SlideShare a Scribd company logo
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 8, No. 4, August 2018, pp. 2091~2097
ISSN: 2088-8708, DOI: 10.11591/ijece.v8i4.pp2091-2097  2091
Journal homepage: http://iaescore.com/journals/index.php/IJECE
Text in Image Hiding using Developed LSB and
Random Method
Elaf Ali Abbood1
, Rusul Mohammed Neamah2
, Shaymaa Abdulkadhm3
1,3
Department of Electrical and Computer Engineering, National Chung Cheng University, Taiwan
2
Department of Electrical Engineering, Universitas Ahmad Dahlan, Indonesia
Article Info ABSTRACT
Article history:
Received Jan 2, 2018
Revised Mar 10, 2018
Accepted Mar 16, 2018
Information Hiding is a task that face difficult challenges in current time.
The reason for these challenges is the rapid development of methods of
detection of hidden information. So, researchers have been interested in
developing methods of concealment, making it difficult for attackers to
access hidden information using new methods of concealment. Such as the
introducing a complex algorithms, use a random methods and invent more
complicated and difficult steps. This paper presents a new method of hiding
information within the image. This method creates a new sequence of
mysterious and difficult steps by dividing the secret text on all image and
random distributing of bits to each row. Then using a special reverse method
to hide the bits in that row. The LSB method has also been developed to
make it more difficult to hide the pixel. The results presented illustrate the
strength and security of the method and provide greater protection for hidden
information. Also, the result illustrate the quality of the stego image
compared with the original image using PSNR and SSIM quality measures.
Keyword:
LSB method
PSNR and SSIM metrics
Random number generation
Security
Steganography
Copyright © 2018 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Elaf Ali Abbood,
Department of Electrical and Computer Engineering,
National Chung Cheng University, Taiwan.
Email: wsci.elaf.ali@uobabylon.edu.iq
1. INTRODUCTION
The transfer of important and confidential data over the Internet has become one of main challenges
with all this development in information technology and communication. Today, confidential data can be
ensured by various methodologies of concealing data. Cryptography, steganography, and watermarking are
three general techniques to conceal information. One of them, hideing the existence of a message, and the
other means hiding information as a media format such as image, audio, video, and even a text so that other
people do not notice the existence of information in an abovementioned format. And finally, watermarking
means to protect copyright. In recent years, approachs to conceal information have paid great attention to
steganography and watermarking techniques [8].
One of the best techniques for secure communication is steganography a covert writing.
Steganography is the science of invisible communication which hides any private data within an innocent-
looking cover object. The aim is to design a steganography algorithm which not only hide the message
behind the image, but also provide more security than others[1, [2]. Steganography techniques, on the other
hand, hide the existence of the secret message itself, which makes it cumbersome for a third person to
discover the message [1]. In image steganography, the information is hidden exclusively in images. Today,
steganography is mostly used on computers with digital data being the bearers and networks being the rapid
conveyance channels [3]. Figure 1 illustrates the common behavior and the main concepts for the
steganography technique.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2091 – 2097
2092
Figure 1. Basic concepts and behavior of steganography
The steganography includes to main steps there are hiding and the extracting information. In the
hidding step, the secret text will be embedded in a selected location i nthe cover image based on a suitable
steganography method. Then, the resulting stego-image is sent to the receiver. In the extracting step, the
receiver applying the extraction function to recovery the secret text [12].
Steganography differs from cryptography in the sense that where cryptography concentrates on
keeping the substance of a message mystery, steganography concentrates on keeping the presence of a
message mystery [3], [4]. There are many techniques related to steganography is fingerprinting. In
fingerprinting unique marks are embedded in distinct copies of the carrier object that are supplied to different
customers [6].
The output image is called stego-image that is similar to the cover media. This stego-image is then
sent to the receiver where the receiver retrieves the hidden message by implementing a de-steganography
process. A stego-key is used for an embedding or encoding process to limit unraveling or extraction of the
embedded data in cover media [5].
The stego-key depending on random generation uses a specific kernel in order to send it to the
recipient to generate the same key in order to retrieve the hidden data and data is embedded in a cover image
using LSB method. Least-Significant-Bit (LSB) is one of the popular and frequently used steganography
techniques to conceal a mystery message in a digital medium [7].
The method recommended in this paper is used a random key generator method for improvement in
robust and security of steganography. The random number generator locates the hiding positions in the cover
image in each row separately and each row will hide the same number of bits of secret text. That’s by
dividing the secret text on all the rows of the cover image. specific method for hiding bits in each pixel will
be used.
2. RELATED WORKS
In a steganography field, there are many researchers using a random number generation method
combined with another technique for hiding information in image. Obaida M. and Awad A. introduced that
the secret text bits are inserted into the cover image pixels randomly. Whereas, inserting of secret text bits
into the cover image will be in any bit of the pixel randomly by comparing the message bit with the pixel bit
that chosen randomly from the second to the last bit. The least significant bit of the pixel will be 1 if the
comparison result is matched. And the least significant bit of the pixel will be 0 if the comparison result
is not [3].
Babita el al used a random key generating method to encrypt the secret message using XOR method
then embedding the cipher message into an image of RGB format in a special arrangement. The resulted
RGB image converted into the bitmap file format [9]. Balvinder el al. encrypted the secret text using XOR
encryption method using 8-bit random key. Then, applied XOR operation between one bit of 8-bit random
key and 2nd LSB of cover image pixel. If the XOR result of above operation is 1 then hide one bit of the
secret key into LSB of same pixel of cover image. Otherwise, there is no hiding in any bit in that pixel. The
Extracted secret
message
Secret
message
Cover Image
Steganography
schema
Extraction
message schema
decoder
Secret Key
Stego Image
Communication
channel
Int J Elec & Comp Eng ISSN: 2088-8708 
Text in Image Hiding using Developed LSB and Random Method (Elaf Ali Abbood)
2093
substitution process will be continued depending on the length of encrypted message. The random key hidden
in the same first byte of cover image [10].
Noor K. hidden information by generate the secret key using LFSR method then encrypted the
secret message using AES method. The encrypted message distributed over the cover image pixels using
permutation technique. Then hide the bits of the encrypted message in cover image in the randomly selected
pixels [11]. Ashwini and komal provided sequential encoding and random encoding ways for embedding the
secret data inside cover image. Sequential encoding used one key entered by user and sequentially selected
the pixel for embedding cipher text obtained by XORing the secret message with key provided by user. In
random encoding two keys are provided by the user ,one is to lock the function on receiver side and other for
to carry out encryption. In this case pixels are selected randomly for embedding secret data i.e either text or
image using random number generator which automatically implements link list concept [1].
The technique that used by Rupali B. and Vaishali S. included three main steps. That's by found
complementing of the secret text. Then, hiding the complemented text in cover image pixels using pseudo
random number generator, finally, hide the bits of complemented text in each pixel using the inverted bit
LSB method [5]. Meenakshi S. and et al introduced an RGB image embedding method based on sixteen-
pixel differencing with n-bit Least Significant Bit (LSB) substitution. In their method, the image is divided
into 4×4 non intersecting blocks then and calculate the average difference value in each block. Based on the
resulted value the block is classified to fall into one of four levels such as, lower, lower-middle, higher-
middle and higher. If block belongs to lower level then 2-bit LSB substitution is used in it. Similarly, for
lower-middle, higher-middle and higher level blocks 3, 4, and 5 bit LSB substitution is used [13]. In this
paper, a new method is proposed for hiding secret text in image depending on the generation of random
number and developed LSB method using a simple hash function.
3. THE PROPOSED METHOD
This paper introduces a new proposed method to hide a secret text in gray image using random
technique with a secret key and simple hash function. The allocation of the secret text into the image depends
on the length of secret text. Where, the secret text will be divided on all rows of image in equal manner
excepted the last row, that need to hide additional information. In each row, there is a fixed number of
columns that needs to hide a secret text bits, that’s chosen randomly. The hiding of bit in column depends on
a special schema. Flow chart in Figure 2 shows the sequence of the method.
Figure 2. Proposed method processed stages
The proposed method steps depicted in the following:
Step 1 (Convert the secret text to the one binary stream): The secret text is a string consisting of
letters, spaces and special characters. Each character in secret string converts to seven bits. When merge all
the characters, we will have one stream of binary bits. For example: If the secret text is "To", when
converting it to binary and combining the two letters, the resulting string will be "10101001101111".
Step 2 (Distribute the secret text on the cover image): The secret text is distributed on cover image
evenly across all rows except the last one. This is done by dividing the number of secret text bits on the
number of image rows. This is computed as in Equation (1).
no_col = no_textbits / (no_row-1) (1)
Convert the secret
text to the one binary
stream
Distribute the secret text
on the cover image using
a random schema
Hide secret text bits
in each row in
reverse manner
Hide secret text bits in
selected column using
simple hash function
Input secret
text
Input cover
image
Output stego
image
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2091 – 2097
2094
Where no_row represents the number of image's rows, no_col represents the number of columns that needed
to hide the secret stream in each row. And no_textbits denotes to the length of binary string of secret text.
Step 3 (Determine the random columns locations in each row): In each row, we used a pseudo
random number generator to determine the location of columns that need to hide the secret text in each row.
This is done by the following:
Step 3-1 Create a seed to generate a random numbers. And to more security, this seed is created
using shuffle function. This seed will represent part of the secret key that will hide in last row of the image
and sent to the receiver. Step 3-2 For each row, generate a no_col of columns randomly within a certain
range and without duplicating in that row:
Flag=false;
while~Flage
R=ceil(n*rand(no_col,1))
Flage=numel(unique(R))= =no_col
End
Where, R represents the resulted array that's contains the columns' indexes. ceil is a function rounds the
elements of A to the nearest integers greater than or equal to A, and n refer to the total number of columns in
cover image. rand refers to random generation function. numel represents a function returns the array
elements number. unique is a function that’s delete the duplicating in array.
Step 4 (Hide one bit in each pixels have location x,y) Where x represents the current row, and y
represents the column that is selected randomly. This hiding method will be in reverse manner for the current
row. For example, if the number of columns allocated for each row is 10 columns, then there are 10 bits of
secret text that would be hidden in each row. Where, the tenth bit will hide in the first column and the ninth
bit will hide in the second column and so on.
Step 5 Each pixel have 8 bits. To hide one bit in one pixel, we will use the updated LSB method
that’s including a simple hash function. This method includes hiding a bit in one of the less three significance
bits in the current pixel. The chosen among the three bits done using a simple hash function that used mod
operation for the index of the current random selected column. As depicted in Equation (2).
x = len_pxl – (col_indx mod 3) (2)
Where, x represent the location of hiding the bit in the pixel, len_pxl depicted to the length of pixel that will
be 8 bits, col_indx denoted to the index of the current random selected column. If the resulted x is equal to
0, 1 or 2, then the bit will hide in the eighth, seventh or sixth bit of the pixel, respectively. The following
example illustrates the above steps of our method in details.
Let's the secret text have 700 characters. When converting it to binary, each character will convert
to 7 bits. That means, the length of secret text in binary will be 7* 700=4900 bits. For the cover image with
size 512*512 pixel, each row will contain number of bits of secret text computed as following: no_col=floor
(4900/(512-1))+1=10 bits of the secret text hidden in each row of the cover image. Where floor(A) rounds
the elements of A to the nearest integers less than or equal to A.
Now, we use the random function to generate 10 columns' indexes in range (1-512). First, generate
the start random seed using shuffle function for example: seed=1897039246. This seed will be considered as
secret key that's sent to receiver by hiding it in the last row of cover image using LSB method. The receiver
will use this seed to generate the same sequences of random numbers to get the secret text. Then, generate 10
column indexes in range (1-512) for each row in cover image except the last one using step (3-2). When
n=512, no_col=10, the first 10 columns indexes generated in our example will be:
165 363 233 335 105 138 199 420 63 418
If the first 10 bits in secret text are: 1010100110, then the hiding of these bits in the first row and random
selected columns will be in reverse manner as:
That means the 10th secret bit will hide in the 166th column and the 9th bit will hide in 363th column,
and so on. Now, we determined the pixel(row, column) from cover image for each bit in secret text. To hide
the 10th bit (0) in the pixel(1,166), we use mod operation as a simple hash function as in step (3-4) to find the
index of hiding the secret bit in the pixel bits. If that index (x) is computed as:
x = len_pxl-(col_indx mod 3) x=8-(166 mod 3)=7
Int J Elec & Comp Eng ISSN: 2088-8708 
Text in Image Hiding using Developed LSB and Random Method (Elaf Ali Abbood)
2095
Then, the 10th secret bit (0) will hide in the 7th bit of the pixel (1,166). If the gray color of the pixel
(1,166)= 0 1 0 1 0 0 1 1, then the 7th bit of the pixel (1) will be replaced by the 10th secret bit (0) of the
secret text. The result of the pixel (1,166)=0 1 0 1 0 0 0 1.
When the stego image arrives to the receiver, the receiver will be extracted the secret text by
applying the same hiding steps. In the following, the steps of extraction the secret text:
Step 1: Extraction of the seed random generation and length of the secret text. First the receiver must extract
the seed of generate the random sequence and also extract the length of secret text that hide in the last row
of the stego image using LSB traditional method.
Step 2: Find the number of columns that used to hide the secret text bits using Equation (1).
Step 3: Generate a random locations for the number of columns in each row. That’s done using a pseudo
random generation method started using the seed that extracted in step 1.
Step 4: Extraction of secret text bits. To extract the secret text bits, we use the same method to hide these bits
in image. Where, the first bit will be extracted from the last random column and the second bit will be
extracted from the second last random column and so on. To extract the bit from the pixel, we use the mod
operation using Equation (2).
Step 5: Convert the secret text bits to characters. The extracted secret text is one sequence of binary bits.
To covert the secret text from binary to characters, each seven bits will convert to one character.
4. RESULTS
The proposed method used an efficient and secure schema to hide secret text in image. This section
illustrates the results of applying the proposed method to hide different secret text size on different images
and measure the accuracy of the resulted images using PSNR and SSIM measurements that’s describes in
Equation (3) and Equation (4), respectively.
[
∑ ∑
] (3)
Where indicated to the strego image pixels and indicated to the cover image values. M and N is the
image size.
( ) ( ) (4)
Where µ denoted to the mean of the (m, n) window. are indicated to the standard deviation of (m, n)
window. Figure 3, Figure 4 and Figure 5 illustrated the effect of the proposed method on 512x512 Goldhill,
Boat and Lena images when hiding a secret text with size 4900, 14700 and 24500 bits, respectively.
(a) The original goldhill image (b) The stego image
Figure 3. Hiding a secret text with size 4900 bits in 512x512 Goldhill image
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2091 – 2097
2096
(a) The original boat image (b) The stego image
Figure 4. Hiding a secret text with size 14700 bits in 512x512 Boat image
(a) The original lina image (b) The stego image
Figure 5. Hiding a secret text with size 24500 bits in 512x512 Lina image
Table 1 shows the illustrated the results of PSNR and SSIM measurements when applying the proposed
method on different images and different size of secret text.
Table 1. Illustrated the results of PSNR and SSIM measurements when applying the proposed method on
different images and different size of secret text
Cover image
512x512
Secret text 4900 bits Secret text 14700 bits Secret text 24500 bits
PSNR SSIM PSNR SSIM PSNR SSIM
Goldhill 60.0489 0.99966 55.2512 0.99896 52.9806 0.998234
Boat 60.0056 0.999513 55.2738 0.998554 52.9859 0.997577
Lena 60.0299 0.999444 55.197 0.998328 52.9817 0.997242
5. COCLUSIONS
The main objective of developing methods of information concealment is to increase the security of
these roads and to protect information from detection by attackers. The more complex the method of
concealment and the more steps followed, the more cynical the method and harder for the attackers to break
it and access to hidden information. This search uses more than one technique to increase security of
concealment and to strengthen the protection of hidden information. Where the method of random generation
in the selection of pixels in each row of the image in which we hide the secret text. Reverse inversion of bits
of secret text was used in each row. It also used an improved LSB method which hid the bit of the secret text
in three less important bits. And selects the bit in which we will hide the random numbers generated earlier.
Int J Elec & Comp Eng ISSN: 2088-8708 
Text in Image Hiding using Developed LSB and Random Method (Elaf Ali Abbood)
2097
These steps increase the security of the method and give good results in terms of measuring the impact of the
image after the concealment compared to the original image.
REFERENCES
[1] Ashwini B. and Komal B., “Hybrid Approach for Embedding Text or Image in Cover Images”, International
Journal of Innovative Research in Science, Engineering and Technology, vol. 5, no. 5, 2016.
[2] Yang Ren-er and et al, “Image Steganography Combined with DES Encryption Pre-processing”, Sixth
International Conference on Measuring Technology and Mechatronics Automation, pp. 323-326, 2014.
[3] Obaida Mohammad Awad Al-Hazaimeh, “Hiding Data in Images Using New Random Technique”, International
Journal of Computer Science Issues, vol. 9, 2012.
[4] Artz, D., “Digital Steganography: Hiding Data within Data”, IEEE Internet Computing Journal, 2001.
[5] Rupali Bhardwaj and Vaishali Sharma,” Image Steganography Based on Complemented Message and Inverted bit
LSB Substitution”, 6th International Conference on Advances In Computing & Communications, 2016.
[6] M.A.Wakure and S.A.Wakure, “A Digital Image Steganography”, International Journal of Computer Science
Trends and Technology (IJCST), vol. 5, no. 2, 2017.
[7] Ebrahim Alrashed and Suood Suood Alroomi, “Hungarian-Puzzled Text with Dynamic Quadratic Embedding
Steganography”, vol. 7, no. 2, 2017.
[8] Reihane Saniei and Karim Faez, “The Security of Arithmetic Compression Based Text Steganography Method”,
International Journal of Electrical and Computer Engineering, vol. 3, no. 6, pp. 797-804, 2013.
[9] Babita1 and el al, “An Approach to Improve Image Steganography using Random Key Generation Method",
International Journal of Information and Computation Technology, vol. 3, no. 4 , pp. 235-240, 2013.
[10] Balvinder Singh and el al, “A Steganography Algorithm for Hiding Secret Message inside Image using Random
Key”, International Journal of Engineering Research & Technology, vol. 3, no. 12, 2014.
[11] Noor Kareem Jumaa, “Hiding of Random Permutated Encrypted Text using LSB Steganography with Random
Pixels Generator”, International Journal of Computer Applications, vol. 113, no. 13, 2015.
[12] Mojtaba B. and Karim F., “An Adaptive Steganography Scheme Based on Visual Quality and Embedding Capacity
Improvement”, International Journal of Electrical and Computer Engineering (IJECE), vol. 4, no. 4, pp. 573-584,
August 2014.
[13] Meenakshi S Arya, Meenu Rani, Charndeep Singh Bedi, “Improved Capacity Image Steganography Algorithm
using 16-Pixel Differencing with n-bit LSB Substitution for RGB Images”, International Journal of Electrical and
Computer Engineering (IJECE), vol. 6, no. 6, pp. 2735-2741, December 2016.

More Related Content

What's hot

An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
iosrjce
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
IRJET Journal
 
Digital Steganography in Computer Forensics
 Digital Steganography in Computer Forensics Digital Steganography in Computer Forensics
Digital Steganography in Computer Forensics
IJCSIS Research Publications
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
ijsptm
 
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
IJNSA Journal
 
Enhanced Secret Communication Using Multilevel Audio Steganography
Enhanced Secret Communication Using Multilevel Audio SteganographyEnhanced Secret Communication Using Multilevel Audio Steganography
Enhanced Secret Communication Using Multilevel Audio Steganography
ijceronline
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
sipij
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
CSCJournals
 
Image steganography
Image steganographyImage steganography
Image steganography
vaidya_sanyu
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Bikash Chandra Prusty
 
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEIMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
Journal For Research
 
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic Techniques
IJERA Editor
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
IJARIIT
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
YogeshIJTSRD
 
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHYAN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
Journal For Research
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
iosrjce
 

What's hot (18)

An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
 
Digital Steganography in Computer Forensics
 Digital Steganography in Computer Forensics Digital Steganography in Computer Forensics
Digital Steganography in Computer Forensics
 
G0210032039
G0210032039G0210032039
G0210032039
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
 
Enhanced Secret Communication Using Multilevel Audio Steganography
Enhanced Secret Communication Using Multilevel Audio SteganographyEnhanced Secret Communication Using Multilevel Audio Steganography
Enhanced Secret Communication Using Multilevel Audio Steganography
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEIMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
 
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic Techniques
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHYAN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
 

Similar to Text in Image Hiding using Developed LSB and Random Method

A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
Jeff Brooks
 
Data Hiding Using Green Channel as Pixel Value Indicator
Data Hiding Using Green Channel as Pixel Value IndicatorData Hiding Using Green Channel as Pixel Value Indicator
Data Hiding Using Green Channel as Pixel Value Indicator
CSCJournals
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
vivatechijri
 
P017329498
P017329498P017329498
P017329498
IOSR Journals
 
C010511420
C010511420C010511420
C010511420
IOSR Journals
 
H017255560
H017255560H017255560
H017255560
IOSR Journals
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
IRJET Journal
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
vaishali kataria
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
vaishali kataria
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
ijctet
 
Hiding algorithm based fused images and Caesar cipher with intelligent securi...
Hiding algorithm based fused images and Caesar cipher with intelligent securi...Hiding algorithm based fused images and Caesar cipher with intelligent securi...
Hiding algorithm based fused images and Caesar cipher with intelligent securi...
IJECEIAES
 
Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...
nooriasukmaningtyas
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security System
ijtsrd
 
Hide text depending on the three channels of pixels in color images using the...
Hide text depending on the three channels of pixels in color images using the...Hide text depending on the three channels of pixels in color images using the...
Hide text depending on the three channels of pixels in color images using the...
IJECEIAES
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Dr. Amarjeet Singh
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
IJCSEA Journal
 
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHYQUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
ijma
 

Similar to Text in Image Hiding using Developed LSB and Random Method (20)

A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
Data Hiding Using Green Channel as Pixel Value Indicator
Data Hiding Using Green Channel as Pixel Value IndicatorData Hiding Using Green Channel as Pixel Value Indicator
Data Hiding Using Green Channel as Pixel Value Indicator
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
P017329498
P017329498P017329498
P017329498
 
C010511420
C010511420C010511420
C010511420
 
H017255560
H017255560H017255560
H017255560
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
Hiding algorithm based fused images and Caesar cipher with intelligent securi...
Hiding algorithm based fused images and Caesar cipher with intelligent securi...Hiding algorithm based fused images and Caesar cipher with intelligent securi...
Hiding algorithm based fused images and Caesar cipher with intelligent securi...
 
Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security System
 
Hide text depending on the three channels of pixels in color images using the...
Hide text depending on the three channels of pixels in color images using the...Hide text depending on the three channels of pixels in color images using the...
Hide text depending on the three channels of pixels in color images using the...
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
 
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHYQUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
 

More from IJECEIAES

Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
IJECEIAES
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
IJECEIAES
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
IJECEIAES
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a surveySmart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
IJECEIAES
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
IJECEIAES
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
IJECEIAES
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
IJECEIAES
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
IJECEIAES
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
IJECEIAES
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
IJECEIAES
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
IJECEIAES
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
IJECEIAES
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
IJECEIAES
 
A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...
IJECEIAES
 
A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...
IJECEIAES
 
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersFuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
IJECEIAES
 
The performance of artificial intelligence in prostate magnetic resonance im...
The performance of artificial intelligence in prostate  magnetic resonance im...The performance of artificial intelligence in prostate  magnetic resonance im...
The performance of artificial intelligence in prostate magnetic resonance im...
IJECEIAES
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
IJECEIAES
 
Analysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorAnalysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behavior
IJECEIAES
 
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
IJECEIAES
 

More from IJECEIAES (20)

Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a surveySmart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...
 
A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...
 
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersFuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
 
The performance of artificial intelligence in prostate magnetic resonance im...
The performance of artificial intelligence in prostate  magnetic resonance im...The performance of artificial intelligence in prostate  magnetic resonance im...
The performance of artificial intelligence in prostate magnetic resonance im...
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Analysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorAnalysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behavior
 
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
 

Recently uploaded

AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
itech2017
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
dxobcob
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 

Recently uploaded (20)

AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 

Text in Image Hiding using Developed LSB and Random Method

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 8, No. 4, August 2018, pp. 2091~2097 ISSN: 2088-8708, DOI: 10.11591/ijece.v8i4.pp2091-2097  2091 Journal homepage: http://iaescore.com/journals/index.php/IJECE Text in Image Hiding using Developed LSB and Random Method Elaf Ali Abbood1 , Rusul Mohammed Neamah2 , Shaymaa Abdulkadhm3 1,3 Department of Electrical and Computer Engineering, National Chung Cheng University, Taiwan 2 Department of Electrical Engineering, Universitas Ahmad Dahlan, Indonesia Article Info ABSTRACT Article history: Received Jan 2, 2018 Revised Mar 10, 2018 Accepted Mar 16, 2018 Information Hiding is a task that face difficult challenges in current time. The reason for these challenges is the rapid development of methods of detection of hidden information. So, researchers have been interested in developing methods of concealment, making it difficult for attackers to access hidden information using new methods of concealment. Such as the introducing a complex algorithms, use a random methods and invent more complicated and difficult steps. This paper presents a new method of hiding information within the image. This method creates a new sequence of mysterious and difficult steps by dividing the secret text on all image and random distributing of bits to each row. Then using a special reverse method to hide the bits in that row. The LSB method has also been developed to make it more difficult to hide the pixel. The results presented illustrate the strength and security of the method and provide greater protection for hidden information. Also, the result illustrate the quality of the stego image compared with the original image using PSNR and SSIM quality measures. Keyword: LSB method PSNR and SSIM metrics Random number generation Security Steganography Copyright © 2018 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Elaf Ali Abbood, Department of Electrical and Computer Engineering, National Chung Cheng University, Taiwan. Email: wsci.elaf.ali@uobabylon.edu.iq 1. INTRODUCTION The transfer of important and confidential data over the Internet has become one of main challenges with all this development in information technology and communication. Today, confidential data can be ensured by various methodologies of concealing data. Cryptography, steganography, and watermarking are three general techniques to conceal information. One of them, hideing the existence of a message, and the other means hiding information as a media format such as image, audio, video, and even a text so that other people do not notice the existence of information in an abovementioned format. And finally, watermarking means to protect copyright. In recent years, approachs to conceal information have paid great attention to steganography and watermarking techniques [8]. One of the best techniques for secure communication is steganography a covert writing. Steganography is the science of invisible communication which hides any private data within an innocent- looking cover object. The aim is to design a steganography algorithm which not only hide the message behind the image, but also provide more security than others[1, [2]. Steganography techniques, on the other hand, hide the existence of the secret message itself, which makes it cumbersome for a third person to discover the message [1]. In image steganography, the information is hidden exclusively in images. Today, steganography is mostly used on computers with digital data being the bearers and networks being the rapid conveyance channels [3]. Figure 1 illustrates the common behavior and the main concepts for the steganography technique.
  • 2.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2091 – 2097 2092 Figure 1. Basic concepts and behavior of steganography The steganography includes to main steps there are hiding and the extracting information. In the hidding step, the secret text will be embedded in a selected location i nthe cover image based on a suitable steganography method. Then, the resulting stego-image is sent to the receiver. In the extracting step, the receiver applying the extraction function to recovery the secret text [12]. Steganography differs from cryptography in the sense that where cryptography concentrates on keeping the substance of a message mystery, steganography concentrates on keeping the presence of a message mystery [3], [4]. There are many techniques related to steganography is fingerprinting. In fingerprinting unique marks are embedded in distinct copies of the carrier object that are supplied to different customers [6]. The output image is called stego-image that is similar to the cover media. This stego-image is then sent to the receiver where the receiver retrieves the hidden message by implementing a de-steganography process. A stego-key is used for an embedding or encoding process to limit unraveling or extraction of the embedded data in cover media [5]. The stego-key depending on random generation uses a specific kernel in order to send it to the recipient to generate the same key in order to retrieve the hidden data and data is embedded in a cover image using LSB method. Least-Significant-Bit (LSB) is one of the popular and frequently used steganography techniques to conceal a mystery message in a digital medium [7]. The method recommended in this paper is used a random key generator method for improvement in robust and security of steganography. The random number generator locates the hiding positions in the cover image in each row separately and each row will hide the same number of bits of secret text. That’s by dividing the secret text on all the rows of the cover image. specific method for hiding bits in each pixel will be used. 2. RELATED WORKS In a steganography field, there are many researchers using a random number generation method combined with another technique for hiding information in image. Obaida M. and Awad A. introduced that the secret text bits are inserted into the cover image pixels randomly. Whereas, inserting of secret text bits into the cover image will be in any bit of the pixel randomly by comparing the message bit with the pixel bit that chosen randomly from the second to the last bit. The least significant bit of the pixel will be 1 if the comparison result is matched. And the least significant bit of the pixel will be 0 if the comparison result is not [3]. Babita el al used a random key generating method to encrypt the secret message using XOR method then embedding the cipher message into an image of RGB format in a special arrangement. The resulted RGB image converted into the bitmap file format [9]. Balvinder el al. encrypted the secret text using XOR encryption method using 8-bit random key. Then, applied XOR operation between one bit of 8-bit random key and 2nd LSB of cover image pixel. If the XOR result of above operation is 1 then hide one bit of the secret key into LSB of same pixel of cover image. Otherwise, there is no hiding in any bit in that pixel. The Extracted secret message Secret message Cover Image Steganography schema Extraction message schema decoder Secret Key Stego Image Communication channel
  • 3. Int J Elec & Comp Eng ISSN: 2088-8708  Text in Image Hiding using Developed LSB and Random Method (Elaf Ali Abbood) 2093 substitution process will be continued depending on the length of encrypted message. The random key hidden in the same first byte of cover image [10]. Noor K. hidden information by generate the secret key using LFSR method then encrypted the secret message using AES method. The encrypted message distributed over the cover image pixels using permutation technique. Then hide the bits of the encrypted message in cover image in the randomly selected pixels [11]. Ashwini and komal provided sequential encoding and random encoding ways for embedding the secret data inside cover image. Sequential encoding used one key entered by user and sequentially selected the pixel for embedding cipher text obtained by XORing the secret message with key provided by user. In random encoding two keys are provided by the user ,one is to lock the function on receiver side and other for to carry out encryption. In this case pixels are selected randomly for embedding secret data i.e either text or image using random number generator which automatically implements link list concept [1]. The technique that used by Rupali B. and Vaishali S. included three main steps. That's by found complementing of the secret text. Then, hiding the complemented text in cover image pixels using pseudo random number generator, finally, hide the bits of complemented text in each pixel using the inverted bit LSB method [5]. Meenakshi S. and et al introduced an RGB image embedding method based on sixteen- pixel differencing with n-bit Least Significant Bit (LSB) substitution. In their method, the image is divided into 4×4 non intersecting blocks then and calculate the average difference value in each block. Based on the resulted value the block is classified to fall into one of four levels such as, lower, lower-middle, higher- middle and higher. If block belongs to lower level then 2-bit LSB substitution is used in it. Similarly, for lower-middle, higher-middle and higher level blocks 3, 4, and 5 bit LSB substitution is used [13]. In this paper, a new method is proposed for hiding secret text in image depending on the generation of random number and developed LSB method using a simple hash function. 3. THE PROPOSED METHOD This paper introduces a new proposed method to hide a secret text in gray image using random technique with a secret key and simple hash function. The allocation of the secret text into the image depends on the length of secret text. Where, the secret text will be divided on all rows of image in equal manner excepted the last row, that need to hide additional information. In each row, there is a fixed number of columns that needs to hide a secret text bits, that’s chosen randomly. The hiding of bit in column depends on a special schema. Flow chart in Figure 2 shows the sequence of the method. Figure 2. Proposed method processed stages The proposed method steps depicted in the following: Step 1 (Convert the secret text to the one binary stream): The secret text is a string consisting of letters, spaces and special characters. Each character in secret string converts to seven bits. When merge all the characters, we will have one stream of binary bits. For example: If the secret text is "To", when converting it to binary and combining the two letters, the resulting string will be "10101001101111". Step 2 (Distribute the secret text on the cover image): The secret text is distributed on cover image evenly across all rows except the last one. This is done by dividing the number of secret text bits on the number of image rows. This is computed as in Equation (1). no_col = no_textbits / (no_row-1) (1) Convert the secret text to the one binary stream Distribute the secret text on the cover image using a random schema Hide secret text bits in each row in reverse manner Hide secret text bits in selected column using simple hash function Input secret text Input cover image Output stego image
  • 4.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2091 – 2097 2094 Where no_row represents the number of image's rows, no_col represents the number of columns that needed to hide the secret stream in each row. And no_textbits denotes to the length of binary string of secret text. Step 3 (Determine the random columns locations in each row): In each row, we used a pseudo random number generator to determine the location of columns that need to hide the secret text in each row. This is done by the following: Step 3-1 Create a seed to generate a random numbers. And to more security, this seed is created using shuffle function. This seed will represent part of the secret key that will hide in last row of the image and sent to the receiver. Step 3-2 For each row, generate a no_col of columns randomly within a certain range and without duplicating in that row: Flag=false; while~Flage R=ceil(n*rand(no_col,1)) Flage=numel(unique(R))= =no_col End Where, R represents the resulted array that's contains the columns' indexes. ceil is a function rounds the elements of A to the nearest integers greater than or equal to A, and n refer to the total number of columns in cover image. rand refers to random generation function. numel represents a function returns the array elements number. unique is a function that’s delete the duplicating in array. Step 4 (Hide one bit in each pixels have location x,y) Where x represents the current row, and y represents the column that is selected randomly. This hiding method will be in reverse manner for the current row. For example, if the number of columns allocated for each row is 10 columns, then there are 10 bits of secret text that would be hidden in each row. Where, the tenth bit will hide in the first column and the ninth bit will hide in the second column and so on. Step 5 Each pixel have 8 bits. To hide one bit in one pixel, we will use the updated LSB method that’s including a simple hash function. This method includes hiding a bit in one of the less three significance bits in the current pixel. The chosen among the three bits done using a simple hash function that used mod operation for the index of the current random selected column. As depicted in Equation (2). x = len_pxl – (col_indx mod 3) (2) Where, x represent the location of hiding the bit in the pixel, len_pxl depicted to the length of pixel that will be 8 bits, col_indx denoted to the index of the current random selected column. If the resulted x is equal to 0, 1 or 2, then the bit will hide in the eighth, seventh or sixth bit of the pixel, respectively. The following example illustrates the above steps of our method in details. Let's the secret text have 700 characters. When converting it to binary, each character will convert to 7 bits. That means, the length of secret text in binary will be 7* 700=4900 bits. For the cover image with size 512*512 pixel, each row will contain number of bits of secret text computed as following: no_col=floor (4900/(512-1))+1=10 bits of the secret text hidden in each row of the cover image. Where floor(A) rounds the elements of A to the nearest integers less than or equal to A. Now, we use the random function to generate 10 columns' indexes in range (1-512). First, generate the start random seed using shuffle function for example: seed=1897039246. This seed will be considered as secret key that's sent to receiver by hiding it in the last row of cover image using LSB method. The receiver will use this seed to generate the same sequences of random numbers to get the secret text. Then, generate 10 column indexes in range (1-512) for each row in cover image except the last one using step (3-2). When n=512, no_col=10, the first 10 columns indexes generated in our example will be: 165 363 233 335 105 138 199 420 63 418 If the first 10 bits in secret text are: 1010100110, then the hiding of these bits in the first row and random selected columns will be in reverse manner as: That means the 10th secret bit will hide in the 166th column and the 9th bit will hide in 363th column, and so on. Now, we determined the pixel(row, column) from cover image for each bit in secret text. To hide the 10th bit (0) in the pixel(1,166), we use mod operation as a simple hash function as in step (3-4) to find the index of hiding the secret bit in the pixel bits. If that index (x) is computed as: x = len_pxl-(col_indx mod 3) x=8-(166 mod 3)=7
  • 5. Int J Elec & Comp Eng ISSN: 2088-8708  Text in Image Hiding using Developed LSB and Random Method (Elaf Ali Abbood) 2095 Then, the 10th secret bit (0) will hide in the 7th bit of the pixel (1,166). If the gray color of the pixel (1,166)= 0 1 0 1 0 0 1 1, then the 7th bit of the pixel (1) will be replaced by the 10th secret bit (0) of the secret text. The result of the pixel (1,166)=0 1 0 1 0 0 0 1. When the stego image arrives to the receiver, the receiver will be extracted the secret text by applying the same hiding steps. In the following, the steps of extraction the secret text: Step 1: Extraction of the seed random generation and length of the secret text. First the receiver must extract the seed of generate the random sequence and also extract the length of secret text that hide in the last row of the stego image using LSB traditional method. Step 2: Find the number of columns that used to hide the secret text bits using Equation (1). Step 3: Generate a random locations for the number of columns in each row. That’s done using a pseudo random generation method started using the seed that extracted in step 1. Step 4: Extraction of secret text bits. To extract the secret text bits, we use the same method to hide these bits in image. Where, the first bit will be extracted from the last random column and the second bit will be extracted from the second last random column and so on. To extract the bit from the pixel, we use the mod operation using Equation (2). Step 5: Convert the secret text bits to characters. The extracted secret text is one sequence of binary bits. To covert the secret text from binary to characters, each seven bits will convert to one character. 4. RESULTS The proposed method used an efficient and secure schema to hide secret text in image. This section illustrates the results of applying the proposed method to hide different secret text size on different images and measure the accuracy of the resulted images using PSNR and SSIM measurements that’s describes in Equation (3) and Equation (4), respectively. [ ∑ ∑ ] (3) Where indicated to the strego image pixels and indicated to the cover image values. M and N is the image size. ( ) ( ) (4) Where µ denoted to the mean of the (m, n) window. are indicated to the standard deviation of (m, n) window. Figure 3, Figure 4 and Figure 5 illustrated the effect of the proposed method on 512x512 Goldhill, Boat and Lena images when hiding a secret text with size 4900, 14700 and 24500 bits, respectively. (a) The original goldhill image (b) The stego image Figure 3. Hiding a secret text with size 4900 bits in 512x512 Goldhill image
  • 6.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2091 – 2097 2096 (a) The original boat image (b) The stego image Figure 4. Hiding a secret text with size 14700 bits in 512x512 Boat image (a) The original lina image (b) The stego image Figure 5. Hiding a secret text with size 24500 bits in 512x512 Lina image Table 1 shows the illustrated the results of PSNR and SSIM measurements when applying the proposed method on different images and different size of secret text. Table 1. Illustrated the results of PSNR and SSIM measurements when applying the proposed method on different images and different size of secret text Cover image 512x512 Secret text 4900 bits Secret text 14700 bits Secret text 24500 bits PSNR SSIM PSNR SSIM PSNR SSIM Goldhill 60.0489 0.99966 55.2512 0.99896 52.9806 0.998234 Boat 60.0056 0.999513 55.2738 0.998554 52.9859 0.997577 Lena 60.0299 0.999444 55.197 0.998328 52.9817 0.997242 5. COCLUSIONS The main objective of developing methods of information concealment is to increase the security of these roads and to protect information from detection by attackers. The more complex the method of concealment and the more steps followed, the more cynical the method and harder for the attackers to break it and access to hidden information. This search uses more than one technique to increase security of concealment and to strengthen the protection of hidden information. Where the method of random generation in the selection of pixels in each row of the image in which we hide the secret text. Reverse inversion of bits of secret text was used in each row. It also used an improved LSB method which hid the bit of the secret text in three less important bits. And selects the bit in which we will hide the random numbers generated earlier.
  • 7. Int J Elec & Comp Eng ISSN: 2088-8708  Text in Image Hiding using Developed LSB and Random Method (Elaf Ali Abbood) 2097 These steps increase the security of the method and give good results in terms of measuring the impact of the image after the concealment compared to the original image. REFERENCES [1] Ashwini B. and Komal B., “Hybrid Approach for Embedding Text or Image in Cover Images”, International Journal of Innovative Research in Science, Engineering and Technology, vol. 5, no. 5, 2016. [2] Yang Ren-er and et al, “Image Steganography Combined with DES Encryption Pre-processing”, Sixth International Conference on Measuring Technology and Mechatronics Automation, pp. 323-326, 2014. [3] Obaida Mohammad Awad Al-Hazaimeh, “Hiding Data in Images Using New Random Technique”, International Journal of Computer Science Issues, vol. 9, 2012. [4] Artz, D., “Digital Steganography: Hiding Data within Data”, IEEE Internet Computing Journal, 2001. [5] Rupali Bhardwaj and Vaishali Sharma,” Image Steganography Based on Complemented Message and Inverted bit LSB Substitution”, 6th International Conference on Advances In Computing & Communications, 2016. [6] M.A.Wakure and S.A.Wakure, “A Digital Image Steganography”, International Journal of Computer Science Trends and Technology (IJCST), vol. 5, no. 2, 2017. [7] Ebrahim Alrashed and Suood Suood Alroomi, “Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography”, vol. 7, no. 2, 2017. [8] Reihane Saniei and Karim Faez, “The Security of Arithmetic Compression Based Text Steganography Method”, International Journal of Electrical and Computer Engineering, vol. 3, no. 6, pp. 797-804, 2013. [9] Babita1 and el al, “An Approach to Improve Image Steganography using Random Key Generation Method", International Journal of Information and Computation Technology, vol. 3, no. 4 , pp. 235-240, 2013. [10] Balvinder Singh and el al, “A Steganography Algorithm for Hiding Secret Message inside Image using Random Key”, International Journal of Engineering Research & Technology, vol. 3, no. 12, 2014. [11] Noor Kareem Jumaa, “Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator”, International Journal of Computer Applications, vol. 113, no. 13, 2015. [12] Mojtaba B. and Karim F., “An Adaptive Steganography Scheme Based on Visual Quality and Embedding Capacity Improvement”, International Journal of Electrical and Computer Engineering (IJECE), vol. 4, no. 4, pp. 573-584, August 2014. [13] Meenakshi S Arya, Meenu Rani, Charndeep Singh Bedi, “Improved Capacity Image Steganography Algorithm using 16-Pixel Differencing with n-bit LSB Substitution for RGB Images”, International Journal of Electrical and Computer Engineering (IJECE), vol. 6, no. 6, pp. 2735-2741, December 2016.