the embedded text can be concealed within the image while maintaining high image quality with PSNR values over 75dB. The algorithm aims to improve upon basic LSB techniques by adding an encryption step using a random key to enhance security of the hidden text.
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
Digital communication witnesses a noticeable and continuous development in many
applications in the Internet. Hence, a secure communication sessions must be provided. The
security of data transmitted across a global network has turned into a key factor on the network
performance measures. Cryptography and steganography are two important techniques that are
used to provide network security. In this paper, we conduct a comparative study of
steganography and cryptography. We survey a number of methods combining cryptography and
steganography techniques in one system. Moreover, we present a classification of these
methods, and compare them in terms of the algorithm used for encryption, the steganography
technique and the file type used for covering the information.
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
A Comparitive Analysis Of Steganography Techniquestheijes
With the increase in rate of unauthorized access and attacks security of confidential data is important. Now a day Cryptography and Steganography are the secure communication media for security purposes. This paper focuses on quantitative comparision of steganography technique such as improved LSB technique for RGB images, pattern based steganography technique and raster scan technique. The simulation has been done on MATLAB 2013 using 20 images and output of few has been shown in this paper. It has been concluded that the on the basis of various factors such as quantitative measures of the three techniques, pattern based steganography technique is the best among the other techniques w.r.t to security , irrespective of the fact that this technique has low capacity.
This document proposes a system to hide information using four algorithms for image steganography. The system first encrypts data using a modified AES algorithm. It then encrypts the encrypted data using a modified RSA algorithm. Next, it uses a fuzzy stream algorithm to add ambiguity. Finally, it hides the encrypted data in the least significant bits of cover images using LSB steganography. The document evaluates the proposed system using metrics like PSNR, MSE, and SSIM to analyze image quality and the ability to hide data imperceptibly compared to other techniques. It selects four color images as cover files and tests the system on them.
This document proposes a technique for hiding one image within another image using a combination of two steganography algorithms: the five modulus method (FMM) and least significant bit (LSB) substitution. The secret image is partitioned into two parts, with 75% hidden using FMM and 25% hidden using LSB substitution within the cover image. Additionally, a private stego-key is used with FMM to increase security. This nesting of algorithms along with a password is intended to make unauthorized extraction of the hidden image from the cover image more difficult. The document discusses related work in image steganography techniques and provides details of the proposed methodology. It is expected that this approach will achieve a good balance between security and
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
Similar to A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM (20)
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
1. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013
DOI:10.5121/ijcis.2013.3302 11
A SECURE BLOCK PERMUTATION IMAGE
STEGANOGRAPHY ALGORITHM
Hussein Al-Bahadili
Faculty of Information Technology, University of Petra, Amman, Jordan
ABSTRACT
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
KEYWORDS
Steganography, permutation, encryption, steganalysis, LSB steganography, BMP image file
1. INTRODUCTION
Steganography is defined as the art of hiding information within any media file in ways that
prevent the disclosure of the hidden information to unauthorized recipients [1, 2]. Thus, it can be
used as an information security approach to secure stored data or data exchanged over non-
secured communication channels [3]. Steganography conveys the information secretly by
concealing the very existence of information in some other media files such as image, audio,
video, or text files. The information to be concealed is called the secret message or simply the
secret; the content used to embed information is called the cover media, and the cover along with
the secret is called the stego media [4].
Due the tremendous development in computer and Internet technologies, and the growing concern
about information security, steganography has received significant attention from both academia
and industry. Consequently, a number of steganography approaches have been proposed and used
to develop a huge number of steganography algorithms. In particular, there are four basic broad
approaches that can be used to accomplish steganography; these are: Lease-Significant-Bit (LSB),
injection, substitution and generation approaches [5-9].
2. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013
12
At the same time, another field of interest, namely, steganalysis is introduced to identify
steganography by inspecting various parameters of stego media. After steganalysis determines
whether a media contains hidden message or not, a steganography attacks may be initiated to
extract the secret message from the stego media or destroy it. As a result of that more secure
steganography techniques are required [10-12].
Encryption is a well-known procedure for securing data transmission or storage. Many encryption
methods have been developed throughout the years, such as: DES (Data Encryption Standard),
AES (Advanced Encryption Standard) and RSA [14]. These methods scramble the secret message
so that it cannot be understood. However, it makes the message suspicious enough to attract
eavesdropper’s attention. Hence, steganography looks as a good alternative approach as it
conceals the secrets within some other ordinary media files so that it cannot be observed. In
summary, steganography differs from cryptography in the sense that where cryptography
conceals the contents of a message, steganography conceals the existence of a message [3].
Many information security algorithms have been developed combining both encryption and
steganography algorithms to enhance information security [7]. So that if an attacker succeeds in
detecting and extracting the secret, he/she will find it encrypted. If the encryption algorithm is
known, then using brute-force attack to decrypt the secret has a complexity of O(2N
), where N is
the length of the encryption key. In this work, we develop a new secure steganography algorithm
that utilizes the concept of permutation. Permutation is defined as the act of changing the
arrangement of a given number of elements, and it is widely-used as part of many encryption
algorithms, such as DES, AES, RSA, etc [14]. Permutation can be performed faster than
encryption and at the same time it has higher resistivity to brute-force attack, where the
complexity of permutation of length N is O(N!) because there are N! possible permutations of a
string [14].
This paper presents detail description of a new secure Block Permutation Image Steganography
(BPIS) algorithm. The algorithm comprises five main steps; these are: convert the secret to a
binary sequence, divide the binary sequence into blocks of length N, permute each block using a
key-based randomly generated permutation, P, of length N, concatenate the permuted blocks to
form a permuted binary sequence, and, finally, embed the permuted binary sequence into a cover
image file using a LSB approach. The algorithm performance is investigated through
experiments. In particular, the algorithm is used to hide text files of different sizes into BMP
images of various sizes, and the PSNR between the stego and cover images is calculated. The
experimental results show that the algorithm maintains image quality and good invisibility as it
provides PSNRs of more than 40 dB. Furthermore, satisfactory security is maintained since the
secret cannot be recovered without knowing the permutation.
This paper is developed into five sections. Section 1 introduces the main theme and concept of the
paper. Section 2 provides a literature review and reviews some of the most recent and related
work. A detail description of the BPIS algorithm is given in Section 3. The results of using the
algorithm in a number of image steganography applications are presented and discussed in
Section 4. Finally, in the Section 5, conclusions are drawn and a number of recommendations for
future research are pointed-out.
2. LITERATURE REVIEW
This section present a review on some of the most recent and related work. But, before we
proceed, let us describe the basic components of steganography system and basic steganography
approaches. A steganography system usually consists of three main components, namely, secret,
cover media, and stego media [19]. For a secure steganography system, a forth components is
required, which is the key or the password. In general, the secret and the cover media can have
3. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013
13
the form of image, audio, video, text file or other media file. Figure 1 presents a schematic
showing the basic components of a secure steganography system. For the steganography
approaches, there are four basic broad approaches that can be used to accomplish steganography;
these are [5-9]:
(1) Lease Significant Bit (LSB) approach. In this approach, the LSB of each byte of the cover
file is replaced with bits from the message.
(2) Injection approach. In this approach, the source message is hidden in sections of the
cover file that are ignored by the processing application. Therefore, avoid modifying
those file bits that are relevant to an end-user leaving the cover file perfectly usable.
(3) Substitution approach. In this approach, the least significant meaningful content of the
cover file is replaced with the source message in a way that causes the least amount of
distortion to the cover file.
(4) Generation approach. It is unlike injection and substitution; it does not require an
existing cover file but generates a cover file for the sole purpose of hiding the message.
A large number of steganography algorithms have been developed utilizing the above approaches.
In this paper, we concern with the first steganography approach, namely, the LSB approach for
hiding text message in image file, therefore, in what follow we shall only review some of the
most recent researches on image steganography.
Figure 1. Basic components of secure steganography system.
Masud Karim et al. [7] introduced a LSB image steganography that enhances the existing LSB
substitution techniques to improve the security level of hidden information. It encrypts the hidden
information to protect it from unauthorized users before being hidden within the LSB of the
image. They estimated the PSNR to measure the stego images quality. Results demonstrated that
the proposed LSB based image steganography with secret key provides good security and PSNR
value higher than general LSB based image steganography methods.
El-Emam et al. [15] presented a steganography algorithm using non-uniform adaptive image
segmentation with an intelligent computing technique to conceal a large amount of confidential
messages into color images. Their results demonstrate that the algorithm can efficiently hide a
secret message with a capacity of up to four bits per byte while maintaining image visual quality.
Kurtuldu and Arica [16] proposed a steganography method that divides the cover image into
blocks and embeds the corresponding secret data bits into each block without any permutation.
Source
Message
Cover Media
Stego Media
Image Audio Video Text Others
Stego Algorithm
Image
Audio
Video
Text
Others
Image Audio Video Text Others
Password
or Key
4. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013
14
Instead, for a given secret bit sequence, it performs a search on the rows and columns of the
layers for finding the most similar row or column. Experimental results showed that the method
introduces a very low image distortion in comparison to other existing steganography techniques.
Fard et al. [17] developed a novel Genetic Algorithm (GA) evolutionary process to secure
steganography encoding on JPEG images. Narayana and Prasad [18] introduced two methods
wherein cryptography and steganography are combined to encrypt the secret message as well as
to hide the encrypted message in another medium. Although, such methods can provide higher
resistance to steganalysis, but it take long processing time. Bhavana and Sudha [19] described a
steganography algorithm for hiding text message using the LSB method along with the concept of
non-linear dynamic system (chaos) theory. The algorithm provides security and maintains secrecy
of the secret and provides more randomness. The performance of the algorithm is analyzed and
the PSNR value is also being calculated to indicate the effect of the proposed algorithm on the
image quality. Yang and Wang [20] developed a general LSB substitution model called the
transforming LSB substitution model to embed secret data in LSBs of pixels in a cover image.
Yadav et al. [21] developed an image steganography algorithm for message hiding into a gray
level image. The algorithm distributes the message uniformly throughout the image; where the
image is divided into equal size blocks and the message is then hidden into the central pixel of the
block using cyclic combination of 6th
to 8th
bit. The blocks of the image are chosen randomly
using pseudorandom generator seeded with a secret key. The cyclic combination of last three bits
of pixel value provide 100% chances of message insertion at the pixel value and division of
image into blocks distribute the message uniformly into the image. This method also provides
minimum degradation in image quality that cannot be perceived by human eye. Ibrahim and Kuan
[22] proposed an image steganography technique that utilizes a pre-compression step to maximize
the storage of data inside the image. The compressed file is then converted to binary codes and
concealed within the image pixels. The algorithm is tested for hiding various sizes of data inside
images and the PSNR is estimated for each of the images tested. They concluded that their
steganography algorithm is very efficient in data hiding.
Farid [25] and Lyu and Farid [26] modeled a blind steganalyzer using supervised learning (SL)
and indicated that the SL is effective for detecting stego images without knowing the statistical
property of images and steganography methods. Xuan et al. [11] also presented a blind
steganalysis method, which was based on statistical moments of wavelet histogram characteristic
functions and Bayes classifier. Experimental results indicated that this method worked better for
LSB methods. Lie et al. [12] indicated that in general no single feature is capable of
differentiating stego and cover images effectively and a combination of features extracted in
different domain will be generally more promising. By means of extracting features from spatial
and DCT domain, this technique had a good effect for BMP images, including spatial domain and
DCT domain hiding techniques. Luo et al. [27] proposed a blind steganalysis method with high
detection ratio based on best wavelet packet decomposition. The methods based on wavelet high
order statistics, so they cannot perform very well on LSB steganography.
Avcibas et al. [23] presented techniques for steganalysis of images that have been potentially
subjected to a watermarking algorithm. Then, the same authors developed in [24] more universal
techniques for steganalysis of images that have been potentially subjected to steganographic
algorithms, both within the passive warden and active warden frameworks. Simulation results
indicate that the new approach is able with reasonable accuracy to distinguish between cover and
stego images. Sajedi et al. [13] presented a steganalysis called Contourlet Based Steganalysis
(CBS), which uses statistical moments as well as the log errors between the actual and predicted
coefficients of the contourlet transform as features for analysis. After feature extraction, a
nonlinear SVM classifier is applied to classify stego and cover images. This method converts the
5. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013
15
image into gray-scale and then processes it. CBS detection rate is very low when message is
embedded in medium frequency sub-bands and this idea is used in [28] to develop a new
contourlet based steganography algorithm.
3. THE SECURE BPIS ALGORITHM
This section presents description of the proposed BPIS algorithm. The algorithm makes use of
BMP image file as a cover media (cover image) to hide the secret message; therefore, it is
referred to as image steganography. The algorithm utilizes the LSB approach, which is a simple
way of steganography. It is based on replacing one or more of the LSBs of the image pixels with
bits from the secret message (usually not more than 4 bits). The LSB approach either directly
embeds the secret message within the pixels of the cover image, or, in some cases, the LSBs of
the pixels are visited in random or in certain positions of the image [7, 8].
As discussed in Section 2 that there are a number of steganalysis algorithms have been developed
in an attempt to discover hidden data in suspected media or at least detect if a media contains
hidden data. Therefore, it is necessary to think of securing the secret data before proceeding with
the steganography process, and develop more secure steganography algorithms. The BPIS
algorithm is one algorithm in this direction.
The BPIS algorithm consists of two main procedures, which are shown in Figure ). These
procedures are:
(1) Security or pre-steganography procedure.
(2) Steganography procedure.
In what follows, we shall provide a description of these two procedures.
Figure 2. The main components of the BPIS algorithm.
Pre-Steganography Procedure
Steganography Procedure
Secret Message
Convert Secret
Message to Binary
Sequence
Secret
Binary
Sequence
Divide Secret
Binary Sequence
into Blocks
Block
Key or
Password
Generate Permutation
Vector
Permutation
Vector Permute Block
Cover Image
Perform
Steganography
Algorithm
Stego Image
Permuted
Secret Binary
Sequence
Permuted
Blocks
Concatenate
Permuted Block
6. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013
16
3.1. Security or pre-steganography procedure
In this work, a pre-steganography procedure is proposed to secure the secret message before
proceeding with the steganography procedure. The procedure comprises the following steps:
(1) Convert the secret message to a binary sequence (secret binary sequence) using a certain
character-to-binary conversion technique, such as ASCII codes, where each character is
converted to 8-bit binary representation equivalent to its ASCII code and concatenated
with binary representation of previous characters until all characters of the secret message
is converted.
(2) Divide the secret binary sequence into fixed-size blocks of length N.
(3) Permute each block using key-based randomly generated permutation. If the number of
bits in the last block is less than N, then leave the block as it is.
(4) Concatenate the permuted blocks to form a permuted binary sequence, which represent
the permuted secret binary sequence.
Then, in the next procedure, bits from the permuted secret binary sequence are hidden within
LSBs of pixels from the cover image using the steganography procedure described below.
3.1.1. Generation of the permutation vector (P)
In this paper, a simple password-based or key-based permutation generation procedure is
developed to generate a permutation P of length N. The permutation P is generated randomly
using any Random Number Generator (RNG).
The elements of the permutation vector are determined using the following equation:
(1)
Where 1,2,3 are random numbers (0≤ N is the size of the permutation, and Pis (i=1 to N)
represent elements of permutation. After calculating P1, a new element is calculated and it is
accepted only if it is not predetermined, i.e., Pi is not equal to the value of any of the previous
elements P1 to Pi-1. The seed of the RNG is calculated based on a user inserted string of
characters, denoted as the key or the password (K). The same RNG and K must be used to
determine P during the secret message recovery process.
The security of the BPIS algorithm depends on N, and the time complexity is O(N!). In other
word, performing a brute-force attack to determine P requires N! trials. Although, a user can
insert any appropriate integer value for N, it is preferable to select N such that N≥256. Examples
of different permutation of N=16 generated using the procedure described above for different Ks
are given in Table 1. It shows the sensitivity of the function in Eqn. (1) to any change in K.
Table 1. Examples of permutation vectors generated using the random procedure.
Password/Key
(K)
Permutation
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
COMPUTER 5 11 1 3 8 14 6 9 4 10 2 16 15 7 13 12
Computer 15 11 3 5 12 10 6 16 14 13 2 4 9 7 8 7
computer 10 4 5 15 12 8 2 11 16 7 3 6 14 9 13 1
comp2013 4 6 10 7 1 13 9 3 12 14 16 2 8 5 15 11
comp&013 14 8 4 6 1 3 7 11 5 13 16 15 2 12 10 9
computing 15 6 1 3 14 9 16 4 10 8 7 12 5 13 2 11
computers 8 1 13 3 9 7 5 14 15 11 6 10 2 12 16 4
7. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013
17
3.2. Steganography procedure
The steganography approach used in this work is the LSB approach, which is based on modifying
the LSBs of the pixels of the BMP cover image [3-4, 6-7]. In LSB approach, the bits of the
permuted secret binary sequence are distributed among the LSBs of consecutive pixels, starting
from the top-left pixel of the R-plane (Red plane) moving towards the right modifying
consecutive pixels on the row, and then move to the next row and so on until modifying the 1st
bit
of all pixels on the R-plane. If the R-plane is not enough to accommodate all secret bits, then the
process continues in the same way on the G and B planes (Green and Blue planes). If it is still not
enough, repeat the procedure above replacing the 2nd
LSBs of the pixels on all RGB planes, and
continue replacing the 3rd
LSBs if the 2nd
LSBs of the RGB plane are enough to accommodate the
permuted sequence. The process terminated when all secret bits are concealed within the pixels of
the cover image, subject to the constraint that the number of modified LSBs should be not more
than 3.
For example, to hide the permuted secret binary sequence “01100101” into a BMP 24-bit color
image, take eight consecutive pixels starting from top left corner of the R-plane of the cover
image. Assume the equivalent binary bit pattern of those pixels look-like:
Pixel
Value
(Decimal)
39 233 200 39 200 233 200 39
Pixel
Value
(Binary)
00100111 11101001 11001000 00100111 11001000 11101001 11001000 00100111
Figure 3. Pixel values of a cover image.
Then each bit of permuted sequence bits “01100101” are copied sequentially to the LSB's of the
pixels, resulting in the following bit pattern:
Pixel
Value
(Decimal)
38 233 201 38 200 233 200 39
Pixel
Value
(Binary)
00100110 11101001 11001001 00100110 11001000 11101001 11001000 00100111
Figure 4. Pixels values of a stego image.
3.2.1. Stego header
As it can be seen from the above discussion that there are some information are required to enable
successful data recovery from the stego image; these include:
(1) Key or password to generate the seed for the RNG (K).
(2) Block or permutation size (N)
(3) Number of blocks (B)
(4) Stego Header Length (SHL)
All of these information and few others are stored in the stego header. Thus, the actual embedded
binary sequence comprises the stego header and the permuted secret binary sequence. Figure 5
8. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013
18
shows the structure of the stego header, which consists of 9 fields. The names, lengths, and
descriptions of these fields are summarized in Table 2.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 …. L
Name version
SHL
Not
Used
Block Size
(N)
No. of Blocks
(B)
No. of Padded
Bits (D)
Not Used Key or Password (K)
B P I S V L - - N3 N2 N1 N0 B3 B2 B1 B0 D3 D2 D1 D0 - - - - K0 to KL-1 (L is the length of K)
Figure 4. Structure of the stego header.
Table 2. Fields of the stego header.
# Field Name Length (Byte) Description
1 Name 4 Algorithm name which is fixed to BPIS
2 Version 1 Algorithm version
3 SHL 1 Stego header length
4 Not-Used 2 Not used to accommodate future evolution
5 Block Size (N) 4 Block size (Maximum of 65536 Byte)
6 No. of Blocks (B) 4 No. of block allowing to a maximum of 65536 blocks
7 No. of Padded bits (D) 4 No. of padded bits (Maximum of 65536 bits)
8 Not-Used 4 Not-used space for future evolution.
9 Encrypted Key (K) L Encrypted key or password
3.2.2. Algorithm capacity
In this work, since we allow up to a maximum of 3 LSBs to be replaced out of the 8-bit plane
color, then maximum capacity of the algorithm is 37.5%. Therefore, in order to ensure hiding the
whole secret message into a cover image, the relationship between the size of the cover image (S)
and the size of the secret message (M) is:
8 ∙ (M + H) + D ≤ 3 ∙ (S–54) (2)
Or 8 ∙ (M + L + 24) + D ≤ 3 ∙ (S–54) (3)
Where M, H, L, and S are the secret message size, header length, length of the password or key,
and image size (All are in Byte), and D is the number of padded bits (Bit). Thus, S and M should
always satisfy the following equation:
(4)
(5)
3.2.3. Securing stego key (K)
In order to secure K, the key or password used for generating the seed for the RNG, it is
encrypted and embedded within the stego image as part of the stego header. K can be secured
using one of the following approaches.
(1) Encrypt K using a symmetric encryption algorithm (e.g., DES, 3DES, or AES) [13]. In
this case, the communicating parties should agree on a certain procedure to exchange the
9. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013
19
symmetric encryption key (Ksym) securely. This can be accomplished as follows: Encrypt
Ksym using public-encryption algorithm (e.g., RSA), in other words encrypt Ksym using the
public-key of the recipient; so that the recipient can decrypt the encrypted Ksym using his
private-key, reconstruct K, and then proceed with the next secret message recovery steps.
(2) Encrypt K using public-encryption algorithm (e.g., RSA) [13]. in other words encrypt K
using the public-key of the recipient; so that the recipient can reconstruct K using his
private-key, and then proceed with the next secret message recovery steps.
3.3. Performance measures
The performance of the BPIS algorithm is evaluated by estimating two interrelated parameters,
namely, the Mean Square Error (MSE) and the Peak Signal to Noise Ratio (PSNR). In this case,
the MSE is the cumulative squared error between the stego and cover images, and it is expressed
as [19, 22]:
=
1
∙
[ ( , ) − ( , )]2
=1
=1
(6)
Where I(x,y) and K(x,y) represent the value of the pixels at position x,y on the cover and stego
images respectively, and X and Y represent the dimensions of the images. The PSNR is a measure
of quality variation between the cover and stego images, and it is usually expressed in terms of
the logarithmic decibel (dB) scale as follows [19, 22]:
(7)
Where, MAXI is the maximum possible pixel value of the image. When the pixels are represented
using 8-bit per pixel, this it is 255. More generally, when samples are represented using linear
Pulse Code Modulation (PCM) with n-bit per pixel, MAXI is 2n
−1. For color images with three
RGB values per pixel, the definition of PSNR is the same except the MSE is the sum over all
squared value differences divided by image size and by three. The larger PSNR indicates only
little difference is existed between the cover and stego images, which makes it difficult for the
attacker to discover the existence of covered message inside the image.
4. RESULTS AND DISCUSSIONS
In order to investigate the performance of the BPIS algorithm, the algorithm is used in a number
of experiments to hide text files of different sizes into various BMP image files, and the effect of
hiding the text file on stego image quality expressed in terms of PSNR for each steganography
experiment is estimated. In particular, in this paper, four text files of different sizes are selected
from a standard text files corpus, namely, the Calgary corpus [29, 30].
The text files chosen and their sizes are: paper5 (11954 Byte), paper1 (53161 Byte), paper2
(82199 Byte), and Bib (111261 Byte). The BMP image file selected in this investigation is
Flowers.BMP, from which we create three image files of different sizes as summarized in Table
3. The table also shows the maximum allowable capacity for each image for three LSB bit
capacities, 1, 2, and 3 bit per pixel (bpp).
10. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013
20
Table 3. BMP image files
# Image Filename Size
Dimensions
(Pixels)
Maximum Capacity (Cmax) (Byte)
1-bpp 2-bpp 3-bpp
1 Flowers-Small 346,854 Byte (339 KB) 400x289
43350
(42 KB)
86700
(84 KB)
130050
(127 KB)
2 Flowers-Medium 439,454 Byte (430 KB) 450x325
54843
(53 KB)
109686
(107 KB)
164529
(160 KB)
3 Flowers-Large 543,054 Byte (531 KB) 500x362
67875
(66 KB)
135750
(132 KB)
203625
(198 KB)
Other input data includes: the length of the permutation P is 128 (i.e., N=128), and the password
or the key used as a seed for the RNG is “computer”. The results obtained are given in Table 4,
which show following:
(1) The algorithm maintains high stego image quality as the PSNR values are always above
30 dB, which means only slight variations are introduced in pixel values in comparison
with pixel values of the cover image.
(2) If the same text file is concealed in image files of various sizes, the PSNR of the stego
image increases with increasing image file size. This is because as the image size
increases the numbers of pixels that may suffer variations in their values are less. For the
same reason, using the same image file as a cover image, the PSNR of the stego image
increases as the size of the text file decreases. In general, the PSNR is inversely
proportional to R, where R is the ratio between the size of the text file (secret message)
and the maximum image capacity (Cmax), i.e., R=Ssec/Cmax). For example, the PNSR=40
dB for R=85.6%, and 58 dB for R=5.9%.
(3) Furthermore, in order to realize the effect of introducing permutation on the stego image
quality, the PSNR of the stego image is estimated for non-permutated data concealment.
The PSNRs show almost a 100% agreement with their equivalent PSNRs.
Table 4. Experimental results.
#
Text
File
Flowers-Small Flowers-Medium Flowers-Large
R (%)
PSNR (dB)
R (%)
PSNR (dB)
R (%)
PSNR (dB)
No
perm.
BPIS
No
perm.
BPIS
No
perm.
BPIS
1 Paper5 9.2 56.775 56.740 7.3 57.761 57.771 5.9 58.692 58.716
2 Paper1 40.9 48.920 48.907 32.3 51.278 51.269 26.1 52.211 52.220
3 Paper2 63.2 45.469 45.472 50.0 47.168 47.174 40.4 49.032 49.040
4 Bib 85.6 40.824 40.818 67.6 44.754 44.754 54.7 46.508 46.499
5. CONCLUSIONS
This paper presented a description of a new secure block permutation image steganography
(BPIS) algorithm. The algorithm amalgamates the simple concept of permutation with
steganography to provide a relatively fast, reliable, and high information security approach.
Assuming, the steganalysis succeeded in retrieving or predicting the stego bits, and length of the
permutation N, then he/she still has to work hard to predict the actual permutation, where using
brute-force attack the complexity could require N! trials.
11. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013
21
It is highly recommended to carry on further evaluation for this algorithm, such as: investigating
the effect of the permutation size on the algorithm performance in terms of the effect on the stego
image quality and processing time. Investigate the performance of the algorithm for concealing
other types of secret messages, e.g., audio files, smaller images, other types of data file formats.
Finally, uses other image files as cover images.
REFERENCES
[1] Zoran Duric, Michael Jacobs, and Sushil Jajodia. Information Hiding: Steganography and
Steganalysis. Review Article Handbook of Statistics, Vol. 24, pp. 171-187, 2005.
[2] S. Katzenbeisser and F. A. P. Petitcolas. Information Hiding Techniques for Steganography and
Digital Watermarking. Artech House Inc., 2000.
[3] Atallah M. Al-Shatnawi. A New Method in Image Steganography with Improved Image Quality.
Journal of Applied Mathematical Sciences, Vol. 6, No. 79, pp. 3907-3915, 2012.
[4] Rajkumar Yadav, Ravi Saini, and Kamaldeep. Cyclic Combination Method for Digital Image
Steganography with Uniform Distribution of Message. An International Journal on Advanced
Computing (ACIJ), Vol. 2, No. 6, pp. 29-43, November 2011.
[5] T. Morkel, J. H. P. Eloff, and M. S. Olivier. An Overview of Image Steganography. Proceedings of
the 5th Annual Information Security South Africa Conference (ISSA2005) (Eds.: H. S. Venter, J. H.
P. Eloff, L. Labuschagne, and M. M. Eloff), Sandton, South Africa, 2005. Retrieved from
http://martinolivier.com/open/stegoverview.pdf.
[6] Nagham Hamid, Abid Yahya, R. Badlishah Ahmad, and Osamah M. Al-Qershi. Image Steganography
Techniques: An Overview. International Journal of Computer Science and Security (IJCSS), Vol. 6,
Issue 3, pp. 168-187, 2012.
[7] S. M. Masud Karim M. S. Rahman, and M. I. Hossain. A New Approach for LSB Based Image
Steganography using Secret Key. Proceedings of 14th International Conference on Computer and
Information Technology, IEEE Conference Publications, pp. 286 – 291, 2011.
[8] Cheng-Hsing Yang and Shiuh-Jeng Wang. Transforming LSB Substitution for Image-based
Steganography in Matching Algorithms. Journal of Information Science and Engineering (JISE), Vol.
26, pp. 1199-1212, 2010.
[9] Amin Hashemi Pour and Ali Payandeh. A New Steganography Method Based on the Complex
Pixels. Journal of Information Security (JIS), Vol. 3, No. 3, pp. 202-208, 2012.
[10] V. Natarajan and R Anitha. Blind Image Steganalysis Based on Contourlet Transform. International
Journal on Cryptography and Information Security (IJCIS), Vol. 2, No. 3, pp. 77-87, September 2012.
[11] G. R. Xuan, Y. Q. Shi, J. J. Gao, D. Zou, C. Yang, Z. Zhang, P. Chai, C. Chen, and W. Chenl.
Steganalysis based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic
Functions. Proceedings of the 7th International Information Hiding Workshop, LNCS, Vol. 3727, pp.
262-277, Springer-Verlag, 2005.
[12] W. N. Lie and G. S. Lin. A Feature-based Classification Technique for Blind Image Steganalysis.
IEEE Transaction on Multimedia, Vol. 7, No. 6, pp. 1007-1020, 2005.
[13] H. Sajedi, M. Jamzad. A Steganalysis Method based on Contourlet Transform Coefficients.
Proceedings of the International Conference of Intelligent Information Hiding and Multimedia Signal
Processing (IIHMSP’08), pp. 245-248, Harbin, China, 15-17 August, 2008.
[14] William Stallings. Cryptography and Network Security Principles and Practices, 5th Ed., Prentice-
Hall, 2010.
[15] Nameer N. El-Emam, Rasheed Abdul Shaheed Al-Zubidy. New Steganography Algorithm to Conceal
a Large Amount of Secret Message Using Hybrid Adaptive Neural Networks with Modified Adaptive
Genetic Algorithm. Journal of Systems and Software, Vol. 86, Issue 6, pp. 1465-1481, June 2013.
[16] O. Kurtuldu and N Arica. A New Steganography Method Using Image Layers. Proceedings of the
23rd International Symposium on Computer and Information Sciences (ISCIS '08), pp. 1-4, Istanbul,
Turkey, 27-29 October 2008.
[17] A. M. Fard, M. M. R. Akbarzadeh-T, and F. Varasteh-A. A New Genetic Algorithm Approach for
Secure JPEG Steganography. Proceedings of the IEEE International Conference on Engineering of
Intelligent Systems, pp. 1-6, Islamabad, Pakistan, 2006.
12. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013
22
[18] Sujay Narayana and Gaurav Prasad. Two New Approaches for Secured Image Steganography Using
Cryptographic Techniques and Type Conversions. The International Journal of Signal & Image
Processing (SIPIJ), Vol.1, No.2, pp. 60-73, December 2010.
[19] S. Bhavana and K. L. Sudha. Text Steganography Using LSB Insertion Method Along with Chaos
Theory. International Journal of Computer Science, Engineering and Applications (IJCSEA), Vol.2,
No.2, pp. 145-149, April 2012.
[21] Rajkumar Yadav, Ravi Saini and Kamaldeep. Cyclic Combination Method for Digital Image
Steganography with Uniform Distribution of Message. International Journal of Advanced Computing
(ACIJ), Vol. 2, No. 6, pp. 29-43, November 2011.
[22] Rosziati Ibrahim and Teoh Suk Kuan. Steganography Algorithm to Hide Secret Message inside an
Image. Journal of Computer Technology and Application, Vol. 2, pp. 102-108, 2011.
[23] H. Farid. Detecting Hidden Messages Using Higher-Order Statistical Models. Proceedings of IEEE
International Conference on Image processing, Vol. 2, pp. 905-908, New York, USA, 2002.
[24] S. W. Lyu and H. Farid. Steganalysis Using Higher-Order Image Statistics. IEEE Transaction on
Information Forensic Security, vol. 1, pp. 111-119, 2006.
[25] W. Luo, F. Huang, and J. Huang. Edge Adaptive Image Steganography based on LSB Matching
revisited. IEEE Transactions on Information Forensics and Security, Vol. 5, No. 2, pp. 201–214, June
2010.
[26] I. Avcibas, N. D. Memon, and B. Sankur. Steganalysis of Watermarking Techniques Using Image
Quality Metrics. Proceedings of SPIE Security and Watermarking of Multimedia Content III, Vol.
4314. Pp. 523-531, 2001.
[27] I. Avcibas N. D. Memon, and B. Sankur. Steganalysis Using Image Quality Metrics. IEEE
Transaction on Image Process, Vol. 12, pp. 221-229, 2003.
[28] H. Sajedi and M. Jamzad. ContSteg: Contourlet-Based Steganography Method. Journal of Wireless
Sensor Network, Scientific Research Publishing (SRP), California, US, Vol. 1, No. 3, pp. 163-170,
2009.
[29] T. C. Bell, J. C. Cleary, and I. H. Witten. Text Compression. Prentice-Hall, 1990.
[30] Text Corpora. Retrieved from http://corpus.canterbury.ac.nz/descriptions/#calgary on 28 July 2013.
Author
Hussein Al-Bahadili (hbahadili@uop.edu.jo) is an associate professor at University of
Petra (Amman, Jordan). He received his PhD and M.Sc degrees from Queen Mary
College, University of London (London, UK) in 1991 and 1988. He received his B.Sc in
Engineering from University of Baghdad (Baghdad, Iraq) in 1986. He is a visiting
researcher at the Centre of Wireless Networks and Communications (WNCC) at the
School of Engineering, University of Brunel (UK). He has published many papers in
different fields of science and engineering in numerous leading scholarly and practitioner
journals, and presented at leading world-level scholarly conferences. He is the editor of a book titled
Simulation in Computer Network Design and Modeling: Use and Analysi. He has published more than ten
chapters in a book in prestigious books in IT. His research interests include computer networks design and
architecture, routing protocols optimizations, parallel and distributed computing, cryptography and network
security, data compression, software and Web engineering.