ABSTRACT
The present workproposes to perform an analysis of the similarities between the least significant two bits of the cover image and multiple series of two-bit-length encrypted frames, all of them from the cryptomessage. After finding the most similar frame, we proceed to substitute it into the cover image; nevertheless, to provide a proof of the improvement from using itor the least similar one, the statistics from both cases are obtained.Providing information that the more similar the frame is, the better statistics the stego-image has. Moreover, the statistics obtained from our work are also compared with other works, finding that we provide a good scheme for hiding information.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityIDES Editor
The document summarizes previous work on mosaic image steganography and proposes using genetic algorithms and key-based random permutation to improve the technique. Mosaic image steganography hides a secret image by dividing it into fragments and embedding the fragments into a target image to create a mosaic. Previous methods required a large database of images or allowed only arbitrary target image selection. The proposed method uses genetic algorithms to generate a mapping sequence for embedding tile images without a database, improving clarity and reducing computational complexity. It also applies a key-based random permutation to the mapping sequence for enhanced security and robustness. The mosaic image can be recovered using the same key and mapping sequence, making it a lossless data hiding method.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
This document describes a proposed dual security image steganography technique using matrix partitioning. It involves three main steps: 1) partitioning a secret image into matrices to increase embedding capacity, 2) scrambling secret data bits by replacing the most significant bits instead of least significant bits to provide an additional level of security, and 3) embedding the secret data into a cover image in the spatial domain using least significant bit substitution. The technique can embed grayscale or color images, messages, or images with messages into grayscale or color cover images of any size for enhanced security beyond typical steganography. Diagrams illustrate the embedding and extraction processes.
Image steganography using least significant bit and secret map techniques IJECEIAES
The document proposes an image steganography technique that uses least significant bit (LSB) substitution and secret maps. It utilizes 3D chaotic maps, specifically 3D Chebyshev and 3D logistic maps, to generate secret keys for the secret map and to permute secret data before embedding. The secret map controls pixel selection in the cover image for hidden data insertion. Evaluation shows the approach satisfies criteria like imperceptibility and security against attacks, with good hiding capacity, quality, and accuracy compared to previous methods.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
This document summarizes a research paper that proposes a conditional entrench spatial domain steganography technique (CESS). CESS embeds secret information in the least significant bit and most significant bit of cover images based on predefined conditions to increase security and capacity. It decomposes cover images into 8x8 blocks. The first block embeds upper and lower bound values used for payload retrieval. Each subsequent 8x8 block embeds the payload in LSBs and MSBs of pixels based on the block's mean of median values and difference between consecutive pixels. The technique is evaluated based on capacity, security and PSNR compared to existing methods.
A new image steganography algorithm basedIJNSA Journal
In recent years, the rapid growth of information technology and digital communication has become very
important to secure information transmission between the sender and receiver. Therefore, steganography
introduces strongly to hide information and to communicate a secret data in an appropriate multimedia
carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has
been proposed to hide a large amount of secret data presented by secret color image. This algorithm is
based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the
DSIS algorithm has been applied to embed a secret image randomly instead of sequentially; this approach
has been applied before embedding process. The number of bit to be replaced at each byte is non uniform,
it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that
the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity
reached to four bits per byte.
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
Multimedia applications are becoming increasingly significant in modern world. The mushroom growth of multimedia data of these applications, particularly over the web has increased the demand for protection of copyright. Digital watermarking is much more acceptable as a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. In this paper, a DWT based watermarking scheme is proposed. We have used Genetic Algorithm (GA) in order to make an optimum tradeoff between imperceptibility and robustness by choosing an optimum watermarking level for each coefficient of the cover image. In addition to the suitable watermarking strength, the selection of best block size is also necessary for superior perceptual shaping functions. To achieve this goal we have trained and used GA to pick the best block size to tailor the watermark in one of the coefficients of the DWT. The fitness function criterion for the genetic algorithm decision making is based on PSNR values
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityIDES Editor
The document summarizes previous work on mosaic image steganography and proposes using genetic algorithms and key-based random permutation to improve the technique. Mosaic image steganography hides a secret image by dividing it into fragments and embedding the fragments into a target image to create a mosaic. Previous methods required a large database of images or allowed only arbitrary target image selection. The proposed method uses genetic algorithms to generate a mapping sequence for embedding tile images without a database, improving clarity and reducing computational complexity. It also applies a key-based random permutation to the mapping sequence for enhanced security and robustness. The mosaic image can be recovered using the same key and mapping sequence, making it a lossless data hiding method.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
This document describes a proposed dual security image steganography technique using matrix partitioning. It involves three main steps: 1) partitioning a secret image into matrices to increase embedding capacity, 2) scrambling secret data bits by replacing the most significant bits instead of least significant bits to provide an additional level of security, and 3) embedding the secret data into a cover image in the spatial domain using least significant bit substitution. The technique can embed grayscale or color images, messages, or images with messages into grayscale or color cover images of any size for enhanced security beyond typical steganography. Diagrams illustrate the embedding and extraction processes.
Image steganography using least significant bit and secret map techniques IJECEIAES
The document proposes an image steganography technique that uses least significant bit (LSB) substitution and secret maps. It utilizes 3D chaotic maps, specifically 3D Chebyshev and 3D logistic maps, to generate secret keys for the secret map and to permute secret data before embedding. The secret map controls pixel selection in the cover image for hidden data insertion. Evaluation shows the approach satisfies criteria like imperceptibility and security against attacks, with good hiding capacity, quality, and accuracy compared to previous methods.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
This document summarizes a research paper that proposes a conditional entrench spatial domain steganography technique (CESS). CESS embeds secret information in the least significant bit and most significant bit of cover images based on predefined conditions to increase security and capacity. It decomposes cover images into 8x8 blocks. The first block embeds upper and lower bound values used for payload retrieval. Each subsequent 8x8 block embeds the payload in LSBs and MSBs of pixels based on the block's mean of median values and difference between consecutive pixels. The technique is evaluated based on capacity, security and PSNR compared to existing methods.
A new image steganography algorithm basedIJNSA Journal
In recent years, the rapid growth of information technology and digital communication has become very
important to secure information transmission between the sender and receiver. Therefore, steganography
introduces strongly to hide information and to communicate a secret data in an appropriate multimedia
carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has
been proposed to hide a large amount of secret data presented by secret color image. This algorithm is
based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the
DSIS algorithm has been applied to embed a secret image randomly instead of sequentially; this approach
has been applied before embedding process. The number of bit to be replaced at each byte is non uniform,
it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that
the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity
reached to four bits per byte.
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
Multimedia applications are becoming increasingly significant in modern world. The mushroom growth of multimedia data of these applications, particularly over the web has increased the demand for protection of copyright. Digital watermarking is much more acceptable as a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. In this paper, a DWT based watermarking scheme is proposed. We have used Genetic Algorithm (GA) in order to make an optimum tradeoff between imperceptibility and robustness by choosing an optimum watermarking level for each coefficient of the cover image. In addition to the suitable watermarking strength, the selection of best block size is also necessary for superior perceptual shaping functions. To achieve this goal we have trained and used GA to pick the best block size to tailor the watermark in one of the coefficients of the DWT. The fitness function criterion for the genetic algorithm decision making is based on PSNR values
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Cloud computing is a powerful, flexible, cost
efficient platform for providing consumer IT services
over the Internet. However Cloud Computing has
various level of risk because most important
information is maintained and managed by third party
vendors, which means harder to maintain security for
user’s data .Steganography is one of the ways to provide
security for secret data by inserting in an image or
video. In this most of the algorithms are based on the
Least Significant Bit (LSB), but the hackers easily
detects it embeds directly. An Efficient and secure
method of embedding secret message-extracting
message into or from color image using Artificial
Neural Network will be proposed. The proposed
method will be tested, implemented and analyzed for
various color images of different sizes and different
sizes of secret messages. The performance of the
algorithm will be analyzed by calculating various
parameters like PSNR, MSE and the results are good
compared to existing algorithms.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other essages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a iphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...sipij
The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This paper introduces two new methods wherein cryptography and steganography are combined to encrypt the data as well as to hide the encrypted data in another medium so the fact that a message being sent is concealed. One of the methods shows how to secure the image by converting it into cipher text by S-DES algorithm using a secret key and conceal this text in another image by steganographic method. Another method shows a new way of hiding an image in another image by encrypting the image directly by S-DES algorithm using a key image and the data obtained is concealed in another image. The proposed method prevents the possibilities of steganalysis also.
LSB Based Image Steganography for Information Security Systemijtsrd
Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a cover image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography with various file sizes is analyzed and illustrated their results. Bitmap .bmp image is used as a cover image file to implement the proposed system. The detail Least Significant Bit LSB based image steganography is introduced. In this paper, the new embedding algorithm and extracting algorithm are presented. While embedding the secret message in a cover image file, the starting embedded pixel is chosen according to public shared key between sender and receiver. The original cover image and embedded image with secret message are analyzed with PSNR values and SNR values to achieve security. The resulting embedded image shows the acceptable PSNR and SNR values while comparing with the original cover image. The proposed system can help the information exchanging system over communication media. Aung Myint Aye "LSB Based Image Steganography for Information Security System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-1 , December 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18995.pdf
http://www.ijtsrd.com/computer-science/computer-security/18995/lsb-based-image-steganography-for-information-security-system/aung-myint-aye
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
1. The document discusses new and unconventional techniques in pictorial steganography and steganalysis. It introduces MPSteg-color, a new steganographic technique that hides messages in color image coefficients obtained through image decomposition, making the messages harder for steganalysts to detect.
2. The document also proposes a methodology for comparing different steganalysis techniques. An empirical evaluation of four steganalysis algorithms showed that their performance is highly dependent on the training and testing images used.
3. Two targeted steganalysis techniques designed to detect messages hidden using MPSteg-color are also introduced. One detects blocking artifacts introduced during embedding, while the other analyzes histograms of the decomposition
This document discusses image encryption using a chaotic artificial neural network. It begins by introducing image encryption and its importance for securely transmitting valuable data over the internet. It then provides background on encryption techniques and discusses how image encryption works. The document outlines chaotic cryptography and why characteristics of chaos make it suitable for cryptography. It also discusses artificial neural networks and how they can be used for image encryption. In particular, it describes using a feedforward neural network with hidden layers to encrypt images.
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
The Least Significant Bit (LSB) algorithm and the Most Significant Bit (MSB) algorithm are stenography algorithms with each one having its demerits. This work therefore proposed a Hybrid approach and compared its efficiency with LSB and MSB algorithms. The Least Significant Bit (LSB) and Most
Significant Bit (MSB) techniques were combined in the proposed algorithm. Two bits (the least significant bit and the most significant bit) of the cover images were replaced with a secret message. Comparisons were made based on Mean-Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR) and the encoding time between the proposed algorithm, LSB and MSB after embedding in digital images. The combined
technique produced a stego-image with minimal distortion in image quality than MSB technique independent of the nature of data that was hidden. However, LSB algorithm produced the best stego-image quality. Large cover images however made the combined algorithm’s quality better improved. The combined algorithm had lesser time of image and text encoding. Therefore, a trade-off exists between the encoding time and the quality of stego-image as demonstrated in this work.
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...Budi Prasetiyo
This document presents a new method for combining steganography and cryptography without changing the quality of the cover image. The method embeds secret messages by finding the bits in the message that match bits in the most significant bit (MSB) of cover images. It stores the indices of the matching bit positions. The indices are then encrypted using the Data Encryption Standard (DES) cryptographic algorithm. Experiments show that the proposed method can securely hide messages in images without degrading image quality. Larger cover images allow hiding more data but require more time for the bit-matching process. Adding noise to cover images starts degrading hidden messages at a mean squared error of 0.00049.
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEJournal For Research
Our modern civilization is based on Internet and sometimes it is required to keep the communication secret. It becomes possible by using two techniques: Cryptography and Steganography. The key concept behind both of two approaches is to hide information in anyway. There is little difference of these two approaches. Cryptography conceals the content of the secret message whereas Steganography is more advanced concept of the former. It embeds the secret message within a cover medium. Steganography is art and science in which the secret message is embedded into a cover medium so that no one else than the sender and the recipient can suspect it. So the third parties except the sender and receiver are imperceptible and unaware of the existence of the secret message. There are so many efficient Steganographic techniques like that text, image, audio, video and so on. This paper proposes only Image Steganographic method using Block Level Entropy Thresholding Technique.
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
A number of techniques are there to converse securely. Encryption and cryptography are enabling us to have a secure conversation. To protect privacy and communicate in an undetectable way it is required to use some steganography technique. This is to hide messages in some other media generally called cover object. In todays digital world where images are a common means of information sharing, most of the steganography techniques use digital images as a carrier for hiding message. In this paper a LSB based technique is proposed for steganograpgy. This technique is different from standard LSB technique that along with message hidden in LSB bits a part of message also resides at other selective bits using a key. The method is developed to increase the payload capacity and make detection impossible.
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...CSCJournals
In this article, the security performance and quality for image encryption and decryption based on filter bank and the combination between XOR and addition modulo 28 have been studied and assessed. The most common security parameters for image encryption and decryption have been employed. The parameters have been used to examine the proposed image encryption scheme with one and two rounds. The parameters include histogram, correlation coefficient, global entropy, block entropy, avalanche effect, number of pixel change rate (NPCR), unified average change intensity (UACI), exhaustive key analysis, and key sensitivity test. The simulation results proved that, the image encryption process passes all these tests. Moreover, it reaches or excels the current state of the arts. So the encrypted image becomes random-like from the statistical point of views after encryption.
Iaetsd design of image steganography using haar dwtIaetsd Iaetsd
This document proposes a design for image steganography using Haar discrete wavelet transform (DWT) and average alpha blending techniques. The Haar DWT is used to decompose images into four frequency bands (LL, LH, HL, HH) because it requires less hardware than other transforms like DCT or DFT. The LL bands of the cover and secret images are then blended using average alpha blending according to an alpha value, which represents the percentage of pixel values considered. This blending embeds the secret image into the cover image in the frequency domain. The design aims to balance imperceptibility, quality, and capacity while reducing hardware requirements compared to other transforms.
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYIJCSEA Journal
The art of information hiding has been around nearly as long as the need for covert communication. Steganography, the concealing of information, arose early on as an extremely useful method for covert information transmission. Steganography is the art of hiding secret message within a larger image or message such that the hidden message or an image is undetectable; this is in contrast to cryptography, where the existence of the message itself is not disguised, but the content is obscure. The goal of a steganographic method is to minimize the visually apparent and statistical differences between the cover data and a steganogram while maximizing the size of the payload. Current digital image steganography presents the challenge of hiding message in a digital image in a way that is robust to image manipulation and attack. This paper explains about how a secret message can be hidden into an image using least significant bit insertion method along with chaos.
A Survey Paper On Different Steganography TechniqueJeff Brooks
This document summarizes a survey paper on different steganography techniques. It begins by defining steganography and its types such as linguistic, image, network, video, audio, and text steganography. It then focuses on least significant bit (LSB) steganography, explaining how it works by replacing the LSB of image pixel values with secret message bits. The paper compares the histograms of cover and stego images, showing they are almost identical. It discusses the advantages of steganography and concludes by analyzing steganography methods and suggesting areas for future work such as increasing embedding capacity while maintaining secrecy.
A Study of Various Steganographic Techniques Used for Information Hidingijcses
The art of information hiding has received much attention in the recent years as security of information has
become a big concern in this internet era. As sharing of sensitive information via a common communication
channel has become inevitable, Steganography – the art and science of hiding information has gained
much attention. We are also surrounded by a world of secret communication, where people of all types are
transmitting information as innocent as an encrypted credit card number to an online-store and as
insidious as a terrorist plot to hijackers. Steganography derives from the Greek word steganos, meaning
covered or secret, and graphy (writing or drawing) [1]. Steganography is a technology where modern data
compression, information theory, spread spectrum, and cryptography technologies are brought together to
satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various techniques used
in steganography and to identify areas in which this technique can be applied, so that the human race can
be benefited at large.
This document discusses message transfer using steganography. Steganography is used to hide information like text, images or videos within other media files such as images, videos or music. The document discusses how steganography can be used to securely transfer messages between two parties by hiding the messages within digital files like images without the server being able to decrypt the messages. It discusses how the least significant bits of pixels can be modified to embed secret data without significantly affecting the cover image. Different encryption techniques for embedding the data are also discussed. The document concludes that steganography can help protect messages not only from intruders but also from server-side attacks by making it difficult for the server to detect and decrypt embedded messages.
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
This document reviews and compares various image steganography techniques that have been proposed by researchers. It begins with defining steganography as hiding communication to prevent detection by enemies. Image steganography techniques hide data in digital images by modifying pixel values. The document evaluates techniques based on invisibility, payload capacity, robustness, file format independence, and image quality using PSNR. Several literature examples are reviewed, including techniques using integer wavelet transform, bit plane complexity analysis, data compression prior to embedding, and transformations like DCT and Arnold transform for increased security. Overall the document provides an overview of image steganography concepts and a comparative analysis of different proposed techniques.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
The document presents a novel hash-based 2-3-3 least significant bit (LSB) image steganography technique for embedding secret images in the spatial domain of color cover images. The technique embeds 8 bits of secret image data at a time in the LSBs of color image pixels in a 2-3-3 pattern across the red, green, and blue channels. Experimental results show the proposed 2-3-3 technique improves mean squared error and peak signal-to-noise ratio values compared to the base 3-3-2 LSB insertion technique. The proposed technique provides better imperceptibility of the stego image and higher embedding capacity than previous hash-based LSB methods.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Cloud computing is a powerful, flexible, cost
efficient platform for providing consumer IT services
over the Internet. However Cloud Computing has
various level of risk because most important
information is maintained and managed by third party
vendors, which means harder to maintain security for
user’s data .Steganography is one of the ways to provide
security for secret data by inserting in an image or
video. In this most of the algorithms are based on the
Least Significant Bit (LSB), but the hackers easily
detects it embeds directly. An Efficient and secure
method of embedding secret message-extracting
message into or from color image using Artificial
Neural Network will be proposed. The proposed
method will be tested, implemented and analyzed for
various color images of different sizes and different
sizes of secret messages. The performance of the
algorithm will be analyzed by calculating various
parameters like PSNR, MSE and the results are good
compared to existing algorithms.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other essages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a iphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...sipij
The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This paper introduces two new methods wherein cryptography and steganography are combined to encrypt the data as well as to hide the encrypted data in another medium so the fact that a message being sent is concealed. One of the methods shows how to secure the image by converting it into cipher text by S-DES algorithm using a secret key and conceal this text in another image by steganographic method. Another method shows a new way of hiding an image in another image by encrypting the image directly by S-DES algorithm using a key image and the data obtained is concealed in another image. The proposed method prevents the possibilities of steganalysis also.
LSB Based Image Steganography for Information Security Systemijtsrd
Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a cover image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography with various file sizes is analyzed and illustrated their results. Bitmap .bmp image is used as a cover image file to implement the proposed system. The detail Least Significant Bit LSB based image steganography is introduced. In this paper, the new embedding algorithm and extracting algorithm are presented. While embedding the secret message in a cover image file, the starting embedded pixel is chosen according to public shared key between sender and receiver. The original cover image and embedded image with secret message are analyzed with PSNR values and SNR values to achieve security. The resulting embedded image shows the acceptable PSNR and SNR values while comparing with the original cover image. The proposed system can help the information exchanging system over communication media. Aung Myint Aye "LSB Based Image Steganography for Information Security System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-1 , December 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18995.pdf
http://www.ijtsrd.com/computer-science/computer-security/18995/lsb-based-image-steganography-for-information-security-system/aung-myint-aye
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
1. The document discusses new and unconventional techniques in pictorial steganography and steganalysis. It introduces MPSteg-color, a new steganographic technique that hides messages in color image coefficients obtained through image decomposition, making the messages harder for steganalysts to detect.
2. The document also proposes a methodology for comparing different steganalysis techniques. An empirical evaluation of four steganalysis algorithms showed that their performance is highly dependent on the training and testing images used.
3. Two targeted steganalysis techniques designed to detect messages hidden using MPSteg-color are also introduced. One detects blocking artifacts introduced during embedding, while the other analyzes histograms of the decomposition
This document discusses image encryption using a chaotic artificial neural network. It begins by introducing image encryption and its importance for securely transmitting valuable data over the internet. It then provides background on encryption techniques and discusses how image encryption works. The document outlines chaotic cryptography and why characteristics of chaos make it suitable for cryptography. It also discusses artificial neural networks and how they can be used for image encryption. In particular, it describes using a feedforward neural network with hidden layers to encrypt images.
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
The Least Significant Bit (LSB) algorithm and the Most Significant Bit (MSB) algorithm are stenography algorithms with each one having its demerits. This work therefore proposed a Hybrid approach and compared its efficiency with LSB and MSB algorithms. The Least Significant Bit (LSB) and Most
Significant Bit (MSB) techniques were combined in the proposed algorithm. Two bits (the least significant bit and the most significant bit) of the cover images were replaced with a secret message. Comparisons were made based on Mean-Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR) and the encoding time between the proposed algorithm, LSB and MSB after embedding in digital images. The combined
technique produced a stego-image with minimal distortion in image quality than MSB technique independent of the nature of data that was hidden. However, LSB algorithm produced the best stego-image quality. Large cover images however made the combined algorithm’s quality better improved. The combined algorithm had lesser time of image and text encoding. Therefore, a trade-off exists between the encoding time and the quality of stego-image as demonstrated in this work.
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...Budi Prasetiyo
This document presents a new method for combining steganography and cryptography without changing the quality of the cover image. The method embeds secret messages by finding the bits in the message that match bits in the most significant bit (MSB) of cover images. It stores the indices of the matching bit positions. The indices are then encrypted using the Data Encryption Standard (DES) cryptographic algorithm. Experiments show that the proposed method can securely hide messages in images without degrading image quality. Larger cover images allow hiding more data but require more time for the bit-matching process. Adding noise to cover images starts degrading hidden messages at a mean squared error of 0.00049.
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEJournal For Research
Our modern civilization is based on Internet and sometimes it is required to keep the communication secret. It becomes possible by using two techniques: Cryptography and Steganography. The key concept behind both of two approaches is to hide information in anyway. There is little difference of these two approaches. Cryptography conceals the content of the secret message whereas Steganography is more advanced concept of the former. It embeds the secret message within a cover medium. Steganography is art and science in which the secret message is embedded into a cover medium so that no one else than the sender and the recipient can suspect it. So the third parties except the sender and receiver are imperceptible and unaware of the existence of the secret message. There are so many efficient Steganographic techniques like that text, image, audio, video and so on. This paper proposes only Image Steganographic method using Block Level Entropy Thresholding Technique.
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
A number of techniques are there to converse securely. Encryption and cryptography are enabling us to have a secure conversation. To protect privacy and communicate in an undetectable way it is required to use some steganography technique. This is to hide messages in some other media generally called cover object. In todays digital world where images are a common means of information sharing, most of the steganography techniques use digital images as a carrier for hiding message. In this paper a LSB based technique is proposed for steganograpgy. This technique is different from standard LSB technique that along with message hidden in LSB bits a part of message also resides at other selective bits using a key. The method is developed to increase the payload capacity and make detection impossible.
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...CSCJournals
In this article, the security performance and quality for image encryption and decryption based on filter bank and the combination between XOR and addition modulo 28 have been studied and assessed. The most common security parameters for image encryption and decryption have been employed. The parameters have been used to examine the proposed image encryption scheme with one and two rounds. The parameters include histogram, correlation coefficient, global entropy, block entropy, avalanche effect, number of pixel change rate (NPCR), unified average change intensity (UACI), exhaustive key analysis, and key sensitivity test. The simulation results proved that, the image encryption process passes all these tests. Moreover, it reaches or excels the current state of the arts. So the encrypted image becomes random-like from the statistical point of views after encryption.
Iaetsd design of image steganography using haar dwtIaetsd Iaetsd
This document proposes a design for image steganography using Haar discrete wavelet transform (DWT) and average alpha blending techniques. The Haar DWT is used to decompose images into four frequency bands (LL, LH, HL, HH) because it requires less hardware than other transforms like DCT or DFT. The LL bands of the cover and secret images are then blended using average alpha blending according to an alpha value, which represents the percentage of pixel values considered. This blending embeds the secret image into the cover image in the frequency domain. The design aims to balance imperceptibility, quality, and capacity while reducing hardware requirements compared to other transforms.
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYIJCSEA Journal
The art of information hiding has been around nearly as long as the need for covert communication. Steganography, the concealing of information, arose early on as an extremely useful method for covert information transmission. Steganography is the art of hiding secret message within a larger image or message such that the hidden message or an image is undetectable; this is in contrast to cryptography, where the existence of the message itself is not disguised, but the content is obscure. The goal of a steganographic method is to minimize the visually apparent and statistical differences between the cover data and a steganogram while maximizing the size of the payload. Current digital image steganography presents the challenge of hiding message in a digital image in a way that is robust to image manipulation and attack. This paper explains about how a secret message can be hidden into an image using least significant bit insertion method along with chaos.
A Survey Paper On Different Steganography TechniqueJeff Brooks
This document summarizes a survey paper on different steganography techniques. It begins by defining steganography and its types such as linguistic, image, network, video, audio, and text steganography. It then focuses on least significant bit (LSB) steganography, explaining how it works by replacing the LSB of image pixel values with secret message bits. The paper compares the histograms of cover and stego images, showing they are almost identical. It discusses the advantages of steganography and concludes by analyzing steganography methods and suggesting areas for future work such as increasing embedding capacity while maintaining secrecy.
A Study of Various Steganographic Techniques Used for Information Hidingijcses
The art of information hiding has received much attention in the recent years as security of information has
become a big concern in this internet era. As sharing of sensitive information via a common communication
channel has become inevitable, Steganography – the art and science of hiding information has gained
much attention. We are also surrounded by a world of secret communication, where people of all types are
transmitting information as innocent as an encrypted credit card number to an online-store and as
insidious as a terrorist plot to hijackers. Steganography derives from the Greek word steganos, meaning
covered or secret, and graphy (writing or drawing) [1]. Steganography is a technology where modern data
compression, information theory, spread spectrum, and cryptography technologies are brought together to
satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various techniques used
in steganography and to identify areas in which this technique can be applied, so that the human race can
be benefited at large.
This document discusses message transfer using steganography. Steganography is used to hide information like text, images or videos within other media files such as images, videos or music. The document discusses how steganography can be used to securely transfer messages between two parties by hiding the messages within digital files like images without the server being able to decrypt the messages. It discusses how the least significant bits of pixels can be modified to embed secret data without significantly affecting the cover image. Different encryption techniques for embedding the data are also discussed. The document concludes that steganography can help protect messages not only from intruders but also from server-side attacks by making it difficult for the server to detect and decrypt embedded messages.
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
This document reviews and compares various image steganography techniques that have been proposed by researchers. It begins with defining steganography as hiding communication to prevent detection by enemies. Image steganography techniques hide data in digital images by modifying pixel values. The document evaluates techniques based on invisibility, payload capacity, robustness, file format independence, and image quality using PSNR. Several literature examples are reviewed, including techniques using integer wavelet transform, bit plane complexity analysis, data compression prior to embedding, and transformations like DCT and Arnold transform for increased security. Overall the document provides an overview of image steganography concepts and a comparative analysis of different proposed techniques.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
The document presents a novel hash-based 2-3-3 least significant bit (LSB) image steganography technique for embedding secret images in the spatial domain of color cover images. The technique embeds 8 bits of secret image data at a time in the LSBs of color image pixels in a 2-3-3 pattern across the red, green, and blue channels. Experimental results show the proposed 2-3-3 technique improves mean squared error and peak signal-to-noise ratio values compared to the base 3-3-2 LSB insertion technique. The proposed technique provides better imperceptibility of the stego image and higher embedding capacity than previous hash-based LSB methods.
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...IJNSA Journal
In recent years, the rapid growth of information technology and digital communication has become very important to secure information transmission between the sender and receiver. Therefore, steganography introduces strongly to hide information and to communicate a secret data in an appropriate multimedia carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has been proposed to hide a large amount of secret data presented by secret color image. This algorithm is based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the DSIS algorithm has been applied to embed a secret image randomly instead of sequentially; this approach has been applied before embedding process. The number of bit to be replaced at each byte is non uniform, it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity reached to four bits per byte.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
This document summarizes a research paper that proposes a new steganalysis algorithm for detecting hidden messages in PNG images using fuzzy logic techniques. The paper begins with an introduction to steganography and steganalysis. It then provides an overview of common steganography techniques such as LSB substitution and discusses existing steganalysis methods. The paper proposes a steganalysis system for PNG images based on fuzzy logic and evaluates its performance at classifying images as clean or containing hidden messages compared to other artificial intelligence techniques.
The document summarizes an improved steganography technique called Bit Plane Complexity Segmentation (BPCS) Steganography. BPCS overcomes limitations of traditional techniques by hiding secret data in the bit-planes of an image vessel. It takes advantage of the human vision system's inability to perceive shape information in complicated binary patterns. The technique replaces noise-like regions of the image bit-planes with secret data without deteriorating image quality. The document describes the BPCS technique, including segmenting images into informative and noise regions, hiding data in the noise regions, and techniques to increase hiding capacity such as conjugating less complex data blocks. It also proposes a web-based BPCS system to provide improved data security and prevent hacking
This document proposes an improved steganography approach using color-guided channels in digital images. It begins with an introduction to steganography and discusses how it can be used to hide secret data or messages within cover objects like images, video, or audio files. The proposed method embeds data into a color image's RGB channels. It first converts the secret message to a binary bit stream and compresses it using run length encoding. The data is then embedded directly into the LSBs of some channels and indirectly into other channels by encoding counts. This approach aims to improve the visual quality of the stego image and have higher embedding capacity compared to existing methods.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
The document presents an algorithm for detecting hidden messages in PNG images based on fuzzy logic techniques. It discusses steganography and steganalysis techniques such as LSB substitution and discusses their limitations in detecting hidden data in PNG files. The proposed system uses fuzzy logic for classifying images as clean or containing hidden messages. Experimental results show the fuzzy logic system achieved high performance in classifying PNG images.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
This document summarizes a research paper that proposes a dual security image steganography technique using matrix partitioning. The technique has three stages: 1) It partitions a secret image into matrices to increase embedding capacity. 2) It scrambles secret data bits by replacing the most significant bits instead of least significant bits to provide another level of security. 3) It uses least significant bit steganography to conceal grayscale or color images, messages, or images with messages into grayscale or color cover images of any size. The technique aims to improve security over traditional steganography by partitioning and scrambling the secret data before embedding. Simulation results showed the proposed algorithm had better performance than other techniques.
Securing Web Communication Using Three Layer Image ShieldingKamal Pradhan
The internet has revolutionized all forms of communication since the beginning of its existence and serves an important role in data transmission and sharing. Since the rapid growth of internet, information privacy and security have become the most important issues in today’s world. Since the last 2 decades many information hiding techniques have been developed such as digital watermarking, Cryptography and Steganography. Watermarking is the process of embedding a message on a host signal. It has the additional requirement of robustness against possible attacks. A watermark can be either visible or invisible. Using digital watermarking, copyright information can be embedded into the multimedia data Information such the serial number, images or text with special significance can be embedded. The function of this information can be for copyright protection, secret communication, authenticity and distinguishing of data file, etc [1].
Public key steganography using lsb method with chaotic neural networkIAEME Publication
This document summarizes a research paper that proposes a public key steganography method using least significant bit (LSB) insertion with a chaotic neural network. The method embeds a secret image into a cover image using LSB insertion with a public chaotic map-generated key. A chaotic neural network is then used to merge the cover and secret images. The document provides background on steganography, chaotic maps, neural networks, and LSB insertion. It also reviews related work using neural networks for steganography and iris image protection.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
This document summarizes a research paper that proposes a new methodology for reducing additive distortion in steganography. The paper introduces a method to embed 2 bits of information in a pixel by altering only one bit plane. This is expected to make detection of covert communication more difficult for steganalysis algorithms compared to altering the least significant bit. The method uses Java for implementation and MATLAB to analyze histograms of original and stego images. Experimental results on embedding secret text in images are presented, along with analysis of the distortion levels and security of the proposed approach.
1. The document discusses image steganography techniques for hiding secret messages in digital images. It describes how the least significant bits of pixels can be modified to embed data without noticeable changes to the image.
2. The least vital bit (LSB) insertion method is described as a common approach, where the least significant bit of bytes in an image is altered to bits of a hidden message.
3. For security, the document recommends using both steganography and cryptography together. Encrypting the message before embedding it into an image provides multiple layers of protection.
Similar to STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH ANALYSIS OF THE COVER IMAGE AND THE ENCRYPTED MESSAGE (20)
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH ANALYSIS OF THE COVER IMAGE AND THE ENCRYPTED MESSAGE
1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
DOI: 10.5121/ijcsit.2018.10604 31
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST
SIGNIFICANT BIT DETERMINED THROUGH
ANALYSIS OF THE COVER IMAGE AND THE
ENCRYPTED MESSAGE
Martha Angelica Garcia-Villa, Ricardo Francisco Martinez-Gonzalez
Juan Francisco Mejia-Perez, Miguel Valerio-Canales
and Yesenia Isabel Moreno-Pavan
Tecnologico Nacional de México/IT Veracruz, Veracruz, Mexico
ABSTRACT
The present workproposes to perform an analysis of the similarities between the least significant two bits of
the cover image and multiple series of two-bit-length encrypted frames, all of them from the crypto-
message. After finding the most similar frame, we proceed to substitute it into the cover image;
nevertheless, to provide a proof of the improvement from using itor the least similar one, the statistics from
both cases are obtained.Providing information that the more similar the frame is, the better statistics the
stego-image has. Moreover, the statistics obtained from our work are also compared with other works,
finding that we provide a good scheme for hiding information.
KEYWORDS
Steganographic scheme, Information encryption, Substitution of the least significant bits.
1. INTRODUCTION
Communication is essential for daily life; unfortunately, there are problems on transmitting
messages, given that the information can be intercepted by unwanted readers to whom it was not
originally sent. For this reason, developers work in hiding the transmission and reception of
information by different methods; one of them is the term "data encryption", that it was coined
with the arrival of the digital era. Which consists of rendering the information illegible, and it can
only be read by a specific key holder [1].
There are several techniques of information concealment, being the steganography an art that
consists in the application of different techniques to hide messages into a medium [2], with the
purpose that the information embedded in the cover medium cannot be possible to decrypt, and
also remaining its main characteristics to reduce detection possibility. Even though there are
multiple types of cover medium; in the present manuscript, we put focus on images used to insert
the information to be hidden [3].
The advantage of using a digital image as a cover medium is the digital processing, because it
helps on the purpose of studying steganography by replacing the least significant bit (LSB) [4],
2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
given that it allows access to information and location of each pixel in the image. The numerical
value contained in each pixel is responsible for varyin
together within a matrix to form the image. This fact is a great advantage within the
steganography since you can vary the information of the pixels in a minimal way to insert the
hidden message in it without cau
Steganography is a fairly noble weapon when it comes to the concealment of messages since it
has several attributes that allow the medium to maintain its quality and have a distortion not
perceptible by the human senses, which are the following:
• Confidentiality is an attribute of steganography which ensures that only authorized persons,
with the secret key, can access the information embedded in the cover medium.
• Integrity, the attribute that provides the
modified.
• Non-repudiation is the attribute that allows verifying when a sender or receiver denies the
transmitted information.
• Authentication allows confirming sender and receiver identity inside
Figure 1 shows the methodology in the development of steganography [
basically follows it, but with different techniques of encryption and reading of the data. In almost
every method, each author has his/her
transmission.
Figure 1.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
given that it allows access to information and location of each pixel in the image. The numerical
value contained in each pixel is responsible for varying brightness and contrast, and they are put
together within a matrix to form the image. This fact is a great advantage within the
steganography since you can vary the information of the pixels in a minimal way to insert the
hidden message in it without causing a great impact on the image information.
Steganography is a fairly noble weapon when it comes to the concealment of messages since it
has several attributes that allow the medium to maintain its quality and have a distortion not
man senses, which are the following:
• Confidentiality is an attribute of steganography which ensures that only authorized persons,
with the secret key, can access the information embedded in the cover medium.
• Integrity, the attribute that provides the information of when the transmitted message has been
repudiation is the attribute that allows verifying when a sender or receiver denies the
• Authentication allows confirming sender and receiver identity inside communication processes.
Figure 1 shows the methodology in the development of steganography [5], the proposed method
basically follows it, but with different techniques of encryption and reading of the data. In almost
every method, each author has his/her own method to provide security and confidentiality in data
1. General model for steganographic scheme.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
32
given that it allows access to information and location of each pixel in the image. The numerical
g brightness and contrast, and they are put
together within a matrix to form the image. This fact is a great advantage within the
steganography since you can vary the information of the pixels in a minimal way to insert the
Steganography is a fairly noble weapon when it comes to the concealment of messages since it
has several attributes that allow the medium to maintain its quality and have a distortion not
• Confidentiality is an attribute of steganography which ensures that only authorized persons,
information of when the transmitted message has been
repudiation is the attribute that allows verifying when a sender or receiver denies the
communication processes.
], the proposed method
basically follows it, but with different techniques of encryption and reading of the data. In almost
own method to provide security and confidentiality in data
3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
33
According to some authors, the term stegoimage refers to the image that already has an embedded
information in it, and it can be considered as the output of a coding function; where such function
takes on the original image, the data and a secret encryption key. The decoding function aims to
reconstruct the hidden data after processing the stegoimage and secret decoding key [6].
To insert the information within a cover medium, it is necessary to statistically generate digital
signals that provide high security and performance [7]; whereby, we use the Bernoulli map. This
map works perfectly with digital implementation, and it is defined as an iterated map of a piece-
wise linear function (PWL) and using the appropriate values for the variables, the Bernoulli map
behaves alike a chaotic dynamic system [8], and its mathematical representation is expressed in
Eq. 1. Besides our current implementation, in the future we do not discard the possibility to
implement a digital system that hides information into “innocent” packages, so developing ideas
with a map easy to implement in digital systems is a milestone for our research.
=
2 , 0 ≤ < 0.5
2 − 1, 0.5 ≤ < 1
Eq. 1
where:
xn is the result of the iteration in the current time
xn+1 result of the iteration in future time.
µ represents the feedback factor and is in the interval [0,1].
Each pixel in the cover image is in a binary coding, so it is necessary to modify the domain of the
Bernoulli map, to be able to work only with integer values in [0, 255] range. To make the
adjustment, Eq. 2 is applied to the map output,
= ( ∗ 2 ) Eq. 2
where:
X is the resulting output of the iterations of Eq. 1.
Y is the set of well-ranged integer valuesobtained from X.
floor is a function that truncates decimals to only get integer-part of a real number.
2. METHODS
Traditionally, steganographic methods based on the least-significant bit substitution are limited to
replace a number of leastsignificant bits in pixels [9]. The number is determined by the
information that is pretended to send in a hidden manner. In other proposals, the author
introduces another padlock when encrypting the hidden information, thereby increasing security
by preventing possible threats. Another advantage of the last method relies on the fact that the
encrypted information usually has a shape similar to the apparent randomness of the last bits of an
image. Causing the statistics associated with the image not to be seriously affected by the
information substitution, and inherently increasing the degree of imperceptibility.
Even with the advantages of using the data encryption, its apparently low level of impact on the
cover image, it is not possible to ensure because of the lack of a study prior to the substitution. In
4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
34
the present paper, we propose a methodology in which the cover image is firstly analyzed, and
then the least significant bits in the image are replaced by the closest encrypted frame.
2.1 Presentation of The Proposed Methodology
The proposed method begins by the cover image reading after that such image is processed to
extract the two least significant bits in each pixel; they are analyzed, obtaining the statistical
analysis of their occurrence. After the analysis, we proceed to obtain the to-be-hidden message. It
is important to note that the maximum information that can be embedded with the proposed
methodology depends on the cover image size, and such limit is the image size divided by four.
The next step is to encrypt the message. For such activity, a sequence generated by Bernoulli map
limited to 32 bits length. It is taken from scaling the double-precision numbers to 32-bit integers.
Because of employing the double precision sequence, the presence of the dynamic system
degradation is greatly reduced from being represented by finite systems, or in this case integer-
only representation.
The double-precision complete sequence must consist of the number of dibits in the to-be-hidden
information. In other words, if you want to hide one kilobyte of information, you will need a
sequence of four thousand elements. The 32-bit scaled sequence is divided into dibits, leaving a
total of sixteen sequences, each of the two bits long.
Despite the statistical similarity between them, the sixteen sequences are not equal, and they do
not have the same occurrence. Moreover, they deliver encrypted messages with certain
characteristics, and we need to choose the more similar to the last two bits in the cover image.
Therefore, the next step is to use the sixteen sequences to encrypt the to-be-hidden message,
giving a total of sixteen encrypted messages.
Every encrypted message is analyzed to know their values occurrence, and later to compare their
analysis with the analysis of the last two bits of the cover image. On next, the encrypted message
whose occurrence is more similar to cover image’s one is selected. Finally, the selected message
is embedded in the corresponding cover image pixel. The complete scheme of the aforementioned
is shown in Figure 2.
5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
Figur
3. IMPLEMENTATION OF THE
The implementation of the steganographic scheme was done using Matlab, where the first step is
the use of the command imread, that allows to acquire any type of image and generate an array
where each of the pixels is represented in color layer in
in the case of grayscale images, the representation of the image lies on a 1D matrix. For the
present proposal, the image used as the covering is the grayscale Macaw.
The next step is to read the information fil
Lorem-ipsum file. For such, we have the set of functions integrated by
The first one allows to call a file and reserve it for being used by Matlab.
content that is currently reserved, and its content is assigned to a variable for later handling. And
fclose function release the resource back to the operating system so that it can be used by any
program.
After having the information in a
generate the cipher sequences is obtained
be into [0.75, 1] range to exhibit a pseudorandom behavior
not so important as it is in [0,1] range
information to be hidden, so this value is taken from a function named length and multiplied by
four. The calculated value will be used to limit the cycle of the d
generation. The road followed until this point is described in Pseudocode 1.
Pseudocode 1. Carry image and to
001: get carry image from file (im)
002: open to-hide message
003: read to-hide message file
004: store message file in (mg) variable
005: close to-hide message file
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
Figure 2. Proposed steganographic scheme
MPLEMENTATION OF THE PROPOSAL USING MATLAB
The implementation of the steganographic scheme was done using Matlab, where the first step is
imread, that allows to acquire any type of image and generate an array
where each of the pixels is represented in color layer in a 3D matrix of 8-bit integers; nonetheless,
in the case of grayscale images, the representation of the image lies on a 1D matrix. For the
present proposal, the image used as the covering is the grayscale Macaw.
The next step is to read the information file, which in this case is a one-thousand
ipsum file. For such, we have the set of functions integrated by fopen, fread
The first one allows to call a file and reserve it for being used by Matlab. fread
content that is currently reserved, and its content is assigned to a variable for later handling. And
function release the resource back to the operating system so that it can be used by any
After having the information in a variable, the double-precision sequence that will serve to
generate the cipher sequences is obtained. It is important to notice that feedback factor (u) must
be into [0.75, 1] range to exhibit a pseudorandom behavior [10]; meanwhile, the initial value is
not so important as it is in [0,1] range. This sequence must be four times the length of the
information to be hidden, so this value is taken from a function named length and multiplied by
four. The calculated value will be used to limit the cycle of the double-precision sequence
generation. The road followed until this point is described in Pseudocode 1.
Carry image and to-hide message acquisition, as well as primary ciphering
sequence generation.
) variable
006: initialize (u, lm, aux, aux1,
precision variable
007: lms<= calculate mg length
008: initialize (s1) vector of double
withlms length
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
35
The implementation of the steganographic scheme was done using Matlab, where the first step is
, that allows to acquire any type of image and generate an array
bit integers; nonetheless,
in the case of grayscale images, the representation of the image lies on a 1D matrix. For the
thousand-character
fread and fclose.
fread captures file
content that is currently reserved, and its content is assigned to a variable for later handling. And
function release the resource back to the operating system so that it can be used by any
precision sequence that will serve to
. It is important to notice that feedback factor (u) must
; meanwhile, the initial value is
. This sequence must be four times the length of the
information to be hidden, so this value is taken from a function named length and multiplied by
precision sequence
hide message acquisition, as well as primary ciphering
b, c) double-
) vector of double-precision
6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
009: s1[1]<= 0.8
009: initialize a for cycle from 2 to
variable
The primary floating-point sequence is scaled and li
sequence that only allows integers in the range of zero to 2
chunked in dibits. For such activity, the two least significant bits are taken by the mod function
with 2; then the sequence divided by 2 and the decimal part is eliminated using the floor function.
The process is repeated sixteen times to cover the complete 32
After having obtained the sixteen two
information to be encrypted, so that it coincides in word width with the two
sequences. To do so, the whole message is taken and separated by characters, placing them in
rows in one array; after that, the characters are divided in dibits, and
columns of the same row. The last step is to vectorize the matrix, letting the last dibit of the first
characters next to the first dibit of the second character, and so on. The complete scheme is
presented in Figure 3.
Figure 3. Vectorization scheme of the container matrix
To finish the second section of the
to encrypt the segmented to-hide
After the encryption, the frames
three. The whole process can be seen in
Pseudocode 2. Scaling and division of the primary encrypting sequence and to
013: s1<=s1 multiplied by (2 powered by 32)
014: s1<=truncate s1
015: initialize (s2) vector of double
with lms length
016: initialize a for cycle from 16 to 1 with
decrements of a variable
017: aux<= divide s1 by 4
018: s2[a,:]<= extract decimal part from
019: s1<= truncate aux
020: end for cycle
021:
022: initialize (mg1) as a matrix of double
precision with lms length and 16 width
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
009: initialize a for cycle from 2 to lms with a
010: aux <= divide s1[a-1] by 2
011: s1[a]<= extract decimal part from
012: end for cycle
point sequence is scaled and limited truncate operation, generating a
sequence that only allows integers in the range of zero to 232
. Once the sequence is scaled, it is
chunked in dibits. For such activity, the two least significant bits are taken by the mod function
quence divided by 2 and the decimal part is eliminated using the floor function.
The process is repeated sixteen times to cover the complete 32-bit sequence.
After having obtained the sixteen two-bit sequences, the proposed algorithm orders the
information to be encrypted, so that it coincides in word width with the two-
sequences. To do so, the whole message is taken and separated by characters, placing them in
rows in one array; after that, the characters are divided in dibits, and each one is ordered in
columns of the same row. The last step is to vectorize the matrix, letting the last dibit of the first
characters next to the first dibit of the second character, and so on. The complete scheme is
Vectorization scheme of the container matrix with the to-hide message characters
To finish the second section of the proposed algorithm, the two-bit ciphering sequences are used
hide information, resulting in a total of sixteen encrypted frames.
frames are analyzed to obtain their histograms, using a range of zero to
three. The whole process can be seen in Pseudocode 2.
Scaling and division of the primary encrypting sequence and to-hide
processing
multiplied by (2 powered by 32)
) vector of double-precision
016: initialize a for cycle from 16 to 1 with
decimal part from aux
) as a matrix of double-
length and 16 width
023: initialize a for cycle from 1 to 4 with
increments of a variable
024: aux<= divide mg by 4
025: mg1[a,:]<= extract decimal part from
aux
026: s1<= truncate aux
027: end for cycle
028:
029: mg1 <= vectorize mg1
030: mg1 <= transpose mg1
031:
032: initialize (c1) as a matrix of double
precision with lms length and 16 positions
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
36
by 2
decimal part from aux
mited truncate operation, generating a
. Once the sequence is scaled, it is
chunked in dibits. For such activity, the two least significant bits are taken by the mod function
quence divided by 2 and the decimal part is eliminated using the floor function.
bit sequences, the proposed algorithm orders the
-bit ciphering
sequences. To do so, the whole message is taken and separated by characters, placing them in
each one is ordered in
columns of the same row. The last step is to vectorize the matrix, letting the last dibit of the first
characters next to the first dibit of the second character, and so on. The complete scheme is
hide message characters
sequences are used
encrypted frames.
histograms, using a range of zero to
hide message
023: initialize a for cycle from 1 to 4 with
<= extract decimal part from
) as a matrix of double-
16 positions
7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
37
033: initialize a for cycle from 1 to 16 with
increments of a variable
035: c1[a,:]<= mg1 xor-bitwise s2[a,:]
036: end for cycle
037: initialize (range) vector of double-precision
with 3 positions
038: b <= calculate length of mg1
039:
040: initialize (bc) as a matrix of double-
precision with lms length and 16 positions
041: initialize a for cycle from 1 to 16 with
increments of a variable
042: aux <= calculate histogram of c1[a,:]
according to range
043: bc[a,:]<= aux divided by b
044: end for cycle
With the second part of the algorithm explained, it is time to work with the cover image. Firstly,
it is necessary to extract the least significant two bits, by using the modulus operation between the
pixel information and the number two is possible to extract and store them in a vector for their
further analysis; which consists of finding their occurrence. The occurrence for the last two bits in
cover image is compared with those obtained from the encrypted frames of information. The
comparison method is the mean square error calculation between the occurrence in the cover
image and each of the sixteen encrypted frames, calculating sixteen mean square errors.
According to our proposal, the minimum mean square error represents to the most similar pair
image - encrypted frame. The last two bits of the image are replaced with the most similar two-bit
encrypted frame. The last part of the proposed steganographic mechanism is presented in the
Pseudocode 3.
Pseudocode 3. Extraction and evaluation of the histograms, and the most similar frame
embedding
045: aux <= divide im by 4
046: im1<= extract decimal part from aux
047: aux<= im1
048: im1<= truncate aux
049: aux <= 0
049: initialize a for cycle from 1 to 16 with
increments of a variable
050: aux <= 0
051: initialize a for cycle from 1 to 16 with
increments of b variable
052: aux1 <= subtract bim1[b] from
bc[a,b]
053: aux1 <= absolute value of aux1
054: aux1 <= aux1 powered by 2
055: aux <= aux added to aux1
056: end for cycle
057: ec[a] <= aux divided by 4
058: end for cycle
059: c <= 1
060: im2 <= im
061:
062: initialize a for cycle from 1 to 37 with
increments of 4 in a variable
063: initialize a for cycle from 1 to 13 with
increments of 4 in b variable
064: aux<= divide im2[a,b] by 4
065: im2[a,b] <= truncate aux
066: im2[a,b] <= im2[a,b]
mulpilied by 4
067: im2[a,b] <= im2[a,b] + c1[c]
068: c <= increment c
069: end for cycle
070: end for cycl
4. RESULTS OBTAINED FROM THE IMPLEMENTATION
As it was mentioned, the cover image used to evaluate the proposal is known as Macaw, and it
was modified in grayscale. The grayscale image was created from a color one using the rgb2gray
function, available in Matlab; such conversion was done previous to its usage as the carry image,
but it does not form part of our proposal. Figure 4 shows the original color image and the gray-
scaled version.
8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
Figure 4. Macaw image in its color (
After obtaining the cover image, the
range, and thenit is scaled to [0,232]
is divided, generating sixteen two
The results ar
Figure 5. Histograms corresponding to the division in sixteen of the sequence scaled to 32
After the histograms corresponding to the encrypting sixteen frames, each of them is used to
encrypt the to-hide message; generating a total of sixteen encrypted messages. Then we proceed
to extract the last two bits of the cover image for analyzing
frames. To make the a fairly comparison, we proceed to calculate the histogram of the last two
bits in the cover image and determine the similarities by the mean square error between it and
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
Macaw image in its color (left) and gray-scaled (right) version.
image, the primary encrypting sequence was generated. It
[0,232] range, allowing only-integer numbers. The 32-
two-bit frames, which were analyzed for obtaining their histograms
The results are presented in Figure 5.
Figure 5. Histograms corresponding to the division in sixteen of the sequence scaled to 32
After the histograms corresponding to the encrypting sixteen frames, each of them is used to
hide message; generating a total of sixteen encrypted messages. Then we proceed
to extract the last two bits of the cover image for analyzing and comparing it with the encrypted
frames. To make the a fairly comparison, we proceed to calculate the histogram of the last two
bits in the cover image and determine the similarities by the mean square error between it and
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
38
primary encrypting sequence was generated. It is in [0, 1]
-bit sequence
their histograms.
Figure 5. Histograms corresponding to the division in sixteen of the sequence scaled to 32 bits.
After the histograms corresponding to the encrypting sixteen frames, each of them is used to
hide message; generating a total of sixteen encrypted messages. Then we proceed
and comparing it with the encrypted
frames. To make the a fairly comparison, we proceed to calculate the histogram of the last two
bits in the cover image and determine the similarities by the mean square error between it and
9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
39
each of the encrypted frames. The use of the mean square error is necessary, because all
histograms look very similar, as is seen in Figure 6.
Figure 6. Histograms of the last two bits of the cover image and the encrypted frames.
When the most similar encrypted frameis determined, it is embedded in the last two bits of the
cover image. However, in order to ratify our proposal, we perform an additional comparison.We
proceed to repeat the embedding with two different encrypted frames, the most and the least
similar ones. Table 1 shows the mean square error (MSE), as well as the peak signal to noise ratio
(PSNR) between the aunatural cover image and the images with the embedded information.
Table 1. Comparison between the metrics of the images embedded with the most and the least similar
encrypted frames
least similar most similar
PSNR 67.9913 68.4405
MSE 0.0103 0.0093
5. DISCUSSION
In order to compare the proposed scheme, some related works were used to provide a reference,
they are detailed on next. Miri and Faez present a work that is a novel approach for the data
concealment in the frequency domain with the use of a genetic algorithm. In the beginning, the
carrier image is mapped to a domain of the appropriate frequency using the concepts of adaptive
wavelet transform and genetic algorithms. The information in the proper space is encrypted to be
later embedded in the frequency coefficients that represent the edges of the image in the space
domain; in such a way that the cover image is minimally changed, and it has the maximum
compatibility with the human vision system [11].
On the other hand, Kumar and Kumar present a work where their technique is based on the
Discrete Wavelet Transformation, together with the union of two concepts: Secret key computing,
10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
40
which will make the method more robust and resistant to steganalysis. And the concept is known
as In-Blocks, whose purpose is to ensure the least variation in the cover image [12].
And the last comparison work is the one presented by [13]. They present a work based on three-
dimensional chaotic mapping Cat and discrete wavelet transforms. In their work, they use the
irregular outputs of the Cat mapping to embed the secret message in the cover image, while the
discrete Wavelet transforms are used to provide robustness to the scheme.
Finally, with the established reference framework, the comparison between the three works and
our proposal is presented in Table 2.
Table 2. Comparison between the current work and the reference framework
Scheme Carry image To-hide message PNSR
Miri y Faez multiples, and they present
mean values as results
6.3 Kbno-specified type
message
64.76 dB
Kumar y Kumar Lena Cameraman image, no-
specified length, or any other
characteristic.
44.84 dB
Ghebleh y Kanso Lena 39 Kbrandom message 61.128 dB
Our proposal Baboon 8 Kb, Lorem-ipsummesage 68.44 dB
According to the previous comparison, the proposed work has good features, and if we used the
results obtained in Table 1 for the least similar encrypted frame. The fact is maybe because of
dividing the encrypting sequence in two-bit frames has a positive influence, causing smaller
distortions in the carrier image; however, there is not enough evidence to affirm it. On the other
hand, the obtained results from our proposal have an opportunity to be compared again other
similar methods, and also to continue in our pursuit to develop a digital system able to transmit
data in a hidden from using steganographic schemes.
6. CONCLUSIONS
With the present work, it is demonstrated that in the least significant bit substitution algorithms is
possible to enhance its performance, if an analysis of the cover image is previously made to the
substitution. To refine our proposal some tests are needed to be applied to other carrier images,
other types of message.
As it was presented in the discussion, the effect of dividing the coding frame must be
characterized more deeply and finding a relationship that is easily exploited in the future. Since
not only can it contribute a reduction in the impact on the carrier image, but the robustness of the
scheme is favored, by presenting a very complicated plot to determine its origin.
7. ACKNOWLEDGMENTS
Tecnologico Nacional de Mexico is thanked for the support provided with the funded project
"Generación de un esquemaesteganográficocaótico de bajo impacto para la imagen portadora"
with reference number 6622.18P.
11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
41
REFERENCES
[1] Brandao, A. S., & Jorge, D. C. (2016). Artificial neural networks applied to image steganography.
IEEE Latin America Transactions, 14(3), 1361-1366.
[2] Fridrich, J., Goljan, M., & Du, R. (2001). Detecting LSB steganography in color, and gray-scale
images. IEEE multimedia, 8(4), 22-28.
[3] Isaza, G. A., Espinosa, C. A., & Ocampo, S. M. (2018) Análisis de técnicasesteganograficas y
estegoanalisisencanalesencubiertos, imágenes y archivos de sonido.
[4] Divya, S. S., & Reddy, M. R. M. (2012). Hiding text in audio using multiple LSB steganography and
provide security using cryptography. International journal of scientific & technology research, 1(6),
68-70.
[5] Jamal A. Othman.(2014). Steganographic scheme to avoid statistical Steganalysis. JOURNAL OF
THE COLLEGE OF EDUCATION FOR WOMEN, 25(1), 249-256.
[6] Wu, H. Z., Wang, H. X., & Shi, Y. Q. (2016). Can Machine Learn Steganography?-Implementing
LSB Substitution and Matrix Coding Steganography with Feed-Forward Neural Networks. arXiv
preprint arXiv:1606.05294.
[7] Anees, A., Siddiqui, A. M., Ahmed, J., & Hussain, I. (2014). A technique for digital steganography
using chaotic maps. Nonlinear Dynamics, 75(4), 807-816.
[8] Li, S., Chen, G., &Mou, X. (2005). On the dynamical degradation of digital piecewise linear chaotic
maps. International journal of Bifurcation and Chaos, 15(10), 3119-3151.
[9] Zhang, T., & Ping, X. (2003). A new approach to reliable detection of LSB steganography in natural
images. Signal processing, 83(10), 2085-2093.
[10] Al-Fadhel, T. A. (2007). Gauss map vs Bernoulli shift. Applied Mathematics and Computation,
194(2), 520-526.
[11] Miri, A., &Faez, K. (2017). Adaptive image steganography based on transform domain via genetic
algorithm. Optik-International Journal for Light and Electron Optics, 145, 158-168.
[12] Kumar, V., & Kumar, D. (2017). A modified DWT-based image steganography technique.
Multimedia Tools and Applications, 1-30.
[13] Ghebleh, M., &Kanso, Ax. (2014). A robust chaotic algorithm for digital image steganography.
Communications in Nonlinear Science and Numerical Simulation, 19(6), 1898-1907.