Fig 2 - uploaded by Lip Yee Por
Content may be subject to copyright.
Least Significant Bit 

Least Significant Bit 

Source publication
Article
Full-text available
Protected and encrypted data sent electronically is vulnerable to various attacks such as spyware and attempts in breaking and revealing the data. Thus, steganography was introduced to conceal a secret message into an unsuspicious cover medium so that it can be sent safely through a public communication channel. Suspicion becomes the significant ke...

Context in source publication

Context 1
... images have become commonplace and nowhere are these images more prevalent than on the World Wide Web in the Internet [ 28]. Using digital images as a carrier medium is suitable for information hiding because of their insensitivity for the human visual system [11]. The vast majority of web pages are impressively sophisticated with colour images and thus Internet users browsing through the web no longer pay attention to sites containing images or to the downloading of images and data files from the Web [28]. Besides, there is a large amount of redundant bits in an image. The redundant bits of an object are those bits that can be altered but the alteration cannot be visibly detected by human eyes [13]. Based on the literature [10], [15] and [17], these existing LSB steganographic systems utilize only one LSB insertion method in concealing secret message. In addition, S-Tools and EzStego are two of the well-known steganography tools [17] that solely employ a single LSB method. However, the amalgamation of different steganography methods would enable the construction of a steganographic system that amasses the properties from various methods so that it provides a variety of algorithms for the user while increasing the difficulty of steganalysis at the same time. StegCure allows more hard codes to be added at the backend of the system by using function call to execute the method of additional algorithms. This section reviews on the least significant bit (LSB) insertion method and the significance of using GIF format in StegCure. Least significant bit insertion is a common, simple approach to embed information in a cover file [6], [17]. The LSB is the lowest order bit in a binary value. This is an important concept in computer data storage and programming that applies to the order in which data are organized, stored or transmitted [21]. Usually, three bits from each pixel can be stored to hide an image in the LSBs of each byte of a 24-bit image. Consequently, LSB requires that only half of the bits in an image be changed [27] when data can be hidden in least and second least significant bits and yet the resulting stego-image which will be displayed is indistinguishable to the cover image to the human visual system [17]. The last bit of the byte is selected as the least significant bit (as illustrated in Figure 2) because of the impact of the bit to the minimum degradation of images [12]. The last bit is also known as right-most bit, due to the convention in positional notation of writing less significant digit further to the right [7]. In bit addition (refer to Figure 3), the least significant bit has the useful property of changing rapidly if the number changes slightly. For example, if 1 (binary 00000001) is added to 3 (binary 00000011), the result will be 4 (binary 00000100) and three of the least significant bits will change (011 to 100). Basically, by modifying the insignificant bits, the cover image is typically altered in a nearly imperceptible manner thereby ensuring that any observer would be unaware of the alteration made. Employing the LSB technique for data hiding achieves both invisibility and reasonably high storage payload, a maximum of one bit per pixel (bpp) for grayscale and three bpp for Red-Green- Blue (RGB) images [31]. There are a number of steganographic tools which employ LSB insertion methods available on the web. For example, S-Tools which is invented by Andy Brown, takes a different approach by closely approximating the cover image which may mean radical palette changes. S-Tools hides the secret message within the cover file via random available bits. These available bits are determined through the use of a pseudo-random number generator. Pseudo- random is defined as random in appearance but reproducible by deterministic means, such as number generated by a series of equations. Once a pair is selected, the pixels intensities within one region are increased by a constant value while the pixels of the other region decreased by the same value [31]. The non-linear insertion makes the presence and extraction of secret messages more difficult. The image palette is taken and search for the LSB of each byte and the software then attempts to reconstruct the cover file by inserting the bits of the secret message into these LSBs [17]. Thus, S- Tools reduces the number of colours while maintaining the image quality, so that the LSB changes do not drastically change colour values. Based on the review [17], S-Tools provided the most impressive results of any steganographic package because S-Tools maintained remarkable image integrity. Another tool, which uses LSB manipulation is EzStego written by Romana Machado. Based on Figure 4, EzStego arranges the palette to reduce the occurrence of adjacent index colours that contrast too much before it inserts the message. Two adjacent colours in the sorted palette can hardly be separated [5], [22]. The modification LSB in EzStego works by twiddling the least significant bit to encode the secret message. Then, it resorts the palette by renumbering all of the colours with their original value before shifting the image. The receiver resorts the palette using the same algorithm and extracts bits by using the sorted palette. This approach works quite well in gray-scale images and may also work well in images with related colours [17]. Apparently, based on literature [13], the problem with the palette approach used with GIF images is that when one changes the least significant bit of a pixel, it can result in a completely different colour since the index to the colour palette is changed [13]. Hence, StegCure manipulated the structure of the RGB component by enhancing the basic LSB method into a colour cycle algorithm so that the stego-image will not have drastic ...

Citations

... This approach distributes the data encrypted with AES to be infused into the image by randomly selecting pixels and modifying their LSB value and computed an MSE of 0.95186 and a PSNR of 48.34506 dB to quantify changes in image dynamics. Por et al. [32] illustrated the StegCure scheme is a combination of three steganography algorithms for the GIF image and the implementation of StegCure that conceals around 33% with high protection levels using PKI. Zaidan et al. [42] performed multi-cover steganographics with the help of remote sensing images and a general recursion neural crypto-system using a non-standard procedure to protect data until it is hidden, and they also develop a multi-cover methodology to ensure the strength of their solution. ...
Article
Full-text available
Steganography is a technique of hiding information in digital media such as images, text, audio, etc. This digital media is used as the cover to make the private message invisible. Apparently, the attackers do not have any idea about the original message that is being hidden in the cover media. In this research, the proposed technique has focused on implementing the least significant bit (LSB) matching steganography algorithm. For ensuring better security, the advanced encryption standard (AES) technique is used before applying the steganography technique to ensure two-layer security of the private message. Another feature that is used in this research is using mosaic images as the cover media. Mosaic image is capable of hiding up to five LSB layers. Different survey papers show that the success rate of using mosaic images as the cover media is approximately 99% comparing with approximately 50% the success of normal image in case of data hiding. Our proposed approach overcomes the problem of stego image distortion using mosaic images. The improved LSB steganography algorithm also effectively handles mosaic images. Using a better version of LSB, Stego images were given more excellent peak signal-to-noise ratio (PSNR) value than other approaches when the hidden message was integrated into the mosaic image. Compared with different space domain strategies, the PSNR value of our proposed system is 85.65 dB for a maximum capacity of 32 bytes.
... WK Lai and Z Alireza [15], explained the enhanced LSB insertion system from the simplest and straight 1-LSB to the color cycle technique. Several existing steganography techniques were discussed and some essential complications were highlighted. ...
Article
Full-text available
Steganography emerged as an effective technology for securing the data over the network. Its specificity of concealing the existence of the secret data supports its application in securing the information in the modern era. The desire of industry and support from various governments motivated the researchers to develop steganography tools. These spatial and transform domain tools implement different steganography techniques either solo or as a hybrid using a wide range of media as a cover file for hiding various types of data. In this paper, a systematic study of the steganography tools developed in the last three decades has been done. The comparative analysis of these tools based on specified parameters represents their strengths, limitations, applicability, and scope for future work as well. OpenPuff steganography tool spawns a huge acceptance by academics and professionals. This paper also analyze the performance of the OpenPuff tool on some unexplored parameters to validate and justify its performance.
... In 2008, L.Y. Por, W.K. Lai, Z. Alireza, T.F.Ang, M.T.Su and B.Delina, [8] have integrated three LSB insertion algorithms in one steganography system. The unauthorized users can't detect the secret data during a communication because this method implements a public key infrastructure that is only the sender and the receiver can know it. ...
... Por.L.Y [20] have proposed a combination of three different LSB insertion algorithms on GIF image through stegcure system. The unique feature about the stegcure is being able to integrate three algorithms in one Steganography system. ...
Article
The main objective of this project is to develop a novel approach for hiding the data through Steganography. In Steganography, the secret message is to embedded into the image and then this embedded image is used for further sending purpose. This Steganography technique is used to protect the secret message from the eavesdroppers. First the cover image is divided into blocks and then the prediction algorithm is applied to each block to find the blocks which contains the texture information. The prediction error helps to find out the texture blocks. These blocks only used to embed the secret message for providing high visual perception. Not only that in this paper multilayer security is also included. Before embed the secret message the encryption technique is applied and then the encrypted message is collapsed for avoiding attacks.
... In compared with the other tools, StegCure offers a better security and has a user-friendly functionality with interactive graphical user interface (GUI) and integrated navigation capabilities. Also, it can prevent any attacks by restricting the user to one attempt to retrieve the secret message [14]. ...
... As we know the information hiding methods can be classified into two wide categories: spatial domain and frequency domain techniques. The simplest image hiding technique hides the secret message directly into the spatial domain by modulating the least significant bits (LSB) of the cover-image [1], [14], [17] [19]. The advantages of spatial domain techniques are high perceptual precision, efficiency, and easily achieving of high hiding capacity. ...
... [10], this algorithm uses the same principle of LSB in which the message is hidden in the least significant bits (LSBs) of the pixels with more randomness in the selection of number of bits used and the color channels (Red, Green, and Blue) that are used. In a simple LSB approach we can hide 12.5 % data in an image, and in the modified LSB approaches (3-3-2 and 4-4-4), this hidden of data can reach up to 33.3% in a digital image [1], [12], [17], [18]. In Figure1, "M" is the message to be hidden, "C" is the cover image in which message "M" is to hidden, and "S" is a stego image after the message "M" scrambled with the cover image "C". Figure 2 is the cat original image known as cover image; in this image nothing is hidden. ...
Conference Paper
Full-text available
Steganography is a science of embedding private, confidential, sensitive data or information within the given cover media without making any visible changes to it. In this paper, we present a modified Triple-A method for RGB image based steganography. This method introduces the concept of storing variable number of bits in each channel (R, G or B) of pixel. We come out with extended Randomize pixel Steganography algorithm without any limitations on the type of images being used. In this analysis, we focus on the property of human vision system that helps to increase the amount of data hiding in the images practically. In this work, we hide the data in pixel which is selected by randomly using Fisher Yates algorithm. The security can be enhanced by cleverly embedding the data, along with a random choice of pixel position. It offers very high security of messages that hidden in images.
... A practical steganographic implementation ST-FMM [19] proposed to hide text inside grey scale images. within the 55 window size into its corresponding multiples of 5. ...
Article
Full-text available
In any communication, security is the most important task. With the advancement of technology and the wide use of World Wide Web for communication increase the challenges of security. Most of the classical security method are based on cryptography and stegnography techniques, but every time these technologies may not be reliable for communication of secrete information over a long distance. Where cipher text may easily arouse attackers'suspicion, the biggest concern in the field of steganography is the rapid advancement of research in steganalysis, the counter-technology of steganography. This merely means that steganography needs to add security services to its current repertoire, while not increasing the number of problems. However, in recent years, a lot of research has taken place in direction to trim down the security issues by contributing various approaches but different terrains pose separate challenges. These inadequacies of modern as well as traditional security methods, motivates to design a novel security system that improve the level of security. In this context, this paper has proposed a novel two layer security mechanism by combining the concepts of both, cryptography and stegnography techniques.
... In future, research on other graphical authentication method such as [20] and improving other security threats such as man in the middle and alleviating user memorability will be our main focus. Subsequently, data hiding method such as in [13,17,18,19] will be considered to secure the registered password. ...
Article
Full-text available
This paper addresses a newly discovered security threat named Frequency of Occurrence Analysis (FOA) attack in searchmetics password authentication scheme. A countermeasure technique that utilises Metaheuristic Randomisation Algorithm (MRA) is proposed to address the FOA attack. The proposed Algorithm is presented and an offline FOA attack simulation tool is developed to verify the effectiveness of the proposed method. In addition, a shoulder surfing testing is conducted to evaluate the effectiveness of the proposed method in terms of mitigating shoulder surfing attack. The experiment results show that MRA is able to prevent FOA and mitigate shoulder surfing attacks. Moreover, the proposed method is able to provide larger password space compare to the benchmarking scheme.
... Since LSB appears at the lowest order bit in a binary value, therefore the altered bits can only be discovered with hex editor. Images is the most wide-spread media in use [2,25] and when digital images are being utilised as cover in steganography, the cover-image is generally manipulated by changing one or more bits of a single or multiple bytes in image pixels. The secret data can be stored in the LSB of one (e.g., blue colour) out of the three RGB colour bytes or in the parity of the entire RGB [2]. ...
Article
Full-text available
Several problems arise among the existing LSB-based image steganographic schemes due to distortion in a stegoimage and limited payload capacity. Thus, a proposed scheme has been developed with the aims to help in improving the payload of the secret data at the same time retaining the quality of the stego-image produced within an acceptance threshold. This study has led to the modification of the current LSB substitution Algorithm by delivering a new Algorithm namely sequential colour cycle. For achieving a higher security, multi-layered steganography can be performed by embedding a secret data into multiple layers of cover-images. The performance evaluation has been tested and proven that the improvement of embedding ratio at 1:2 for the proposed Algorithm can be achieved and the value of the image quality is not falling below the threshold of distortion.
... Images is the most wide-spread media in use [2,25] and when digital images are being utilised as cover in steganography, the cover-image is generally manipulated by changing one or more bits of a single or multiple bytes in image pixels. The secret data can be stored in the LSB of one (e.g., blue colour) out of the three RGB colour bytes or in the parity of the entire RGB [2]. ...
Article
Full-text available
Several problems arise among the existing LSB-based image steganographic schemes due to distortion in a stego-image and limited payload capacity. Thus, a proposed scheme has been developed with the aims to help in improving the payload of the secret data at the same time retaining the quality of the stego-image produced within an acceptance threshold. This study has led to the modification of the current LSB substitution Algorithm by delivering a new Algorithm namely sequential colour cycle. For achieving a higher security, multi-layered steganography can be performed by embedding a secret data into multiple layers of cover-images. The performance evaluation has been tested and proven that the improvement of embedding ratio at 1:2 for the proposed Algorithm can be achieved and the value of the image quality is not falling below the threshold of distortion.