Figure 1 - uploaded by Mohammed Abdallh Otair
Content may be subject to copyright.
Embedding Data in Steganography. Figure 2. Process of Least Significant Bit. 

Embedding Data in Steganography. Figure 2. Process of Least Significant Bit. 

Source publication
Article
Full-text available
Background/Objective: Manipulation of sensitive images is a very important issue in modern transmission and storage. The objective of this study is to achieve the protection by applying a modified steganography method. Findings: The proposed method uses modified Least Significant Bit (LSB) algorithm which depends on segmentations of the secret imag...

Contexts in source publication

Context 1
... an embedding algorithm, an image is embedded (as cover image) into another image based on the secret key. The receiver will receive the stego image which is a result of embedding process. The stego image is processed by extracting algorithm at the other side. Unauthenticated persons could access the image transmission but cannot access the stego image, or even discover or extract the hidden message 4 . The Least Significant Bit embedding (LSB) is considered as one of the mostly used digital steganography and embed- ding techniques. In steganography using LSB, the encryption of the secret messages are achieved by hiding them in the LSBs of the digital signal samples. When the digital sensor is designed, the quantizer puts the LSB in binary coding system or even below the sensor noise of energy level to pre- vent losing the precision 5 , as shown in figure ...
Context 2
... steganography using LSB, the encryption of the secret messages are achieved by hiding them in the LSBs of the digital signal samples. When the digital sensor is designed, the quantizer puts the LSB in binary coding system or even below the sensor noise of energy level to pre- vent losing the precision 5 , as shown in figure (2). ...

Similar publications

Article
Full-text available
Hiding information is a significant range of study in relevant existences including a quantity of requests. Steganography or hiding information is a discipline of implanting info into the digital cover, like text, video, voice, images etc. Several Steganography approaches have been practical in relations of forcefulness and capacity. Nevertheless,...

Citations

... The LSB technique is used in this research by [23] to partition data, and it is anticipated that the groupings of bytes inside the cover image will yield mixed dispersals. The following stage is to insert the classified data bytes into the cover image bytes after determining the mixed dispersion of bytes' group for every cover and stego image. ...
Thesis
Full-text available
There are hundreds of papers which discuss and propose steganography schemes using the LSB approach. Some of these papers are reviewed and documented in this article. Moreover, this paper presents a novel steganography scheme designed to enhance the security and efficiency of transmitting vital or confidential information over the internet through image concealment. The proposed scheme utilizes LSB embedding, an Arithmetic sequence, and the Rudin-Shapiro sequence to embed secret data within cover images. The objective of this research is to develop a software solution that ensures the secure transmission of information while outperforming existing techniques. The system was implemented using Wolfram Mathematica on various cover images, and different message lengths were considered. Performance evaluation metrics including MSE, PSNR, SSIM, NCC, and IF were employed to assess the system's effectiveness. The results demonstrate that the proposed scheme achieves minimal distortion and maintains acceptable image quality across different message lengths. Comparative analyses with other steganography techniques indicate the superiority of the proposed scheme in terms of numerical metrics, although certain schemes excel in specific scenarios. This research contributes to advancing the field of steganography and highlights opportunities for further enhancements and comparisons against more advanced techniques.
... The proposed method in [42] performs image steganography using a modified LSB substitution to achieve better hiding capabilities. In the proposed modified LSB, an extra segmentation step is performed over the cover image, which should help decrease the noise in the stego image data. ...
Thesis
Full-text available
As the use of technology escalates, so does the volume of data generated; hence, protecting data transfer between communication parties has become a necessity. The main contribution of this thesis will be provided through the proposed security scheme which applies the concept of steganography. The proposed scheme adopts a new mathematical sequence called Quadrinacci which is employed along with the Least Significant Bit (LSB) substitution to determine the location of the embedding pixels. Outstanding numerical results are achieved where the proposed scheme results in a low value of the Mean Square Error (MSE) and a high value of the Peak Signal to Noise Ratio (PSNR). Also, the Structural Similarity Index Measurement (SSIM), the R measurement (R), the Normalized Cross Correlation (NCC), and the Image Fidelity (IF) results are ∼ 1. In addition to that, an image histogram comparison is conducted along with other comparison methods and all show the effectiveness of the proposed scheme. Furthermore, a comparison between the proposed scheme and other work from the literature is presented to demonstrate that the proposed scheme has superior performance to its counterparts.
... times. Results proved that the technique used is very effective in terms of MSE and PsNR [25]. ...
... As mentioned previously a number 142 or 10001110 in binary form is to be hidden in the color image with the least affected on the carrier color image. Notify that only the five bits really changed to embedded number 270 In general, the average number of bits that have changed out of the sum of the least significant bits value in the image, which are the same as the number of bits of confidential information, are usually less than half, and the values of the other bits of the image remain unchanged, Arya [22] and Odat [23]. To illustrate the process of inserting confidential information into the image carrier follow the algorithm: ...
Article
Currently, steganography is considered the most powerful technique among other procedures to obscurethe presence of buried information within a cover body. The Greek word steganographic means coveredwriting. This term may be considered the most appropriate to bury confidential secret data via internetcorrespondence. Steganography technique can be defined as the science of safe electronics transmitting.So, the aims of the steganography technique are to hide the presence of conveying data from un unwillingparty. Various carrier object formats can be implemented, but color images become the more commonamong the other digital object. Currently, a lot of works adopted the image steganography as a coverobject. The contemporary secure image steganography technique offerings a transferring the embeddedconfidential information task to the intended end point without being perceived or even suspicious by theattackers. There exists a large variability of steganographic techniques for fixed secret data in colorimages. Some of these techniques are more complicated than others, and each of these methods haspositive and negative considered points. The objective of this work is to give a brief overview ofsteganography techniques using color images as a cover object by implementing MATLAB softwareusing the LSB algorithm. We found that the carrier image keeps the original feature without anydistortion caused by embedded secret information. The performance measured by PSNR and MSEtechnique and shown satisfied results.
... Less Significant Bit embedding is the most widely utilized digital steganography technique. Confidential messages are encrypted by hiding them in the digital signal samples' is Less Significant Bit [11]. ...
Article
Full-text available
Steganography is a technique for concealing secret messages from persons who are not authorized to see them. These days, data security during travel is critical. Using the spatial domain embedding approach, a method with many stages was devised to hide the three secret files (Text, Image, and Audio) inside the RGB images during the investigation of least significant bits LSB4. To make the recovery procedure more difficult and secure, use both pure and secret key patterns based on the distance that depends on the LSB3 of the secret files and also, rotate the cover-image 180 degree before embedding. The files embedding stage then begins within RGB, with text files going into the red channel (R), image files going into the green channel (G), and audio files going into the blue channel (B). This method was successful in hiding files without deforming the original image or causing changes to be noticed as a result of the concealment procedure, and those files were quickly recovered without losing any of their components. The method was evaluated using quality assessment tools such as SSIM, as well as the two popular new techniques HSM and HFM and FEI face dataset.
... Susunan algoritma Advanced LSB modifikasi yang dapat meningkatkan kemampuan menyembunyikan pesan (Odat & Otair, 2016). Error yang dihasilkan LSB standar lebih tinggi untuk nilai error, sedangkan LSB modifikasi memiliki error rendah. ...
Article
Steganografi merupakan suatu ilmu menyembunyikan pesan atau menulis pesan secara tersembunyi, sehingga hanya pengirim dan penerima pesan yang dapat memahami isi dari pesan tersebut dan tidak ada orang lain yang dapat menyadari atau mengetahui bahwa ada suatu pesan yang disembunyikan. Modifikasi metode LSB mengembangkan metode LSB sebelumnya dengan penginputan pesan diberi jarak satu piksel yang memuat red, green, blue (RGB) tiap piksel pada media cover (media untuk menyembunyikan pesan). Pada penelitian ini menggunakan delapan dataset berupa gambar PNG 24-bit dan 32-bit. Pada akhir baris piksel disisipkan password sebagai pengaman sekaligus counter pesan yang akan dipanggil. Penyisipan dilakukan selang-seling antara piksel secara kontinu hingga semua pesan tersisipkan. Rekonstruksi ulang gambar cover-image harus mempertahankan nilai cover-image ketika didekomposisi menjadi sebuah stego-image. Penyimpanan pada tahap ini menggunakan format file .bmp karena kompresi tipe file ini lebih tahan terhadap perubahan. Modifikasi metode LSB dalam penelitian ini dapat meningkatkan tingkat akurasi yang diukur dengan nilai Mean Squared Error (MSE) sebesar 0.000607464 sampai dengan 0.465577667 dan Peak Signal-to-Noise Ratio (PSNR) sebesar 64,49 dB sampai dengan 129,53 dB. Berdasarkan data ini, algoritma yang diusulkan mengalami peningkatan kualitas stego-image.
... It is classified as one of the commonly used digital steganography and embedding techniques [8]. It called like that because the way to embedded message within a cover image. ...
... To evaluate the performance of the steganography by following parameters [8]: ...
Article
Full-text available
Because the big grown of digital market and the growing demand for protection to data and information which transmitted through the Internet. Steganography it is art of embedding, hiding information into different digital media, it was the main reason to increase its importance in exponential development of the secret communication of computer and digital cloud users over the internet. There are a lot of techniques and different ways to achieve hiding data. Usually, the data embedding is obtained in communication such as image, text, voice or any multimedia content for copyright and also in military communication for authentication and many other different purposes. In this paper we protected the information in two ways: Encryption and Steganography. The basic idea is to present a method that encrypted the message firstly by using The AES (Advanced Encryption Standard) it is a symmetric-key encryption each of these ciphers it has 128-bit the size to block, and size keys of 128, 192 and 256 bits. Secondly, hide that encrypted message in color cover image in the Least Significant Bit (LSB) to image's frame with (.bmp, .jpg) extensions. Our scheme is to enhance the ability of LSB algorithm to include the storage of information and images encoded and intangible sense of human vision. That two methods to increased together the security attend any attack.
... Data hiding algorithms have been introduced, including the LSB (Least Significant Bit) method [15]. It is relatively simple to implement, and it has been the basis of other research, especially in the image [16] and audio [17] environments. Dual stego file is proposed in [18], which makes it possible to increase the payload size, such that more bits can be hidden in the cover. ...
Article
The development of information technology has brought an avoidable consequence for data security. It is because data, specifically those are private or confidential, are vulnerable to illegal access. Therefore, a protection method, such as data hiding, is essential. This protection is done by inserting a secret message (payload) into a medium (cover). One of the media commonly used in this method is audio, where a payload is embedded in audio samples. Nevertheless, this common technique has several disadvantages, including the relatively small insertion space and the significant dissimilarity between stego-audio and its original audio cover. Moreover, there is a risk of payload that cannot be returned to the original file. To overcome these problems, we propose to employ the fuzzification stage in the fuzzy logic algorithm that the samples are grouped into five categories. The binary payload is evenly distributed to the available sample space, which previously was calculated by considering the total payload and the number of interpolated samples. In the case that space is not enough to carry the payload, it is dynamically increased. The results show an increase of about 48% in stego audio quality measured by the Peak Signal-to-Noise Ratio (PSNR). Moreover, the method is reversible, and the size of the sample space can be controlled to specific values.
... According to MSE, the quality of the image in steganography is considered to be better when the value of MSE is lower. [17] ...
... According to MSE, the quality of the image in steganography is considered to be better when the value of MSE is lower. [15] ...
Conference Paper
Full-text available
While traditional embedding methods which are usually based on LSBs provide security to hidden messages in image-based Steganography, steganalyses have shown these methods to be vulnerable to detection and extraction, thus compromising the security of embedded messages. In this study, a new embedding method based on LSB is introduced to address this vulnerability. By using a one-time pad encryption method, the security of secret messages before embedding is ensured. A partitioning method based on columnar transposition and RGB color plane scattering technique is employed to improve scattering and ensure randomization during embedding. The experimental result shows an excellent outcome of the Peak-signal-to-noise Ratio (PSNR), Mean square Error (MSE), and Structural Similarity (SSIM) index. The PSNR value of the 5 test images results ranges from 53.2122 to 60.8716 all are higher than the acceptable value of PSNR, which is 30db.The average MSE result is0.2766 for all color planes, which also provide an outstanding result since the lower the MSE means the accumulative squared error between the stego image and the original one is lower. The average SSIM obtained in the testing is 0.9792for the 5 test images, which is very close to 1. The result supports the claim that the resulting stego images have low distortion which means that the cover image is almost the same with the stego image and that the modified LSB embedding algorithm provides excellent image quality with high imperceptibility and provides added security layers.