A novel LSB steganographic method using partition and matching algorithms

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    There is always a trade-off between embedding efficiency and hiding capacity of secret information. This paper presents a new ste-ganographic technique that improves the embedding efficiency and hiding capacity. For hiding information we extract LSB bits from 24-bit bmp color image. The LSB bits are joined to form an array of bits. An array is divided into N partitions depending upon the size of secret information to hide. The secret information is also divided into N partitions. Each data part finds the best possible matching location within each LSB array partition. The maximum bit matching depends upon the size of data partition, size of LSB array partition and the number of partitions used. The novelty of the proposed method is that the embedding capacity can be increased to desired level with lesser effect on embedding efficiency while maintaining security of embedded data. The paper presents efficient algorithms for bit manipulation that decreases the distortion and increases the embedding efficiency. The proposed technique shows an improvement over the existing LSB embedding methods.

     

     


  • Keywords


    Array Partitioning; Matching; LSB Array; Algorithm; Steganographic System.

  • References


      [1] Ki-Hyun Jung, Kee-Young Yoo, “Data hiding using run length matching”, International Journal of Intelligent Information and Database Systems 2009 - Vol. 3, No.3 pp. 311 - 325. https://doi.org/10.1504/IJIIDS.2009.027689.

      [2] Kekre, Hemant & Athawale, Archana & Halarnkar, Pallavi. (2008). Increased Capacity of Information Hiding in LSB's Method for Text and Image. International Journal of Electrical, Computer, and Systems Engineering.

      [3] H. Mathkour, G. M. R. Assassa, A. A. Muharib and I. Kiady, "A Novel Approach for Hiding Messages in Images," 2009 International Conference on Signal Acquisition and Processing, Kuala Lumpur, 2009, pp. 89-93. https://doi.org/10.1109/ICSAP.2009.36.

      [4] Mishra, A. Gupta and D. K. Vishwakarma, "Proposal of a New Steganographic Approach," 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies, Trivandrum, Kerala, 2009, pp.175-178. https://doi.org/10.1109/ACT.2009.52.

      [5] G.Swain and S.K. Lenka, “steganography-Using a Double Substitution Cipher.” International Journal of Wireless Communications and Networking, Vol. 2, No. 1, pp.35-39, 2010.

      [6] Ibrahim, Rosziati & Suk Kuan, Teoh. (2010). Steganography Imaging System (SIS): Hiding Secret Message inside an Image. Lecture Notes in Engineering and Computer Science. 2186.

      [7] A.P.S Pharwaha, “Secure Data Communication using Moderate Bit Substitution for Data Hiding with Three Layer Security” IE (I) Journal-ET, Vol. 91, pp.45-50, 2010.

      [8] Y.K. Jain and R.R. Ahirwal, “A Novel Image Steganography Method With Adaptive Number of Least Significant Bits Modification Based on Private Stego-Keys” International Journal of Computer Science and Security, Vol.4, No. 1, pp.40-49, 2010.

      [9] R.Das and T. Tuithung, “A Novel Steganography Method for Image Based on Huffman Encoding” IEEE, ISBN: 978-1-4577-0748-3, 2012.Dumitrescu, S., W. Xiaolin and Z. Wang, "Detection of LSB steganography via sample pair analysis," In: LNCS, Springer-Verlag, New York, Vol. 2578/2003, pp: 355–372, 2003.

      [10] Ahn, L.V. and N.J. Hopper, "Public-key steganography. In Lecture Notes in Computer Science of Advances in Cryptology," EUROCRYPT 2004, Vol. 3027 / 2004, Springer-Verlag Heidelberg, pp: 323–341, 2004. https://doi.org/10.1007/978-3-540-24676-3_20.

      [11] Pang, H.H., K.L. Tan and X. Zhou, "Steganographic schemes for file system and b-tree," IEEE Trans. on Knowledge and Data Engineering, Vol. 16, pp.701–713, 2004. https://doi.org/10.1109/TKDE.2004.15.

      [12] Dobsicek, M., "Extended steganographic system," In: 8th Intl. Student Conf. on Electrical Engineering. FEE CTU. 2004

      [13] Mittal, U. and N. Phamdo, "Hybrid digital-analog joint source-channel codes for broadcasting and robust communications," IEEE Trans. On Info. Theory, vol. 48, pp. 1082 –1102, 2002. https://doi.org/10.1109/18.995544.

      [14] Pavan, S., S. Gangadharpalli and V. Sridhar, "Multivariate entropy detector-based hybrid image registration algorithm," IEEE Intl. Conf. on Acoustics, Speech and Signal Processing, pp: 18-23, 2005.

      [15] C. Zhang, H.W. Guesgen, W.K. Yeap "Neural Based Steganography, Lecture note in computer science Computational Intelligence. Neural Networks," LNAI 3157, pp. 429–435, Springer-Verlag Berlin Heidelberg 2004. https://doi.org/10.1007/978-3-540-28633-2_46.

      [16] K. A. Al-Afandy, O. S. Faragallah, A. Elmhalawy, E. S.M. El-Rabaie and G. M. El-Banby, "High security data hiding using image cropping and LSB least significant bit steganography," 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt), Tangier, 2016, pp. 400-404. https://doi.org/10.1109/CIST.2016.7805079.

      [17] Da-Chun Wu and Wen-Hsiang Tsai. 2003. A steganographic method for images by pixel-value differencing. Pattern Recogn. Lett. 24, 9-10 (June 2003), 1613-1626. https://doi.org/10.1016/S0167-8655(02)00402-6.

      [18] K. Hossain and R. Parekh, "An approach towards image, audio and video steganography," 2016 Second International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), Kolkata, 2016, pp. 302-307.
      https://doi.org/10.1109/ICRCICN.2016.7813675.

      [19] C. C. Chang and H. W. Tseng, "Data Hiding in Images by Hybrid LSB Substitution," 2009 Third International Conference on Multimedia and Ubiquitous Engineering, Qingdao, 2009, pp. 360-363. https://doi.org/10.1109/MUE.2009.68.

      [20] K. Joshi and R. Yadav, "New approach toward data hiding using XOR for image steganography," 2016 Ninth International Conference on Contemporary Computing (IC3), Noida, 2016, pp. 1-6. https://doi.org/10.1109/IC3.2016.7880204.

      [21] Gambhir and S. Khara, "Integrating RSA cryptography & audio steganography," 2016 International Conference on Computing, Communication and Automation (ICCCA), Noida, 2016, pp. 481-484. https://doi.org/10.1109/CCAA.2016.7813767.

      [22] M. Hussain and M. Hussain, "Pixel intensity based high capacity data embedding method," 2010 International Conference on Information and Emerging Technologies, Karachi, 2010, pp. 1-5. https://doi.org/10.1109/ICIET.2010.5625723.

      [23] M. Sabokdast and M. Mohammadi, "A steganographic method for images with modulus function and modified LSB replacement based on PVD," The 5th Conference on Information and Knowledge Technology, Shiraz, 2013, pp. 121-126. https://doi.org/10.1109/IKT.2013.6620050.

      [24] F. Pan, J. Li and X. Yang, "Image steganography method based on PVD and modulus function," 2011 International Conference on Electronics, Communications and Control (ICECC), Zhejiang, 2011, pp. 282-284. https://doi.o.rg/10.1109/ICECC.2011.6067590.

      [25] Z.Hanling, G. and X. Caiqiong, "Image Steganography Using Pixel-Value Differencing," ," 2009 Second International Symposium on Electronic Commerce and Security, Nanchang, 2009, pp. 109-112. https://doi.org/10.1109/ISECS.2009.139.


 

View

Download

Article ID: 22273
 
DOI: 10.14419/ijet.v7i4.22273




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.