This document describes a proposed dual security image steganography technique using matrix partitioning. It involves three main steps: 1) partitioning a secret image into matrices to increase embedding capacity, 2) scrambling secret data bits by replacing the most significant bits instead of least significant bits to provide an additional level of security, and 3) embedding the secret data into a cover image in the spatial domain using least significant bit substitution. The technique can embed grayscale or color images, messages, or images with messages into grayscale or color cover images of any size for enhanced security beyond typical steganography. Diagrams illustrate the embedding and extraction processes.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET Journal
This document proposes a hybrid security model for securing medical image data that integrates steganography and cryptography techniques. The system first enhances the cover image and encrypts the secret medical image using a modified Secure Force algorithm and AES encryption. It then embeds the encrypted secret image into the enhanced cover image using JSteg and LSB coding steganography. This provides a double layer of security by encrypting the data and hiding its existence. The performance of the system is evaluated based on metrics like PSNR, SSIM and correlation to analyze the quality and security of the stego-image.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
Security of data is one of the most challenging problems in todays technological world. In order to secure the transmission of secret data over the public network Internet , numerous data security and hiding algorithms have been developed in the last decade. Steganography combined with cryptography can be one of the best choices for solving this problem. In this paper, the proposed framework is the dual layer of security, in which the first layer is to encrypt the secret text message using advanced encryption standard AES algorithm and in the second layer to embed this message using the indicator based least significant bit LSB method which is used to hide the encrypted text message into the cover image. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually, it depends on indicators to determine where and how many bits to embed at a time. The Mean Square Error MSE and Peak Signal to Noise Ratio PSNR measure the imperceptibility of the system. Experimental results show that the stego image is usually indistinguishable from the cover image. Myo Ma Ma | Zar Zar Hnin | Yin Min Htwe "Secure Data Hiding System by using AES Algorithm and Indicator-Based LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26500.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26500/secure-data-hiding-system-by-using-aes-algorithm-and-indicator-based-lsb-method/myo-ma-ma
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
LSB Based Image Steganography for Information Security Systemijtsrd
Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a cover image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography with various file sizes is analyzed and illustrated their results. Bitmap .bmp image is used as a cover image file to implement the proposed system. The detail Least Significant Bit LSB based image steganography is introduced. In this paper, the new embedding algorithm and extracting algorithm are presented. While embedding the secret message in a cover image file, the starting embedded pixel is chosen according to public shared key between sender and receiver. The original cover image and embedded image with secret message are analyzed with PSNR values and SNR values to achieve security. The resulting embedded image shows the acceptable PSNR and SNR values while comparing with the original cover image. The proposed system can help the information exchanging system over communication media. Aung Myint Aye "LSB Based Image Steganography for Information Security System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-1 , December 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18995.pdf
http://www.ijtsrd.com/computer-science/computer-security/18995/lsb-based-image-steganography-for-information-security-system/aung-myint-aye
A Comparitive Analysis Of Steganography Techniquestheijes
With the increase in rate of unauthorized access and attacks security of confidential data is important. Now a day Cryptography and Steganography are the secure communication media for security purposes. This paper focuses on quantitative comparision of steganography technique such as improved LSB technique for RGB images, pattern based steganography technique and raster scan technique. The simulation has been done on MATLAB 2013 using 20 images and output of few has been shown in this paper. It has been concluded that the on the basis of various factors such as quantitative measures of the three techniques, pattern based steganography technique is the best among the other techniques w.r.t to security , irrespective of the fact that this technique has low capacity.
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
1. The document discusses new and unconventional techniques in pictorial steganography and steganalysis. It introduces MPSteg-color, a new steganographic technique that hides messages in color image coefficients obtained through image decomposition, making the messages harder for steganalysts to detect.
2. The document also proposes a methodology for comparing different steganalysis techniques. An empirical evaluation of four steganalysis algorithms showed that their performance is highly dependent on the training and testing images used.
3. Two targeted steganalysis techniques designed to detect messages hidden using MPSteg-color are also introduced. One detects blocking artifacts introduced during embedding, while the other analyzes histograms of the decomposition
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET Journal
This document proposes a hybrid security model for securing medical image data that integrates steganography and cryptography techniques. The system first enhances the cover image and encrypts the secret medical image using a modified Secure Force algorithm and AES encryption. It then embeds the encrypted secret image into the enhanced cover image using JSteg and LSB coding steganography. This provides a double layer of security by encrypting the data and hiding its existence. The performance of the system is evaluated based on metrics like PSNR, SSIM and correlation to analyze the quality and security of the stego-image.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
Security of data is one of the most challenging problems in todays technological world. In order to secure the transmission of secret data over the public network Internet , numerous data security and hiding algorithms have been developed in the last decade. Steganography combined with cryptography can be one of the best choices for solving this problem. In this paper, the proposed framework is the dual layer of security, in which the first layer is to encrypt the secret text message using advanced encryption standard AES algorithm and in the second layer to embed this message using the indicator based least significant bit LSB method which is used to hide the encrypted text message into the cover image. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually, it depends on indicators to determine where and how many bits to embed at a time. The Mean Square Error MSE and Peak Signal to Noise Ratio PSNR measure the imperceptibility of the system. Experimental results show that the stego image is usually indistinguishable from the cover image. Myo Ma Ma | Zar Zar Hnin | Yin Min Htwe "Secure Data Hiding System by using AES Algorithm and Indicator-Based LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26500.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26500/secure-data-hiding-system-by-using-aes-algorithm-and-indicator-based-lsb-method/myo-ma-ma
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
LSB Based Image Steganography for Information Security Systemijtsrd
Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a cover image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography with various file sizes is analyzed and illustrated their results. Bitmap .bmp image is used as a cover image file to implement the proposed system. The detail Least Significant Bit LSB based image steganography is introduced. In this paper, the new embedding algorithm and extracting algorithm are presented. While embedding the secret message in a cover image file, the starting embedded pixel is chosen according to public shared key between sender and receiver. The original cover image and embedded image with secret message are analyzed with PSNR values and SNR values to achieve security. The resulting embedded image shows the acceptable PSNR and SNR values while comparing with the original cover image. The proposed system can help the information exchanging system over communication media. Aung Myint Aye "LSB Based Image Steganography for Information Security System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-1 , December 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18995.pdf
http://www.ijtsrd.com/computer-science/computer-security/18995/lsb-based-image-steganography-for-information-security-system/aung-myint-aye
A Comparitive Analysis Of Steganography Techniquestheijes
With the increase in rate of unauthorized access and attacks security of confidential data is important. Now a day Cryptography and Steganography are the secure communication media for security purposes. This paper focuses on quantitative comparision of steganography technique such as improved LSB technique for RGB images, pattern based steganography technique and raster scan technique. The simulation has been done on MATLAB 2013 using 20 images and output of few has been shown in this paper. It has been concluded that the on the basis of various factors such as quantitative measures of the three techniques, pattern based steganography technique is the best among the other techniques w.r.t to security , irrespective of the fact that this technique has low capacity.
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
1. The document discusses new and unconventional techniques in pictorial steganography and steganalysis. It introduces MPSteg-color, a new steganographic technique that hides messages in color image coefficients obtained through image decomposition, making the messages harder for steganalysts to detect.
2. The document also proposes a methodology for comparing different steganalysis techniques. An empirical evaluation of four steganalysis algorithms showed that their performance is highly dependent on the training and testing images used.
3. Two targeted steganalysis techniques designed to detect messages hidden using MPSteg-color are also introduced. One detects blocking artifacts introduced during embedding, while the other analyzes histograms of the decomposition
This document summarizes a research paper that proposes a novel two-layer security mechanism combining cryptography and steganography techniques. The paper begins with an introduction discussing security issues with traditional cryptography and steganography methods. It then reviews related work in the fields. The proposed approach encrypts a secret message using AES encryption, splits the cipher file into frames, and embeds the cipher text in video frames using DCT-based steganography. Experimental results show the proposed approach achieves higher PSNR quality measurements than an existing HLSB technique, indicating better quality of stego frames. In addition, the proposed approach does not change file sizes compared to another existing approach.
This document summarizes a research paper on applying steganography techniques for data security. Specifically, it hides encrypted messages within digital images using the dynamic cell spreading technique (DCS) and the RC4 encryption algorithm. The document discusses DCS and RC4 in detail and evaluates the success of hiding encrypted messages in several test images without noticeable quality degradation. It concludes that DCS combined with RC4 encryption provides an effective method for hidden communication and data security.
The document summarizes an improved steganography technique called Bit Plane Complexity Segmentation (BPCS) Steganography. BPCS overcomes limitations of traditional techniques by hiding secret data in the bit-planes of an image vessel. It takes advantage of the human vision system's inability to perceive shape information in complicated binary patterns. The technique replaces noise-like regions of the image bit-planes with secret data without deteriorating image quality. The document describes the BPCS technique, including segmenting images into informative and noise regions, hiding data in the noise regions, and techniques to increase hiding capacity such as conjugating less complex data blocks. It also proposes a web-based BPCS system to provide improved data security and prevent hacking
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
This document summarizes a research paper that proposes a new steganalysis algorithm for detecting hidden messages in PNG images using fuzzy logic techniques. The paper begins with an introduction to steganography and steganalysis. It then provides an overview of common steganography techniques such as LSB substitution and discusses existing steganalysis methods. The paper proposes a steganalysis system for PNG images based on fuzzy logic and evaluates its performance at classifying images as clean or containing hidden messages compared to other artificial intelligence techniques.
Nesting of five modulus method with improved lsb subtitution to hide an image...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
Public key steganography using lsb method with chaotic neural networkIAEME Publication
This document summarizes a research paper that proposes a public key steganography method using least significant bit (LSB) insertion with a chaotic neural network. The method embeds a secret image into a cover image using LSB insertion with a public chaotic map-generated key. A chaotic neural network is then used to merge the cover and secret images. The document provides background on steganography, chaotic maps, neural networks, and LSB insertion. It also reviews related work using neural networks for steganography and iris image protection.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
The document presents an algorithm for detecting hidden messages in PNG images based on fuzzy logic techniques. It discusses steganography and steganalysis techniques such as LSB substitution and discusses their limitations in detecting hidden data in PNG files. The proposed system uses fuzzy logic for classifying images as clean or containing hidden messages. Experimental results show the fuzzy logic system achieved high performance in classifying PNG images.
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
Least-Significant-Bit (LSB) is one of the popular and frequently used steganography techniques to hide a secret message in a digital medium. Its popularity is due to its simplicity in implementation and ease of use. However, such simplicity comes with vulnerabilities. An embedded secret message using the traditional LSB insertion is easily decodable when the stego image is suspected to be hiding a secret message. In this paper, we propose a novel secure and high quality LSB embedding technique. The security of the embedded payload is employed through introducing a novel quadratic embedding sequence. The embedding technique is also text dependent and has non-bounded inputs, making the possibilities of decoding infinite. Due to the exponential growth of and quadratic embedding, a novel cyclic technique is also introduced for the sequence that goes beyond the limits of the cover medium. The proposed method also aims to reduce the noise arising from embedding the secret message by reducing bits changed. This is done by partitioning the cover medium and the secret message into N partitions and artificially creating an assignment problem based on bit change criteria. The assignment problem will be solved using the Hungarian algorithm that will puzzle the secret message partition for an overall least bit change.
Hide text depending on the three channels of pixels in color images using the...IJECEIAES
At the moment, with the great development of information and communications technology, the transfer of confidential and sensitive data through public communications such as the Internet is very difficult to keep them from hackers and attackers. Therefore, it is necessary to work on the development of new and innovative ways to transfer such information and protect it to ensure that it reaches the desired goal. The goal of a new technique to hide information design not only hides the secret message behind the center cover, but it also provides increased security. The most common way to transfer important and confidential data is through embedding it into cover medium files in a way that does not affect the accuracy of the carrier file, which is known as hiding. In this paper, encryption and concealment techniques were used to protect data transferred from attackers. The proposed method relied on encryption of confidential information using the encryption key and the Xnor gate, after which the encrypted information was hidden in a color image using the LSB algorithm. The method of concealment depends on the extraction of chromatic channels of three RGB for each pixel and specifying the channel in which the bit of the encryption message will be hidden. Some metrics have been adopted to measure the quality of the resulting picture after hiding as PSNR and MSE, and achieve good results.
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...IJNSA Journal
Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation
Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert
the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using
a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary
sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted
binary sequence into BMP image file format. The performance of algorithm was given a preliminary
evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited
number of experiments comprised hiding text files of various sizes into BMP images. This paper presents a
deeper algorithm performance evaluation; in particular, it evaluates the effects of length of permutation
and occupation ratio on stego image quality and steganography processing time. Furthermore, it evaluates
the algorithm performance for concealing different types of secret media, such as MS office file formats,
image files, PDF files, executable files, and compressed files.
Hiding Text within Image Using LSB ReplacementIOSR Journals
The document proposes a new algorithm for hiding text within a gray image using least significant bit (LSB) replacement with increased security. The algorithm generates a random key between 1-256 to encrypt the text before embedding it in the image. It uses XOR and AND logic operations to modify the LSB of pixel values and embed the encrypted text. Experimental results show the embedded text can be concealed within the image while maintaining high image quality with PSNR values over 75dB. The algorithm aims to improve upon basic LSB techniques by adding an encryption step using a random key to enhance security of the hidden text.
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map cscpconf
Data security is one of major challenges in the recent literature. Cryptography is the most
common phenomena used to secure data. One main aspect in cryptography is creating a hard to
guess cipher. Artificial Neural Networks (ANN) is one of the machine learning techniques
widely employed in several fields based on its characters, depending on the application area.
One of these fields is data security. The state of art in this paper is the use of self organizing
map (SOM) algorithm concept as a core idea to construct a pad; this pad is used to generate the
cipher at one end. At the other end of communication the same process is synchronized to
generate the same pad as the deciphering key. The security of the proposed model depends on
the complex nature of ANN's. The algorithm could be categorized under symmetric
cryptography, merging both stream and block cipher. A modified version of the same algorithm
also presented employs permutation and variable SOM neighborhoods. The proposal can be
applied over several file formats like videos, images, text files, data benchmarks, etc as show in
experimental results
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A Survey Paper On Different Steganography TechniqueJeff Brooks
This document summarizes a survey paper on different steganography techniques. It begins by defining steganography and its types such as linguistic, image, network, video, audio, and text steganography. It then focuses on least significant bit (LSB) steganography, explaining how it works by replacing the LSB of image pixel values with secret message bits. The paper compares the histograms of cover and stego images, showing they are almost identical. It discusses the advantages of steganography and concludes by analyzing steganography methods and suggesting areas for future work such as increasing embedding capacity while maintaining secrecy.
Iaetsd design of image steganography using haar dwtIaetsd Iaetsd
This document proposes a design for image steganography using Haar discrete wavelet transform (DWT) and average alpha blending techniques. The Haar DWT is used to decompose images into four frequency bands (LL, LH, HL, HH) because it requires less hardware than other transforms like DCT or DFT. The LL bands of the cover and secret images are then blended using average alpha blending according to an alpha value, which represents the percentage of pixel values considered. This blending embeds the secret image into the cover image in the frequency domain. The design aims to balance imperceptibility, quality, and capacity while reducing hardware requirements compared to other transforms.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
This document summarizes a research paper that proposes a novel two-layer security mechanism combining cryptography and steganography techniques. The paper begins with an introduction discussing security issues with traditional cryptography and steganography methods. It then reviews related work in the fields. The proposed approach encrypts a secret message using AES encryption, splits the cipher file into frames, and embeds the cipher text in video frames using DCT-based steganography. Experimental results show the proposed approach achieves higher PSNR quality measurements than an existing HLSB technique, indicating better quality of stego frames. In addition, the proposed approach does not change file sizes compared to another existing approach.
This document summarizes a research paper on applying steganography techniques for data security. Specifically, it hides encrypted messages within digital images using the dynamic cell spreading technique (DCS) and the RC4 encryption algorithm. The document discusses DCS and RC4 in detail and evaluates the success of hiding encrypted messages in several test images without noticeable quality degradation. It concludes that DCS combined with RC4 encryption provides an effective method for hidden communication and data security.
The document summarizes an improved steganography technique called Bit Plane Complexity Segmentation (BPCS) Steganography. BPCS overcomes limitations of traditional techniques by hiding secret data in the bit-planes of an image vessel. It takes advantage of the human vision system's inability to perceive shape information in complicated binary patterns. The technique replaces noise-like regions of the image bit-planes with secret data without deteriorating image quality. The document describes the BPCS technique, including segmenting images into informative and noise regions, hiding data in the noise regions, and techniques to increase hiding capacity such as conjugating less complex data blocks. It also proposes a web-based BPCS system to provide improved data security and prevent hacking
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
This document summarizes a research paper that proposes a new steganalysis algorithm for detecting hidden messages in PNG images using fuzzy logic techniques. The paper begins with an introduction to steganography and steganalysis. It then provides an overview of common steganography techniques such as LSB substitution and discusses existing steganalysis methods. The paper proposes a steganalysis system for PNG images based on fuzzy logic and evaluates its performance at classifying images as clean or containing hidden messages compared to other artificial intelligence techniques.
Nesting of five modulus method with improved lsb subtitution to hide an image...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
Public key steganography using lsb method with chaotic neural networkIAEME Publication
This document summarizes a research paper that proposes a public key steganography method using least significant bit (LSB) insertion with a chaotic neural network. The method embeds a secret image into a cover image using LSB insertion with a public chaotic map-generated key. A chaotic neural network is then used to merge the cover and secret images. The document provides background on steganography, chaotic maps, neural networks, and LSB insertion. It also reviews related work using neural networks for steganography and iris image protection.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
The document presents an algorithm for detecting hidden messages in PNG images based on fuzzy logic techniques. It discusses steganography and steganalysis techniques such as LSB substitution and discusses their limitations in detecting hidden data in PNG files. The proposed system uses fuzzy logic for classifying images as clean or containing hidden messages. Experimental results show the fuzzy logic system achieved high performance in classifying PNG images.
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
Least-Significant-Bit (LSB) is one of the popular and frequently used steganography techniques to hide a secret message in a digital medium. Its popularity is due to its simplicity in implementation and ease of use. However, such simplicity comes with vulnerabilities. An embedded secret message using the traditional LSB insertion is easily decodable when the stego image is suspected to be hiding a secret message. In this paper, we propose a novel secure and high quality LSB embedding technique. The security of the embedded payload is employed through introducing a novel quadratic embedding sequence. The embedding technique is also text dependent and has non-bounded inputs, making the possibilities of decoding infinite. Due to the exponential growth of and quadratic embedding, a novel cyclic technique is also introduced for the sequence that goes beyond the limits of the cover medium. The proposed method also aims to reduce the noise arising from embedding the secret message by reducing bits changed. This is done by partitioning the cover medium and the secret message into N partitions and artificially creating an assignment problem based on bit change criteria. The assignment problem will be solved using the Hungarian algorithm that will puzzle the secret message partition for an overall least bit change.
Hide text depending on the three channels of pixels in color images using the...IJECEIAES
At the moment, with the great development of information and communications technology, the transfer of confidential and sensitive data through public communications such as the Internet is very difficult to keep them from hackers and attackers. Therefore, it is necessary to work on the development of new and innovative ways to transfer such information and protect it to ensure that it reaches the desired goal. The goal of a new technique to hide information design not only hides the secret message behind the center cover, but it also provides increased security. The most common way to transfer important and confidential data is through embedding it into cover medium files in a way that does not affect the accuracy of the carrier file, which is known as hiding. In this paper, encryption and concealment techniques were used to protect data transferred from attackers. The proposed method relied on encryption of confidential information using the encryption key and the Xnor gate, after which the encrypted information was hidden in a color image using the LSB algorithm. The method of concealment depends on the extraction of chromatic channels of three RGB for each pixel and specifying the channel in which the bit of the encryption message will be hidden. Some metrics have been adopted to measure the quality of the resulting picture after hiding as PSNR and MSE, and achieve good results.
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...IJNSA Journal
Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation
Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert
the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using
a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary
sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted
binary sequence into BMP image file format. The performance of algorithm was given a preliminary
evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited
number of experiments comprised hiding text files of various sizes into BMP images. This paper presents a
deeper algorithm performance evaluation; in particular, it evaluates the effects of length of permutation
and occupation ratio on stego image quality and steganography processing time. Furthermore, it evaluates
the algorithm performance for concealing different types of secret media, such as MS office file formats,
image files, PDF files, executable files, and compressed files.
Hiding Text within Image Using LSB ReplacementIOSR Journals
The document proposes a new algorithm for hiding text within a gray image using least significant bit (LSB) replacement with increased security. The algorithm generates a random key between 1-256 to encrypt the text before embedding it in the image. It uses XOR and AND logic operations to modify the LSB of pixel values and embed the encrypted text. Experimental results show the embedded text can be concealed within the image while maintaining high image quality with PSNR values over 75dB. The algorithm aims to improve upon basic LSB techniques by adding an encryption step using a random key to enhance security of the hidden text.
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map cscpconf
Data security is one of major challenges in the recent literature. Cryptography is the most
common phenomena used to secure data. One main aspect in cryptography is creating a hard to
guess cipher. Artificial Neural Networks (ANN) is one of the machine learning techniques
widely employed in several fields based on its characters, depending on the application area.
One of these fields is data security. The state of art in this paper is the use of self organizing
map (SOM) algorithm concept as a core idea to construct a pad; this pad is used to generate the
cipher at one end. At the other end of communication the same process is synchronized to
generate the same pad as the deciphering key. The security of the proposed model depends on
the complex nature of ANN's. The algorithm could be categorized under symmetric
cryptography, merging both stream and block cipher. A modified version of the same algorithm
also presented employs permutation and variable SOM neighborhoods. The proposal can be
applied over several file formats like videos, images, text files, data benchmarks, etc as show in
experimental results
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A Survey Paper On Different Steganography TechniqueJeff Brooks
This document summarizes a survey paper on different steganography techniques. It begins by defining steganography and its types such as linguistic, image, network, video, audio, and text steganography. It then focuses on least significant bit (LSB) steganography, explaining how it works by replacing the LSB of image pixel values with secret message bits. The paper compares the histograms of cover and stego images, showing they are almost identical. It discusses the advantages of steganography and concludes by analyzing steganography methods and suggesting areas for future work such as increasing embedding capacity while maintaining secrecy.
Iaetsd design of image steganography using haar dwtIaetsd Iaetsd
This document proposes a design for image steganography using Haar discrete wavelet transform (DWT) and average alpha blending techniques. The Haar DWT is used to decompose images into four frequency bands (LL, LH, HL, HH) because it requires less hardware than other transforms like DCT or DFT. The LL bands of the cover and secret images are then blended using average alpha blending according to an alpha value, which represents the percentage of pixel values considered. This blending embeds the secret image into the cover image in the frequency domain. The design aims to balance imperceptibility, quality, and capacity while reducing hardware requirements compared to other transforms.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
Hiding algorithm based fused images and Caesar cipher with intelligent securi...IJECEIAES
The process of sending confidential data through the communication media and in complete secrecy is now necessary, whether the data is related to patients, a particular military operation, or a specified office. On the other hand, with the development of various ciphering algorithms, and information hiding algorithms, there is a need to obtain ciphered and hidden data securely without the need to exchange secret keys between the two ends of the communication. In this paper, a hiding algorithm based on fused images and Caesar cipher with intelligent methods to strengthen the security of confidential information is proposed. Firstly, fused image scattering is obtained using 1’s complement and circularly shifting the bits of fused pixels by specified positions before the hiding process. Secondly, the keys for the Caesar cipher are derived from the length of secret information according to the mathematical equation. Thirdly, strengthen the security of Caesar’s cipher by taking a 1’s complement of each letter in the cipher data. The results guarantee the security of the presented algorithm.
This document proposes a system to hide information using four algorithms for image steganography. The system first encrypts data using a modified AES algorithm. It then encrypts the encrypted data using a modified RSA algorithm. Next, it uses a fuzzy stream algorithm to add ambiguity. Finally, it hides the encrypted data in the least significant bits of cover images using LSB steganography. The document evaluates the proposed system using metrics like PSNR, MSE, and SSIM to analyze image quality and the ability to hide data imperceptibly compared to other techniques. It selects four color images as cover files and tests the system on them.
Securing Web Communication Using Three Layer Image ShieldingKamal Pradhan
The internet has revolutionized all forms of communication since the beginning of its existence and serves an important role in data transmission and sharing. Since the rapid growth of internet, information privacy and security have become the most important issues in today’s world. Since the last 2 decades many information hiding techniques have been developed such as digital watermarking, Cryptography and Steganography. Watermarking is the process of embedding a message on a host signal. It has the additional requirement of robustness against possible attacks. A watermark can be either visible or invisible. Using digital watermarking, copyright information can be embedded into the multimedia data Information such the serial number, images or text with special significance can be embedded. The function of this information can be for copyright protection, secret communication, authenticity and distinguishing of data file, etc [1].
The Internet is the essential wellspring of data in the present life where it offers the trade of data to the
clients.The exchange of such data prompts an incredible security danger. Cryptography and steganography
are two issues in security systems.Cryptography jumbles the message to be incomprehensible While
Steganography shroud the message To be invisible. Therefore, Encryption any private data before
concealing in the cover object will provide twofold security. This paper presents a technique for disguise
message with four levels of security where the message first encrypt using modifying vernam cipher, in
which the initial key originate automatically from random pixel of camouflage cover and alter continuously
along message length then embedded cipher message in grayscale cover image, after that encrypt this
cover using modifying vernam cipher also then embedded it in RGB color cover image. The simulation
consequence illustrates that the scheme provides better protection.
This document proposes a technique for hiding one image within another image using a combination of two steganography algorithms: the five modulus method (FMM) and least significant bit (LSB) substitution. The secret image is partitioned into two parts, with 75% hidden using FMM and 25% hidden using LSB substitution within the cover image. Additionally, a private stego-key is used with FMM to increase security. This nesting of algorithms along with a password is intended to make unauthorized extraction of the hidden image from the cover image more difficult. The document discusses related work in image steganography techniques and provides details of the proposed methodology. It is expected that this approach will achieve a good balance between security and
A Study of Various Steganographic Techniques Used for Information Hidingijcses
The art of information hiding has received much attention in the recent years as security of information has
become a big concern in this internet era. As sharing of sensitive information via a common communication
channel has become inevitable, Steganography – the art and science of hiding information has gained
much attention. We are also surrounded by a world of secret communication, where people of all types are
transmitting information as innocent as an encrypted credit card number to an online-store and as
insidious as a terrorist plot to hijackers. Steganography derives from the Greek word steganos, meaning
covered or secret, and graphy (writing or drawing) [1]. Steganography is a technology where modern data
compression, information theory, spread spectrum, and cryptography technologies are brought together to
satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various techniques used
in steganography and to identify areas in which this technique can be applied, so that the human race can
be benefited at large.
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
This document presents an adaptive steganography technique based on an enhanced cipher hiding method for secure data transfer. It combines cryptography and audio steganography. The secret message is first encrypted using a modified least significant bit algorithm and 2's complement operations. The encrypted data is then embedded into the least significant bits of an audio file. Keys are generated and sent with the stego audio to the receiver. The receiver uses the keys to extract the encrypted data from the audio and decrypt it back to the original message. The technique aims to provide better security for data transmission over unsecured networks by taking advantage of both cryptography and steganography.
This document proposes an improved steganography approach using color-guided channels in digital images. It begins with an introduction to steganography and discusses how it can be used to hide secret data or messages within cover objects like images, video, or audio files. The proposed method embeds data into a color image's RGB channels. It first converts the secret message to a binary bit stream and compresses it using run length encoding. The data is then embedded directly into the LSBs of some channels and indirectly into other channels by encoding counts. This approach aims to improve the visual quality of the stego image and have higher embedding capacity compared to existing methods.
This document discusses message transfer using steganography. Steganography is used to hide information like text, images or videos within other media files such as images, videos or music. The document discusses how steganography can be used to securely transfer messages between two parties by hiding the messages within digital files like images without the server being able to decrypt the messages. It discusses how the least significant bits of pixels can be modified to embed secret data without significantly affecting the cover image. Different encryption techniques for embedding the data are also discussed. The document concludes that steganography can help protect messages not only from intruders but also from server-side attacks by making it difficult for the server to detect and decrypt embedded messages.
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...IJNSA Journal
In recent years, the rapid growth of information technology and digital communication has become very important to secure information transmission between the sender and receiver. Therefore, steganography introduces strongly to hide information and to communicate a secret data in an appropriate multimedia carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has been proposed to hide a large amount of secret data presented by secret color image. This algorithm is based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the DSIS algorithm has been applied to embed a secret image randomly instead of sequentially; this approach has been applied before embedding process. The number of bit to be replaced at each byte is non uniform, it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity reached to four bits per byte.
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
The need for keeping safe secrecy of secret and sensitive data has been ever increasing with the new
developments in digital system. In this paper, we present an increased way for getting embedding encrypted
secret facts in gray scale images to give high level safety of facts for news over unsecured narrow channels
Cryptography and Steganography are two closely related techniques are used in proposed system. Cryptography
gets into making one of religion the secret note into a non-recognizable chipper. Steganography is then sent in
name for using Double-Stegging to fix this encrypted data into a cover thing by which something is done and
keeps secret its existence.
A new image steganography algorithm basedIJNSA Journal
In recent years, the rapid growth of information technology and digital communication has become very
important to secure information transmission between the sender and receiver. Therefore, steganography
introduces strongly to hide information and to communicate a secret data in an appropriate multimedia
carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has
been proposed to hide a large amount of secret data presented by secret color image. This algorithm is
based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the
DSIS algorithm has been applied to embed a secret image randomly instead of sequentially; this approach
has been applied before embedding process. The number of bit to be replaced at each byte is non uniform,
it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that
the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity
reached to four bits per byte.
Image steganography using least significant bit and secret map techniques IJECEIAES
The document proposes an image steganography technique that uses least significant bit (LSB) substitution and secret maps. It utilizes 3D chaotic maps, specifically 3D Chebyshev and 3D logistic maps, to generate secret keys for the secret map and to permute secret data before embedding. The secret map controls pixel selection in the cover image for hidden data insertion. Evaluation shows the approach satisfies criteria like imperceptibility and security against attacks, with good hiding capacity, quality, and accuracy compared to previous methods.
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
The document presents a novel hash-based 2-3-3 least significant bit (LSB) image steganography technique for embedding secret images in the spatial domain of color cover images. The technique embeds 8 bits of secret image data at a time in the LSBs of color image pixels in a 2-3-3 pattern across the red, green, and blue channels. Experimental results show the proposed 2-3-3 technique improves mean squared error and peak signal-to-noise ratio values compared to the base 3-3-2 LSB insertion technique. The proposed technique provides better imperceptibility of the stego image and higher embedding capacity than previous hash-based LSB methods.
Similar to DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION (20)
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
1. International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
DOI: 10.5121/ijnsa.2019.11202 13
DUAL SECURITY USING IMAGE STEGANOGRAPHY
BASED MATRIX PARTITION
Huda H.Al.Ghuraify1
, Dr. Ali A.Al-Bakry2
and Dr. Ahmad T. Al-Jayashi3
1
Engineering technical college,al-furat al-awsat university,al-najaf
2
Dean of engineering technical college,al-furat al-awsat university,al-najaf
3
Assistance deanof engineering technical college,al-furat al-awsat university,al-najaf
ABSTRACT
Recently, the mode of living became more complicated without computer systems. The techniques of
camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia
content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access
from suspicion of the existence of confidential information exchanged during communication channels
between the connected parties. In this paper, an integrated image steganographic system is designed to
conceal images, messages or together where the mainly deliberate the improvement of embedding capacity
through embedding text with image simultaneously. For that purpose, used matrix partition to partition the
secret image then embedded each partition separately after scrambling each pixel by replacing msb instead
of lsb to provide the second level of security furthermore to steganography. The simulation results clarify
the better performance of the proposed algorithms.
KEYWORDS
Image steganography, Spatial domain , Matrix partition, Least Significant Bit
1. INTRODUCTION
In this contemporary age, computers and the internet are greater communicating media that join
varied portions of the globe. Therefore, people can easily transfer data. Consequently, the safety
and security stay an important question. The requirement to answer this question has guided to
the improving of steganography system [1].
The name Steganography is formed from a Greek expression, “Steganos” denote "covered " and
“Graptos” denote "writing ", which denote concealed communicating. In this technique, the
existence of a message is camouflage[2] .
Steganography is closely associated with cryptography[3]. Cryptography is the most significant
realm in computer security. Actually, it is a technique for exchanging private data through an
open system correspondence, with the goal that as it were the recipient who has the mystery key
can peruse the encoded messages, which may be reports, telephone discussions, images, or
different types of information[4].Unlike cryptography where communicating is observable, but
the content is kept private, steganography is the scientific discipline that hiding data within some
data media [3].There are five primary class of cover which can be utilize for steganography
technique [5].
Figure 1.demonstrate the kind of media that utilized as a cover for steganography technique.
The Image steganography deals with the information that is concealed in the image and can be
performed in two domains [6]. The spatial domain where the private data is concealed by
2. International Journal of Network
Figure 1. Type of steganography technique according to cover kind
modifying the intensity of pixel values into a cover image within concealing data directly [5] and
Frequency domain where private information is concealed into carrier after converting it into
frequency domain [6]. This technique utilizes a transform coefficient to conceal pr
information. By altering the transform coefficient, private information is to be concealed. This is
broadly utilized as a result of its independence over image formatting. This procedure is
progressively powerful to various sorts of assaults [7].figu
steganography techniques indicated by the embedding domain.
Figure 2. Classification of image steganography technique according to the embedding domain
International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
ype of steganography technique according to cover kind
ity of pixel values into a cover image within concealing data directly [5] and
Frequency domain where private information is concealed into carrier after converting it into
frequency domain [6]. This technique utilizes a transform coefficient to conceal pr
information. By altering the transform coefficient, private information is to be concealed. This is
broadly utilized as a result of its independence over image formatting. This procedure is
progressively powerful to various sorts of assaults [7].figure 2. illustrates the sort of image
steganography techniques indicated by the embedding domain.
lassification of image steganography technique according to the embedding domain
Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
14
ype of steganography technique according to cover kind
ity of pixel values into a cover image within concealing data directly [5] and
Frequency domain where private information is concealed into carrier after converting it into
frequency domain [6]. This technique utilizes a transform coefficient to conceal private
information. By altering the transform coefficient, private information is to be concealed. This is
broadly utilized as a result of its independence over image formatting. This procedure is
re 2. illustrates the sort of image
lassification of image steganography technique according to the embedding domain
3. International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
15
Despite the fact that the aim of the cryptography and steganography system are similar, which is
to supply guard end to end data communicating, their meanings of robustness to the offense are
dissimilar. A cryptography framework is considered as crack when the outsider acquire accesses
to decrypt information, while the steganography framework is considered as crack when the
outsider acquires the appearance of mystery information[8].
Steganography used in broad of applications such as military constitution for protecting the
transmission of private information, intelligence service, in intelligent identity cards where
particular details are hidden in the picture of a person for copyright restrain, medical imaging
where patient’s information is concealed within image give security of information and decrease
transmitting time[9].
In this paper, we present a new partition steganography techniques utilized LSB algorithm in
spatial domain to hide images, messages or together using RGB color and grayscale as cover
images. The remains section of the paper is organized as listed below:
Section 2 shows The literature review. Section 3 explains Model of image Steganography system
with measurement. Section 4 shows the proposed approach. The results are illustrated in section
5, and the conclusions demonstrated in Section 6 pursue the pertinent references.
2. LITERATURE REVIEW
S. Ali, et. al. [10] proposes a spatial domain LSB replacement method for grayscale image
concealed and Arnold transform is applied to ensure security. The proposed system is verified
against a series of standard images and it has features of imperceptibility and security but the
limitation of the method is being slow in extracting algorithm when utilizing large size image
greater than 160*160. Also, it employs images of the same dimensions.
Kh. A. Al-Afandyi, et al. [11] propose a data hiding scheme based on cropping a color image and
separate The private message into section identical image crops and Each section is concealed
into an image crop according to private sequence utilize the LSB. The proposed approach
provides higher security for the private message.
Y. Parti, et al.[12] propose a steganographic approach for grayscale image hidden based on
spatial domains which utilize three times the XOR operation and utilizes three MSB bits 8th, 7th,
and 6th as keys to cipher the private message earlier and then concealed it utilizes the LSB
algorithm. The proposed methods provide another level of security with a simple operation.
S. Mahdie [13] suggests a method based on Selected Least Significant Bit to hide data into color
images utilize magic square. The proposed algorithm has two strong points; the private text is
dispersed among the image using magic square order, which raises the complexity of the
algorithm, and the secret bits are altered by their Xor with the corresponding Selected Least
Significant Bit value but the Mean Square Error approach 10.81.
Kh. F. Rafat, et al.[14] propose Secure image Steganography where the secret information is
dispersed irregular into cover image utilize Stego key dependent position where the attacker may
not definite whether the image holds some hidden data . The proposed scheme is difficult to
detect but limited capacity when applied to color image because of used the only blue channel.
V.Shahuse.[15] suggest Sparse Matrix for Steganography in the spatial domain to encode data
such as the key and message which support the security of the algorithm and the proposed is
better in time of execution but lacks cover image size to analyze performance.
4. International Journal of Network
K. Joshi, et al.[16] propose a
combine it with cryptography in a spatial domain. In the proposed scheme, the private message is
ciphered employ Vernam cipher and then the cipher is hidden into an image utilizes LSB with
Shifting. The proposed method enhances the security of concealed information but doesn't
determine exactly the number of a bit from LSB that used for data hidden to recognize the total
capacity that available to conceal the private message.
3. IMAGE STEGANOGRAPHY
3.1 MODEL OF IMAGE STEGANOGRAPHY
The entire steganography system is constituent of cover media, stego media, concealing
algorithm, extraction algorithm, secret data, and in some model a stego key used where Data
concealing manner is achieved a
receiver part. Steganography systems suppose the private transmitting of the information only
know for sender and receiver [17]. The steganography system that utilizes images as the cover
media is known as an image steganography where conceal private information into images is the
common employ manner as it can gather benefit of the confined power that associate with the
human visual system and an enormous amount of superfluous data of images th
exploited to conceal private information [18]. Figure 3 shows the model of an image
steganography system structure. Initially, the cover image here can be considered in different
sizes and secret data can be either image or message or both.
Figure 3.
International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
K. Joshi, et al.[16] propose a method of image steganography using gray images as cover and
combine it with cryptography in a spatial domain. In the proposed scheme, the private message is
ciphered employ Vernam cipher and then the cipher is hidden into an image utilizes LSB with
ing. The proposed method enhances the security of concealed information but doesn't
determine exactly the number of a bit from LSB that used for data hidden to recognize the total
capacity that available to conceal the private message.
TEGANOGRAPHY SYSTEM
TEGANOGRAPHY SYSTEM
The entire steganography system is constituent of cover media, stego media, concealing
algorithm, extraction algorithm, secret data, and in some model a stego key used where Data
concealing manner is achieved at the sender part while the data extraction is achieved at the
receiver part. Steganography systems suppose the private transmitting of the information only
know for sender and receiver [17]. The steganography system that utilizes images as the cover
is known as an image steganography where conceal private information into images is the
common employ manner as it can gather benefit of the confined power that associate with the
human visual system and an enormous amount of superfluous data of images th
exploited to conceal private information [18]. Figure 3 shows the model of an image
steganography system structure. Initially, the cover image here can be considered in different
sizes and secret data can be either image or message or both.
igure 3.Simple model of image Steganography System
Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
16
method of image steganography using gray images as cover and
combine it with cryptography in a spatial domain. In the proposed scheme, the private message is
ciphered employ Vernam cipher and then the cipher is hidden into an image utilizes LSB with
ing. The proposed method enhances the security of concealed information but doesn't
determine exactly the number of a bit from LSB that used for data hidden to recognize the total
The entire steganography system is constituent of cover media, stego media, concealing
algorithm, extraction algorithm, secret data, and in some model a stego key used where Data
t the sender part while the data extraction is achieved at the
receiver part. Steganography systems suppose the private transmitting of the information only
know for sender and receiver [17]. The steganography system that utilizes images as the cover
is known as an image steganography where conceal private information into images is the
common employ manner as it can gather benefit of the confined power that associate with the
human visual system and an enormous amount of superfluous data of images that can be
exploited to conceal private information [18]. Figure 3 shows the model of an image
steganography system structure. Initially, the cover image here can be considered in different
5. International Journal of Network
3.2 STEGANOGRAPHY MEASUREMENT
There are many factors which can be considered for the steganography measurement but the most
effective parametric quantity that examines the effectiveness of a steganographic s
imperceptibility, which is able to be unnoticed by the human eye. The capacity is explained by
how many bits can be concealed in a cover medium and robustness that define the quantity of
change the stego media can resist before an opponent can de
Figure 4 shows the requisite for any steganography system measurements.
Figure 4. F
4. THE PROPOSED PROCEDURE
4.1
The proposed work in this paper comprises three st
private image to increase capacity, second stage is scrambling the secret data by make MSB
instead of LSB to provide an additional level of security and third stage is Steganography, to
conceal either a grayscale image or message or together inside a grayscale cover
size and also conceal either a color image or message or together inside a color cover
any size using LSB algorithm in spatial domain. Figure 5and figure 6 illustrates the diagra
proposed at sending and receiving part respectively.
International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
EASUREMENT
There are many factors which can be considered for the steganography measurement but the most
effective parametric quantity that examines the effectiveness of a steganographic s
imperceptibility, which is able to be unnoticed by the human eye. The capacity is explained by
how many bits can be concealed in a cover medium and robustness that define the quantity of
change the stego media can resist before an opponent can devastate the concealed data [19].
Figure 4 shows the requisite for any steganography system measurements.
Fundamental properties of steganographic system[19]
ROCEDURE
The proposed work in this paper comprises three stages, first of it using matrix partition for
private image to increase capacity, second stage is scrambling the secret data by make MSB
instead of LSB to provide an additional level of security and third stage is Steganography, to
e image or message or together inside a grayscale cover
size and also conceal either a color image or message or together inside a color cover
any size using LSB algorithm in spatial domain. Figure 5and figure 6 illustrates the diagra
proposed at sending and receiving part respectively.
Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
17
There are many factors which can be considered for the steganography measurement but the most
effective parametric quantity that examines the effectiveness of a steganographic scheme is:
imperceptibility, which is able to be unnoticed by the human eye. The capacity is explained by
how many bits can be concealed in a cover medium and robustness that define the quantity of
vastate the concealed data [19].
ages, first of it using matrix partition for
private image to increase capacity, second stage is scrambling the secret data by make MSB
instead of LSB to provide an additional level of security and third stage is Steganography, to
e image or message or together inside a grayscale cover-image of any
size and also conceal either a color image or message or together inside a color cover-image of
any size using LSB algorithm in spatial domain. Figure 5and figure 6 illustrates the diagram
6. International Journal of Network
Figure 5. Block Diagram
International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
Figure 5. Block Diagram that proposed at sending side
Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
18
7. International Journal of Network
Figure 6. Block Diagram that proposed at receiving side
4.1.1. Embedding Procedure
Cover image and the private informatio
Steps:
1. Read Cover image and Secret data (image/message/imagewith a message).
2. Apply matrix partition to a secret image if the hidden data is image or image with a message
example:-
a- if a secret image is grayscale and size (256*256
matrices (128*256)and(128*256).
b-if a secret image is RGB and size (256*256) first separate channels and then apply matrix
partition to each channel then obtain six matrices each of size(128*256).
3-convert cover image to binary format. The result data will be
((R(rowcover)*C(columncover)) x 8).
4- convert secret data to binary format. The result data will be
((R(rowsecret)*C(columnsecret)) x 8).
5- Apply scrambling to secret data of binary format by making MS
International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
Figure 6. Block Diagram that proposed at receiving side
Embedding Procedure at Sending Side
Cover image and the private information are used here.
1. Read Cover image and Secret data (image/message/imagewith a message).
2. Apply matrix partition to a secret image if the hidden data is image or image with a message
if a secret image is grayscale and size (256*256) then after apply matrix partition obtain two
matrices (128*256)and(128*256).
if a secret image is RGB and size (256*256) first separate channels and then apply matrix
partition to each channel then obtain six matrices each of size(128*256).
over image to binary format. The result data will be
((R(rowcover)*C(columncover)) x 8).
convert secret data to binary format. The result data will be
((R(rowsecret)*C(columnsecret)) x 8).
Apply scrambling to secret data of binary format by making MSB bits instead of LSB bits.
Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
19
2. Apply matrix partition to a secret image if the hidden data is image or image with a message
) then after apply matrix partition obtain two
if a secret image is RGB and size (256*256) first separate channels and then apply matrix
B bits instead of LSB bits.
8. International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
20
6-Each bit of scramble private information will be concealed in a cover image using LSB method
where each scramble matrix partition bits conceal separately.
7-reshape cover image according to size to create stego image.
8-write stego-image to the selected location using BMP format .
4 .1.2. Extraction Procedure at Receiver Side
The Stego image is utilized as the source for the Extraction stage to extract the private
information without the need for a cover image. the following keys are necessitated In order to
extract the private data exactly:
a-The size of one image partition (R partition,C partition) if secret information is an image.
b- The length of the message if secret information is a message.
c- combine a and b if secret information together.
Steps:
1. Enter the Stego image and then read it.
2. Convert format of it to binary form.
3. The least significant bits(according to the hidden algorithm) from 1 to (R partition* C
partition*8) bits of every partition are retrieved for secret image and from 1 to the length of
message bits are retrieved for a secret message Where the type of confidential data is clarify
depending on the name of the stego- image .
4. The retrieved information shape to ((R partition * C partition)retrieved/8) rows and (8)
columns.
5.scramble each binary bits that shaped by making MSB bits instead of LSB bits.
6-converted scramble binary bits to decimal form.
7- shape decimal form according to (R partition,C partition) for secret image partition and
transpose decimal form then convert to a character for a secret message.
8- reshape partition to form an entire secret image if private information contains an image.
9-write secret image to the current directory using .bmp format if private data contain an image
and write a secret message to a text file if private data contain a message.
5. SIMULATION
5.1. SIMULATION SETUP
The proposed algorithm was implemented in MATLAB Version (R2017a) with a computer of the
specifications that demonstrate as follows:
Processor depict : Core(TM) i7-2630QM CPU @ 2.00GHz and RAM- 6Gbytes
5.2. SIMULATION PARAMETERS
Table 1. Parameters Of Simulation That Utilized To Examine Execution Of The Proposed Algorithm
Information Type Details
Cover image RGB image size 640×640×3 and of .jpg format [20].
Grayscale image size 900×800 and of .jpg format [21].
Secret data
RGB image size 284×177 and of .jpg format [22].
Grayscale image of size 292×173 and of .jpg format [23].
Message “ The secret message is the information which is
needed to be hidden in the suitable digital media ”
[24].
9. International Journal of Network
5.3. SIMULATION RESULTS
5.3.1. Visual Quality at Sending Side
From visual quality infer that the employ of the steganography scheme for concealing private
information cannot be distinguished
part .Figure 7 and Figure 8 Exhibit Sending part utilizing both RGB and grayscale image as cover
to form stego image. where the mystery information first scramble by replacing MSB rather than
LSB then embedded scramble information in the cover image according to the embedded
algorithm.
Figure 7. RGB cover image with secret data to form stego image at sending part
International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
ESULTS
t Sending Side
From visual quality infer that the employ of the steganography scheme for concealing private
information cannot be distinguished where the cover image and stego-image similar at sending
part .Figure 7 and Figure 8 Exhibit Sending part utilizing both RGB and grayscale image as cover
where the mystery information first scramble by replacing MSB rather than
n embedded scramble information in the cover image according to the embedded
Figure 7. RGB cover image with secret data to form stego image at sending part
Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
21
From visual quality infer that the employ of the steganography scheme for concealing private
image similar at sending
part .Figure 7 and Figure 8 Exhibit Sending part utilizing both RGB and grayscale image as cover
where the mystery information first scramble by replacing MSB rather than
n embedded scramble information in the cover image according to the embedded
Figure 7. RGB cover image with secret data to form stego image at sending part
10. International Journal of Network
Figure 8. Grayscale cover image with secret data to form stego image at sending p
5.3.2. Visual Quality at receiving
The quality of the retrieved data exhibits that private data and the retrieved data identical. The
PSNR between the private image and retrieved image is (Inf) this signifies that two image
identical. Figure 9 and Figure 10 demonstrate receiving part with extract secret information.
Figure 9. RGB stego image with extract secret data at receiver part
International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
Figure 8. Grayscale cover image with secret data to form stego image at sending p
receiving part
The quality of the retrieved data exhibits that private data and the retrieved data identical. The
PSNR between the private image and retrieved image is (Inf) this signifies that two image
nd Figure 10 demonstrate receiving part with extract secret information.
Figure 9. RGB stego image with extract secret data at receiver part
Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
22
Figure 8. Grayscale cover image with secret data to form stego image at sending part
The quality of the retrieved data exhibits that private data and the retrieved data identical. The
PSNR between the private image and retrieved image is (Inf) this signifies that two image
nd Figure 10 demonstrate receiving part with extract secret information.
Figure 9. RGB stego image with extract secret data at receiver part
11. International Journal of Network
Figure 10. Grayscale stego image with extract secret data at receiver part
5.4. PERFORMANCE MEASURE
For measure stego image performance with respect to cover image,
regarded such as:
5.4.1. Mean Square Error (Mse)
The square of the mistake between the image without secret data and the image with secret data.
Value of MSE determine The distortion in the image [25].MSE is computed utilizing eq.(1)
Where:
C(i,j) : cover image without secret data.
S(i,j) : stego-image with secret data.
m: number of row for image.
n: number of columns for image.
5.4.2. Peak Signal To Noise Ratio (Psnr)
The ratio between the extreme attainable power of a signal to the power of clatter that influence
the correctness of its representation. The greatest value of PSNR demonstrates th
of the stego image[26].PSNR is computed as follows in eq. (2)
Where:
I2
is the maximum possible pixel value of the images.
International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
Figure 10. Grayscale stego image with extract secret data at receiver part
EASURE
asure stego image performance with respect to cover image, several parameters have been
Mean Square Error (Mse)
The square of the mistake between the image without secret data and the image with secret data.
e The distortion in the image [25].MSE is computed utilizing eq.(1)
1
, , … … … 1
C(i,j) : cover image without secret data.
image with secret data.
n: number of columns for image.
Peak Signal To Noise Ratio (Psnr)
The ratio between the extreme attainable power of a signal to the power of clatter that influence
the correctness of its representation. The greatest value of PSNR demonstrates th
of the stego image[26].PSNR is computed as follows in eq. (2)
10 log
$
… … … 2
is the maximum possible pixel value of the images.
Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
23
Figure 10. Grayscale stego image with extract secret data at receiver part
several parameters have been
The square of the mistake between the image without secret data and the image with secret data.
e The distortion in the image [25].MSE is computed utilizing eq.(1)
The ratio between the extreme attainable power of a signal to the power of clatter that influence
the correctness of its representation. The greatest value of PSNR demonstrates the better quality
12. International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
24
5.4.3.Structural Similarity Index Metric ( SSIM)
Is utilized for comparing the similarity between two images[27].the SSIM index can be calculated
according to eq.(3)
$ &, '
2μ(
μ)
+ C 2σ,- + C )
(μ(
+ μ)
+ )(σ, + σ- + )
… … … (3)
Where :
X: reference image
Y: test image.
σx: standard deviation of X
σy: standard deviation of Y
μx : the mean value of X
μy : the mean valueof Y
C1 and C2 : the stabilization constant.
σxy : the correlation between X and Y.
5.4.4.Embedding Rate (Er)
Represent the ratio of the embedded private bits into the entire pixels of the carrier image.
According to the embedding payload rating, an enormous value of ER refer that the
steganographic system has better functioning, that is, a pixel in the cover image can hold more
private bits. On the contrary, a tiny value of ER refers to a worse functioning[28]. The ER is
defined as in eq.(4)
H
M ∗ N
bpp … … … (4)
H :the entire numeral of the embedded private data.
M*N : the size of the carrier image
Table 2.Performance Measure of proposed algorithms utilizing RGB color as cover image
Cover Secret information MSE
PSNR
db
Capacity
available
to
hide/byte
Used
capacity
byte
ER%
For
used
SSIM
Elapsed
time/hide
seconds
Elapsed
time/extract
seconds
RGB
color
Cover
image
(640*640)
(24 bpp)
RGB color secret
image
(284*177)(24bpp)
1.2811 47.0549 307200 150804 12.27% 0.99816 12.008376
0.542885
Message
0.000318 83.1038 153600 97 0.007% 1 12.230383 0.250372
Message with
RGB color secret
image
simultaneous
(284*177)(24bpp)
1.2864 47.037 358400 150901 12.28% 0.99815 12.629328 0.573567
13. International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
25
Table 3.Performance Measure of proposed algorithms utilizing Grayscale as cover image
Cover
Secret
information
MSE
PSNR
db
Capacity
available
to
hide/byte
Used
capacity
byte
ER%
For
used
SSIM
Elapsed
time/hide
seconds
Elapsed
time/extract
seconds
Gray
scale
Cover
image
(900*600)
(8bpp)
Gray scale secret
image
(194*259)(8bpp)
0.92758 48.4573 135000 50246 9.30% 0.99523 1.400487 0.310399
Message
0.000744 79.4125 67500 97 0.017% 1 1.143407 0.113008
Message with
gray secret image
simultaneous
(194*259)(8bpp)
0.93875 48.4053 202500 50343 9.32% 0.99516 2.175494 0.358758
Where the capacity available to hide = (rowcover*columncover* L)
L represents the number of LSB in the entire cover that can be utilized for hiding secret data
according to embedded algorithms.
And used capacity represents the entire numeral of the actual embedded secret data into an
available cover image.
According to table 2 and table 3 the Performance analysis signify that the deviation of stego-
image quality is less and an onlooker cannot identify any distinction between the cover image and
stego image where The closer the SSIM to one is regarded as that the stego image more
comparable to the cover image, the PSNR has value above 40 dB and the MSE has value less
than 1.5.
Enlarge the size of cover image provide better performance in term of steganography system
measurement where The capacity that available to conceal private information increase with
reduced MSE and increase of PSNR while retaining the same secret information as shown in
Figure11,Figure 12and Figure 13 .
Figure 11. Relation between size of cover image and MSE
14. International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
26
Figure 12. Relation between size of cover image and PSNR
Figure 13. Relation between size of cover image and capacity
Table 4. Performance Analysis Of utilize different size of RGB cover image with retain secret data
RGB Cover
image size
640*640*24
bpp
1024*768*24
bpp
1000*1600*24
bpp
PSNR /db 47.037 49.8805 52.966
MSE 1.2864 0.66839 0.32846
Capacity
available/
byte
358400 688128 1400000
Secret data RGB image with message simultaneous
15. International Journal of Network
Table 5. Performance Analysis
The Performance measure in table 4 and table 5 denote that the PSNR value and the capacity
available for hiding secret data enlarge as the cover ima
as the size of the cover image magnify. The proposed system hides the size of any secret image
within the capacity available for camouflage in the cover image while maintaining better
performance in term of a requi
Figure 14.
Table 6.Performance investigation
image while maintain siz
RGB cover image of size 1280* 960*24bpp
Capacity available for hide/byte to this cover:
Secret image
type
RGB secret
image size
194*259
*24 bpp
284*177*24
PSNR /db 51.9521
Capacity used
to hide/ byte
150738
byte
150804 byte
ER % 4.0890% 4.0908%
International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
le 5. Performance Analysis of utilize different size of grayscale cover image with retain secret data
in table 4 and table 5 denote that the PSNR value and the capacity
available for hiding secret data enlarge as the cover image size enlarge and the MSE value decline
as the size of the cover image magnify. The proposed system hides the size of any secret image
within the capacity available for camouflage in the cover image while maintaining better
performance in term of a requirement for the steganographic system as shown in figure14:
Figure 14. Relation between size of secret images and PSNR(db)
Table 6.Performance investigation Of test proposed algorithm with different size of secret RGB color
image while maintain size of cover RGB image
RGB cover image of size 1280* 960*24bpp
Capacity available for hide/byte to this cover:- 921600 byte
RGB image
284*177*24
bpp
193*261*24
bpp
225*225*24
bpp
512*512*24
bpp
51.9197 51.8620 51.8482 44.7650
150804 byte 151119 byte 151875 byte 786432 byte
4.0908% 4.0994% 4.1199% 21.3333%
Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
27
with retain secret data
in table 4 and table 5 denote that the PSNR value and the capacity
ge size enlarge and the MSE value decline
as the size of the cover image magnify. The proposed system hides the size of any secret image
within the capacity available for camouflage in the cover image while maintaining better
rement for the steganographic system as shown in figure14:
of secret images and PSNR(db)
of secret RGB color
512*512*24
bpp
640*480*24
bpp
44.7650 43.9739
786432 byte 921600
21.3333% 25.0000%
16. International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
28
Table 7.Performance investigation of test proposed algorithm with different size of secret grayscale image
while maintain size of cover grayscale image
Table 6 and table 7 exhibit that the proposed algorithm can utilize various size of secret data until
the utilized capacity of secret data equal the capacity that available to hide into cover image with
better value of PSNR as shown in table 6 when the size of secret data (640 * 480 * 24 bpp) the
value of PSNR above 40 dB while the capacity used equally to available capacity into cover
image this indicate better performance of the algorithms.
6. CONCLUSION
In this paper, an integrated image steganographic system based matrix partition utilize RGB color
and grayscale carrier images is proposed to hide text, image, or both, where hiding text with the
image simultaneously in the proposed algorithms provide three features, The first feature seize
the attacker's attention to the amount of data thus supply more protection for private message.
The second feature, offer details about secret image with append secret message embedded in the
cover image simultaneously thus exploit time that consumes when sent them separately and the
third feature uses matrix partition to private image that increase the concealed capacity of the
algorithm. Also, present better performance in terms of speed of execution and extraction. The
simulation results exhibit that our proposed algorithm realize better embedding capacity with the
excellent visual quality of both stego image and extract private image with providing additional
security by using scramble of each pixel furthermore to steganography. The limitation of the
proposed algorithms that stego image loss secret data if exposed to lossy compression because the
algorithm accomplishes in spatial domain using LSB algorithms. As a future work, the proposed
method may be utilized with the encryption algorithms to provide three levels of security and the
proposed method may be also applied in transform domain rather than spatial domain to provide
robustness against attack.
REFERENCES:
[1] N. Hamid, A. Yahya, R. B. Ahmad, and O. M. Al-Qershi, (2018) “Image in image Steganography
Technique based on Arnold Transform and LSB Algorithms,” Int. J. Comput. Sci. Secur., vol. 6, no.
3, pp. 32–39.
[2] A. Sharma, M. Poriye, and V. Kumar, (2017) “A Secure Steganography Technique Using MSB,” Int.
J. Emerg. Res. Manag. &Technology, vol. 6, no. 6, pp. 208–214.
[3] J. M. ud din lone Amit Chaturvedi, (2018) “An Analysis on LSB Image Steganography with Colour
Image as Cover,” Int. J. Comput. Appl., vol. 182, no. 4, pp. 23–28.
Grayscale cover image of size 1280* 848*8 bpp
Capacity available for hide/byte to this cover:- 271360 byte
Secret
image type
Grayscale image
secret
image size
128*128
*8 bpp
182*186*8
bpp
194*259*8
bpp
292*173*8
bpp
225*225*8
bpp
512*512*8
bpp
PSNR /db 56.0194 53.0890 51.4690 51.3917 51.3333 44.2201
Capacity
used to
hide/ byte
16384
byte
33852 byte 50246 byte 50516 byte 50625 byte 262144 byte
ER % 1.5094
%
3.1187% 4.6291% 4.6540% 4.6640% 24.1509%
17. International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
29
[4] H. N. Kamel, M. A. Alia, A. Saeq, and E. A. Maria, (2017) “A S ECURE E- M EDICAL E
XEMPTION S YSTEM ( E-MES ): J ORDAN C ASE,” Int. J. Netw. Secur. Its Appl., vol. 9, no. 2,
pp. 13–19.
[5] M. M. Hashim, M. Shafry, and M. Rahim,( 2018) “A REVIEW AND OPEN ISSUES OF
MULTIFARIOUS IMAGE,” J. Theor. Appl. Inf. Technol., vol. 96, no. 4, pp. 956–977.
[6] D. L. K. Gunda Sai Charan , Nithin Kumar S S V , Karthikeyan B , Vaithiyanathan V, (2015) “A
Novel LSB Based Image Steganography With Multi-Level Encryption,” IEEE Spons. 2nd Int. Conf.
Innov. Inf. Embed. Commun. Syst. ICIIECS’15.
[7] S. C. Dinde and S. B. Patil, (2014) "DWT Domain Data Encryption with Asymmetric key
Cryptography," vol. 3, no. 8, pp. 7744-7747.
[8] I. J. Kadhim, P. Premaratne, P. J. Vial, and B. Halloran, (2018) “Comprehensive survey of image
steganography: Techniques, Evaluations, and trends in future research,” Neurocomputing.
[9] F. M. Shelke, A. A. Dongre, and P. D. Soni, (2014) “Comparison of different techniques for
Steganography in images,” Int. J. Appl. or Innov. Eng. Manag., vol. 3, no. 2, pp. 171–176.
[10] S. A. Al-taweel, M. H. Al-hada, and A. M. Nasser, (2018) “Image in image Steganography Technique
based on Arnold Transform and LSB Algorithms,” Int. J. Comput. Appl., vol. 181, no. 10, pp. 32–39.
[11] K. A. Al-afandy, O. S. Faragallah, and A. Elmhalawy, (2016) “High Security Data Hiding Using
Image Cropping and LSB Least Significant Bit Steganography,” IEEE, pp. 400–404.
[12] Y. P. Astuti, D. R. I. M. Setiadi, E. H. Rachmawanto, and C. A. Sari, (2018) “Simple and secure
image steganography using LSB and triple XOR operation on MSB,” in International Conference on
Information and Communications Technology (ICOIACT) Simple, pp. 191–195.
[13] S. M. Klim, (2017) “SELECTED LEAST SIGNIFICANT BIT APPROACH FOR HIDING
INFORMATION INSIDE COLOR IMAGE STEGANOGRAPHY BY” J. Eng. Sustain. Dev., vol. 21,
no. 01, pp. 74–88.
[14] M. J. Hussain,( 2016) “Secure Steganography for Digital Images,” Int. J. Adv. Comput. Sci. Appl.,
vol. 7, no. 6, pp. 45–59.
[15] V. Shah, (2017)“Sparse Encoded Matrix based Steganography algorithm Vipul Shah,” Int. Res. J.
Eng. Technol., vol. 4, no. 4, pp. 1996–1998.
[16] K. Joshi and R. Yadav, (2015) “A new LSB-S image steganography method blend with Cryptography
for secret communication,” Proc. 3rd Int. Conf. Image Inf. Process. ICIIP, pp. 86–90.
[17] N. K. Jumaa, (2017) “Image Steganography : Review and Comparison,” ResearchGate".
[18] vidhu kiran dutt Shikha, (2014) “Steganography: The Art of Hiding Text in Image using Matlab,” Int.
J. Adv. Res. Comput. Sci. Softw. Eng., vol. 4, no. 9, pp. 822–828.
[19] D. A. A. Sabri and M. J. Mohsin, (2015) “A New Algorithm for a Steganography System,” Eng.
&Tech.Journal, vol. 33, no. 8, pp. 1955–1970.
[20] “https://ae01.alicdn.com/kf/HTB12Cu7NpXXXXaBaXXXq6xXFXXXX/40.jpg_640x640.jpg.” .
[21] “https://jefflynchdev.files.wordpress.com/2008/12/hill_country_landscape_large.jpg.” .
18. International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
30
[22] “https://encrypted-
tbn0.gstatic.com/images?q=tbn:ANd9GcRMmv9KbtAnusL1uh2GlGVat_7mesvJ15Amlr_khloLa3el0
IgA.” .
[23] “https://encrypted-
tbn0.gstatic.com/images?q=tbn:ANd9GcSCdBurtIFUQj7lB12ep57INLBTbDc9BkqmogJM2G6L541
EeZHb.” .
[24] A. M. Al-shatnawi, (2012) “A New Method in Image Steganography with Improved Image Quality,”
Appl. Math. Sci., vol. 6, no. 79, pp. 3907–3915.
[25] M. C. Pallavi Das, Satish Chandra Kushwaha, (2015) “MULTIPLE EMBEDDING SECRET KEY
IMAGE STEGANOGRAPHY USING LSB SUBSTITUTION AND ARNOLD TRANSFORM,”
IEEE Spons. 2ND Int. Conf. Electron. Commun. Syst., pp. 845–849.
[26] P. Mathur and S. Adhikari, (2017) “DATA HIDING IN DIGITAL IMAGES USING
STAGNOGRAPHY PARADIGM : STATE OF THE ART,” Int. J. Adv. Electron. Comput. Sci., vol.
4, no. 2, pp. 98–102.
[27] K. Silpa and S. A. Mastani,( 2012) “COMPARISON OF IMAGE QUALITY METRICS,” Int. J. Eng.
Res. Technol., vol. 1, no. 4, pp. 1–6.
[28] Y. Zhang, J. Jiang, Y. Zha, H. Zhang, and S. Zhao, (2013) “Research on Embedding Capacity and
Efficiency of Information Hiding Based on Digital Images,” Int. J. Intell. Sci., no. 3, pp. 77–85.
19. International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.2, March 2019
31
AUTHORS
Huda .H. Al.ghuraify received her bachelor degree in communication
engineering from Engineering technical college , najaf , Iraq in 2010.she is
currently pursuing the MSC degree at Engineering technical college, AL-Furat
AL-Awsat University Her Research interests include communication security
and image steganography.
Dr .Ali A .Al-bakry was born in Baby loon /Iraq on June 3, 1959. He received his
B.Sc and M.Sc.in electrical engineering department, college of engineering,
university of Baghdad, Baghdad, Iraq, in 1982 and in 1994 respectively and his
PhD degrees in electrical engineering from University of Technology (UoT),
Baghdad, Iraq, in 2006.Since 2004 he is electrical engineering professor and a
Dean of Al-Najaf Engineering Technical College, Al-Furat Al-Awsat Technical
University. His current research interests include high voltage engineering Techniques, electrical
power system stability and intelligent optimization, electric machine drive, renewable energy,
intelligent control techniques, smart and adaptive control in electric power system.
Dr. Ahmad T. Al-jayashi received his bachelor in electrical engineering from
Tikret university. received his MSC in electrical engineering from university of
baghdad and phd from electrical and computer department of michigan state
university.he has more than 29 papers published in different valuable journals and
conferences. He is currently working as assistance dean of al najaf engineering
technical collegeAL-Furat AL-AwsatUniversity. his interested control
theory,advance image processing ,security of communication system,robotics mainpulation
systems.he had been chosen as a reviewer for many journals and conferences.