ArticlePDF Available

An improved LSB image steganography technique using bit-inverse in 24 bit colour image

Authors:

Abstract

Steganography is an art of disguising the fact that communication is going on by concealing information in other information. In general, the communication carrier can be files in many formats; however, digital images are the most common due to their frequent use on the Internet. This paper introduces an improvement on the standard least significant bit (LSB)-based image steganography technique and proposes the bit inversion method that improves the stego-images quality in 24-bit colour image. A stegoimage is the outcome of an image (usually called the cover image), after a secret message is hidden in it. In this technique, the LSB’s of some pixels of the cover image are inverted, when inputs of specific patterns of some bits related to the pixels are found. In this way, less number of pixels is modified in comparison to the standard LSB method. Our focus is to obtain a high value ratio of the Peak Signal-to-Noise (PSNR) of the stego-image, to make sure that both stego-image and the original image are difficult to discern by human eyes. The proposed bit inversion method starts with the last LSBs of both green and blue colour planes that will be replaced by the first and the second most significant bits (MSB) of the secret image. The proposed method introduces two additional levels of security to the standard LSB steganography. The first level is that because only the green and blue colours are used, instead of three colors red, green, and blue in the standard LSB, the red colour will act as noise data, and thus increases the complexity of an attacker, when he/she tries to retrieve the secret message. The second level exploits the new bit inversion technique that reverses the bits of the image pixels after applying the standard LSB. Experiments have been conducted using a collection of standard images to evaluate the proposed technique, which give the Peak Signal-toNoise Ratio (PSNR) values of 72, 61, and 70 for Lena.jpg, Babbon.jpg, and Pepper.jpg respectively. From the experiment, we also observed that by using the bit inverse technique, less numbers of pixels are modified compared with the standard LSB method.
Journal of Theoretical and Applied Information Technology
20th October 2015. Vol.80. No.2
© 2005 - 2015 JATIT & LLS. All rights reserved.
ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195
342
AN IMPROVED LSB IMAGE STEGANOGRAPHY
TECHNIQUE USING BIT-INVERSE IN 24 BIT COLOUR
IMAGE
1MOHAMMED ABDUL MAJEED, 2ROSSILAWATI SULAIMAN
Center for Software Technology and Management, Faculty of Information Science & Technology,
Universiti Kebangsaan Malaysia, Selangor, Malaysia
E-mail: 1mmajeed91@yahoo.com, 2 rossilawati@ukm.edu.my
ABSTRACT
Steganography is an art of disguising the fact that communication is going on by concealing information in
other information. In general, the communication carrier can be files in many formats; however, digital
images are the most common due to their frequent use on the Internet. This paper introduces an
improvement on the standard least significant bit (LSB)-based image steganography technique and
proposes the bit inversion method that improves the stego-images quality in 24-bit colour image. A stego-
image is the outcome of an image (usually called the cover image), after a secret message is hidden in it. In
this technique, the LSB’s of some pixels of the cover image are inverted, when inputs of specific patterns of
some bits related to the pixels are found. In this way, less number of pixels is modified in comparison to the
standard LSB method. Our focus is to obtain a high value ratio of the Peak Signal-to-Noise (PSNR) of the
stego-image, to make sure that both stego-image and the original image are difficult to discern by human
eyes. The proposed bit inversion method starts with the last LSBs of both green and blue colour planes that
will be replaced by the first and the second most significant bits (MSB) of the secret image. The proposed
method introduces two additional levels of security to the standard LSB steganography. The first level is
that because only the green and blue colours are used, instead of three colors red, green, and blue in the
standard LSB, the red colour will act as noise data, and thus increases the complexity of an attacker, when
he/she tries to retrieve the secret message. The second level exploits the new bit inversion technique that
reverses the bits of the image pixels after applying the standard LSB. Experiments have been conducted
using a collection of standard images to evaluate the proposed technique, which give the Peak Signal-to-
Noise Ratio (PSNR) values of 72, 61, and 70 for Lena.jpg, Babbon.jpg, and Pepper.jpg respectively. From
the experiment, we also observed that by using the bit inverse technique, less numbers of pixels are
modified compared with the standard LSB method.
Keywords: Image Steganography, LSB, Bit-Inverse, Robustness, Colour Image
1. INTRODUCTION
The idea of concealing information is not
considered new throughout the history. The term of
steganography comes from the Greek words, which
means, “covered writing”[1], which dated back as
early as in ancient Greece’s war. “Steganos” means
“covered” and “graphos”, which means "writing". It
often refers to secret writing or data hiding [2]. In
fact, different attempts have been done to hide
secret messages in reliable media to be delivered
across the enemy territory. In the modern world of
digital communication, several techniques are used
for hiding secret information in another medium.
Steganography [3] is one of them, in which the
digital media mainly the digital images are used as
a medium to hide the secret information. The secret
information can be seen in the form of texts, digital
images, video, or audio files.
The main goal of steganography method is to
raise the level of security on communication by
inserting secret messages into digital images and
altering the increased pixels of the image.
In general, the digital images are stored as an
array in the computer systems that comprise of
finite number of elements. Each element has its
own specific location and value, which are known
as pixels. In the case of 24-bit colour image, each
Journal of Theoretical and Applied Information Technology
20th October 2015. Vol.80. No.2
© 2005 - 2015 JATIT & LLS. All rights reserved.
ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195
343
pixel includes three components of colour that are
Red, Green, and Blue. Thus, three bytes (24 bits)
refer to each pixel to point out to the intensity of
these colours.
Steganography method and cryptography are
different in the sense that while cryptography
focuses on keeping the contents of a message
secret, steganography centres on maintaining the
existence of a message a secret [4]. The word
cryptography is related to the Greek word kryptós
which means unseen, and gráphein refers to the
verb write. In fact, it is a study of conveying the
information from its normal readable format to an
unreadable one.
Nowadays, the combination of steganography
with other methods such as cryptography has
become practiced widely. As a result, information
security has improved considerably. Moreover,
steganography exploits in the exchange of
information.
The least significant bit (LSB) is one of the
steganography techniques that is the simplest and
most famous method, which hides the secret
message directly through concealing the least-
significant bit of each pixel in an image. Our
proposed technique is based on the standard LSB
technique, an algorithm for 24-bit colour image to
improve the stego-image security based on bit
inversion. This paper is organized as follows:
2. THE STANDARD LEAST-SIGNIFICANT-
BIT TECHNIQUE (LSB)
The preferable technique of steganography
image intends to achieve three aspects [5]: (1) the
capacity of the maximum data that can be stored
within the covered image, (2) the imperceptibility,
which represents the visual quality of stego-image
after data hiding, and (3) the robustness, which is
the difficulty of any unauthorized party to retrieve
the secret data.
Although, the standard LSB-based technique
considers excellent at imperceptibility (the
difficulty to perceive), the capacity of the hidden
data is still low because only one bit per pixel is
used to hide the data. The standard LSB technique
is not robust due to the easiness of retrieving the
secret message. It is easy to retrieve the standard
LSB, because the hidden data is always hidden at
the least significant bit of any stego-image. This
paper focuses on improving the security level of a
secret message, as well as taking into consideration
to increase the capacity of storing the secret data,
and the quality of the stego-image, which
is imperceptibility. This paper proposed a new
technique that will cater for the above three
properties.
This paper presents an improved LSB-based
steganography by using 24-bit colour image, which
provides more security compared with the standard
method of LSB. Steg-analysis is performed on the
standard LSB stego-image for standards colour
image channels in order to analyses the bit patterns
of the second and third LSBs that occur after the
process of standard LSB. In brief, the proposed
technique in this paper should take into
consideration that any security level improvement
must not affect both capacity and the quality of
stego image
3. 24 BIT COLOR IMAGE
A 24-bit colour image is considered the best in
accordance with the definition of RGB colour
model in which each colour shows as in its primary
spectral component of red, green and blue. This
model is based on Cartesian coordinate system as
shown in Fig 1. Thus, the RGB primary values are
laid in three corners. The secondary colours
recognize as cyan, magenta and yellow, they are
centered at three other corners. Black colour is at
the origin and white is at the farthest corner from
the origin. Equal values include red, green, blue are
consisted the line that links two corners. Therefore,
this produces various shades of grey.
Fig 1: Schematic of the RGB color model
The locus of all these points is named the grey
line. In fact, each pixel in the RGB model
composes of RGB values. So, each of these colours
requires 8-bit for its representation. Accordingly,
each pixel signifies by 24 bits in total. So the sum
of possible colors with 24-bit RGB image reaches
(28)3 = 16,777,216.
Journal of Theoretical and Applied Information Technology
20th October 2015. Vol.80. No.2
© 2005 - 2015 JATIT & LLS. All rights reserved.
ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195
344
4. LEAST SIGNIFICANT BIT
The LSB based technique is mainly
uncomplicated and simple approach through which
message bits are embedded within the least
significant bits of cover image. In the LSB
steganography method and for the purpose of
covering the secret messages, the least significant
bits of the cover-image are exploited. Thus, this
method is considered one of the most common
techniques that include the standard LSB
replacement [6].
Consider the following cover-image and secret
message in bits. The LSB replacement alternates
the last bits of the cover image with each bit belong
to the messages that are required to be hidden. The
next example is to show the method of standard
LSB replacement. The stego-image is the result
after embedding the secret message.
Cover Image Pixels:
00110011 11101001 01101010 10101001
11011000 10001101 10001100 01101101
Secret Message:
1 0 0 0 1 1 1 0
Result (Stego-image):
00110011 11101000 01101010 10101000
11011001 10001101 10001101 01101100
For RGB, a technique from [6] alternates the
least significant bits of each channel of Red, Green
or Blue with the secret message bits. The result of
the LSBs alternation causes minor changes in the
RGB colours and therefore, it is difficult to be
noticed by the human eye. The following is the
algorithm for LSB-based embedding and extracting
process illustrates as follows [7]:
A LSB-BASED EMBEDDING AND
EXTRACTING SECRET DATA ALGORITHM
LSB-based Embedding Algorithm
Input -: cover C
For i = 1 to Length(c), do
Sj
Cj
For i = 1 to Length (m), do
Compute index ji where to store the ith message
bit of m
Sji
LSB(Cji) = mi
End for
Output -: Stego image S
LSB-based Extracting Algorithm
Input -: Secret image s
For i = 1 to Length (m), do
Compute index ji where to store the ith message
bit of m
mji
LSB(Cji)
End for
In the process of extractions, the fixed messages
can be extracted without any reference to the
original cover-image in the given stego-image S.
The collection of storing pixels in the secret
message bits are chosen from the stego-image by
using similar sequence as in the embedding
process. The LSBs of the selected pixels are
extracted and lined up for the purpose of reforming
the secret message bits.
5. THE PROPOSED BIT INVERSION
TECHNIQUE
As discussed in the previous section of this
paper, the LSB inversion method can be described
as an operation of inversing the last bit of each
pixel within the cover-image based on the secret
image values. This standard LSB method is
completed when all secret messages’ bits have been
embedded or hidden in the cover-image.
The proposed inversion technique is determined
using the comparison of the 2nd last and 3rd last bit
of the cover-image with the bits from the stego-
image, which is obtained from applying the
standard LSB method. The step-by-step process of
the proposed method is as follow:
1. Calculate the pattern occurrences of these two
bits on the cover-image, which are either 00, 10,
10, or 11. Classify the cover image according
to these four patterns.
2. Apply the standard LSB method to obtain the
stego-image.
3. From the stego-image, once again, calculate the
pattern occurrences in the 2nd last and 3rd last
bit of the stego-image. From these patterns, we
use them as a guide for the inversion steps.
4. Compare between each pattern from cover image
with the same pattern in the stego-image.
5. Inverse the LSB bits if the number of pixels that
have been changed is greater than the number of
pixel that has not change.
6. Store the status of the patterns that inverse its
pixel in specific location.
An example will be used to show the step-by-
step process. Consider the following values for
cover image and the secret message:
Journal of Theoretical and Applied Information Technology
20th October 2015. Vol.80. No.2
© 2005 - 2015 JATIT & LLS. All rights reserved.
ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195
345
1. Cover image:
10001100, 10101101, 10101011 and 10101101
2. Apply standard LSB method, and labelled the
results as A, B, C, and D.
Secret message : 1011
Cover image : 10001100 10101101
A B
10101011 1010110
C D
LSB stego-image : 10001101 10101100
A B
10101011 10101101
C D
3. From A, B, C, and D, we focus on the 2nd and
the 3rd last bits of bit position such as bold in
(2). From the result, there are four pixels with
two patterns (10, 01).
Three pixels that have ‘10’ pattern (A, B, D)
and one pixel that have ‘01’ pattern (C) .
4. For each pattern, we do the following:
a. For pattern ‘10’, check how many pixels are
changing, and how many are unchanged.
Compare the results with the original cover
image. Result: two has changed (A and B),
and one unchanged (D)
b. For pattern ‘01’ (C), we cannot check how
many pixels were changed and how many
were not, because there is only one pixel,
comparison cannot occur.
c. Finally, we inverse the last bit of the stego-
image, if the number of pixels that have
changed in specific patterns are greater than
the number of pixels that are not changed..
For pattern ‘10’ two pixels has changed (A and
B), and one pixel has not (D), so we inverse the last
bit of ‘10’ pixels as follow:
Cover Image: 10001100 10101101 10101101
stego-image : 10001101 10101100 10101101
result : 10001100 10101101 10101100
A A B D
In the end, there is only one pixel on the stego-
image which is different from the original image,
which is (D). Thus, the PSNR value of the stego-
image would increase, improving the quality of the
stego-image. To recover the secret message from
the stego-image, we need to store these patterns for
which the corresponding LSB bit has been inverted.
Since we have checked all possible combinations of
the 2nd and the 3rd bit of all pixels, we may need to
store maximum of 4 patterns information in the
stego image.
So in de-steganography, the information that
leads us to the pixels patterns that has been inversed
is to firstly read from the stego-image to know
which pattern was inversed and which pattern was
not. Then classify the stego-image according to the
four patterns and next is to re-inverse the bits in
order to extract the massage bits.
According to a research that was conducted by
Hecht [8], 65% of all cones of human eyes are
sensitive to red, 33% are sensitive to green, and
only near about 2 % are sensitive to blue. Based on
this research, our proposed approach used only the
green and blue channel from RGB image in order to
apply the bit inversion method on it to improve the
security. The red colour will act as noise data when
an unauthorized user tries to retrieve the secret
message, and thus increases the complexity of
retrieving process.
6. THE PROPOSED BIT INVERSION
ALGORITHM
pic = cover image
msg = secret message
For i = 1 to n
Get char from msg
For each 2 bits
Get pixel from pic
For each colour from green and blue
Get colour value
Cover value = value
Identify the pattern of 2nd and 3rd
bits of the Cover value which are
either (00, 01, 10, or 11)
If msg bit = 1
Insert a 1 in the lest significant
bit of the pixel value
Else
Insert a 0 in the lest significant
bit of the pixel value
Replace the value in the pic
stego value = value
Identify the pattern of 2nd and
3rd bits of the stego value (00,
01, 10, or 11)
End for
End for
End for
For i = 1 to n
Compare between cover value and stego value
to count how many pixel are changed and how
many are not
If number of changed pixels in any pattern of
pic was more than pixels that not changed in
alternative pattern in the stego
Get pixel from pic
For each colour from green and blue
Get colour value
Journal of Theoretical and Applied Information Technology
20th October 2015. Vol.80. No.2
© 2005 - 2015 JATIT & LLS. All rights reserved.
ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195
346
If the last significant bit of the
value = 1
Insert 0 in the last significant
bit of pixel value
Else
Insert 1 in the last significant
bit of the pixel value
Replace the value in the pic
Store the status of pattern that
inversed his pixels as a map in
specific location
End for
End for
7. SIMULATION RESULT
Experimental results are provided in this
section to demonstrate the efficiency of this
proposed method. The current method was applied
on a variety of true RGB colour images (as shown
in figure 2) to show the effectiveness of the
proposed method.
In this paper, we use three true RGB colour
images (Lena.jpg , Baboon.jpg , Peppers.jpg) that
are similar to previously use in ([9, 10] and[11]), so
that we can compare our experimental results with
these three techniques.
Cover-Images
Lena.jpg Babbon.jpg
Peppers.jpg trees.jpg
Plane.jpg Tiffany.jpg
Fig 2: Cover images
Original/Secret Message
The following text includes 226 characters or
2881 bits. This text has been selected to test the
proposed method. “In poverty and other
misfortunes of life, true friends are a sure refuge.
The young they keep out of mischief; to the old
they are a comfort and aid in their weakness, and
those in the prime of life they incite to noble
deeds.”
Histogram Analysis
In steganography, in general, histogram analysis
is used to compare image pixels between the cover
image and the stego-image. Histograms indicate the
number of pixels that have colours in each fixed list
of colour ranges and span the image's colour space.
It contains a group of all possible colours in an
image.
Fig 3: Histogram of cover image
Fig 4: Histogram of the stego-image after standard LSB
Journal of Theoretical and Applied Information Technology
20th October 2015. Vol.80. No.2
© 2005 - 2015 JATIT & LLS. All rights reserved.
ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195
347
Fig 5: Histogram of stego-image (proposed LSB method)
Comparison is made between histograms of
cover-images and the stego-images, it could be
observed that the histograms of the stego-image of
24 bit colour image (in Figure 5) is almost similar
to the cover-image (Figure 3) and Figure 4. There is
almost insignificant change in colour intensity.
Peak Signal-to-Noise Ratio (PSNR):
In In steganography technique, PSNR is the
standard measurement uses to test the quality of the
stego images. PSNR defines ratio lies between the
maximum possible power of a signal and the power
of corrupting noise that affects the fidelity of its
representation [8]. In this case, the signal is the
cover-image, and the noise is the error that is
introduced by the bits of the secret image. Higher
value of PSNR means higher quality of the stego-
image. To illustrate that, consider a cover image C
of size M × M and the stego-image S of size N × N.
Then, each cover-image C and stego-image S will
have pixel values of (x, y) from 0 to M-1, and 0 to
N-1 respectively [12]. The mean square error
(MSE) which measures the average of the squares
of the errors is calculated first. Then, the result is
used to calculate the PSNR.
Where
Here,
α
i,j is the pixel of the cover image where
the coordinate is (i, j), and
β
i,j is the pixel of the
stego-image where the coordinate is (i, j). M and N
represent the size of the image. A large PSNR value
points out that the variation between cover image
and stego image is significantly considered
unnoticed to the human being eye. Table 1 shows
the PSNR values for all cover images, while Table
2 shows the comparison of the PSNR values in (dB)
from the literatures.
Table 1: PSNR of Different cover images
Cover Image PSNR
Lena.jpg 72.4829
Baboon.jpg 60.5079
Peppers.jpg 69.7691
tree . jpg 71.116
Plane. Jpg 69.6063
tifanny. Jpg 70.0804
Table 2: Comparison of the PSNR values in (dB) from
the literatures
Cover
Image
Improved
Novel
Steganogr
aphic
Techniqu
e For
RGB [9]
In Highly
Randomiz
ed Image
using
Secret
Key[10]
Secret
Key
Method
[11]
Proposed
method
Lena 50.99 49.2668 53.7618 72.4829
Baboon
50.98 48.8766 53.7558 60.5079
Peppers
50.06 47.9887 53.7869 69.7691
8. DISCUSSION AND CONCLUSION
From the experimental results, high values of
PSNR have been obtained and compared with
previous findings, which indicates that the proposed
method is very efficient in hiding data, which
means that this technique is able to keep changes to
the stego-image to minimum. Therefore, we can
conclude that this technique have good quality of
invisibility and undetectability. In terms of security
property, two additional levels of security were
added to the standard LSB steganography. The first
level is that this technique only uses the green and
blue colours, instead of three colours red, green,
and blue, in the standard LSB. The advantage of
this is that the red colour will act as noise data, to
the any possible attacker with the intention to
extract the message. As a result, this will make the
extraction process more difficult. The second level
exploits the new bit inversion technique, which
reverses the bits of the stego image pixels after the
standard LSB is applied. In the proposed technique,
we have introduced a new bit inversion technique
of steganography.
We would like to emphasis that the goal of the
technique is not just to increase the capacity of the
message but we also try to make it difficult to any
unauthorized party to determine the presence of a
secret message. In the standard LSB technique, the
secret message bit will simply be replaced with the
LSB bit of the image. However, in our algorithm, in
Journal of Theoretical and Applied Information Technology
20th October 2015. Vol.80. No.2
© 2005 - 2015 JATIT & LLS. All rights reserved.
ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195
348
addition to replacing the message bit, it also inverts
the bits in order to increase both security level of
LSB. Therefore, quality of stego-image is
increased; since it manages to inverse the bits
minimally, and this this proposed method improved
the weaknesses of using the standard LSB
Steganography.
REFRENCES:
[1] Vijay Kumar Sharma and Vishal Shrivastava,
A Steganography algorithm for Hiding Data in
Image by Improved LSB Substitution by
Minimize Detection”, Journal of Theoretical
and Applied Information Technology, 15th
February 2012, Vol36 No.1
[2] Moerland, T., “Steganography and
Steganalysis”, Leiden Institute of Advanced
Computing Science, www.liacs.nl/home/
tmoerl/privtech.pdf
[3]Amin, M.M., et al. Information hiding using
steganography. in Telecommunication
Technology, 2003. NCTT 2003 Proceedings.
4th National Conference on. 2003. IEEE
[4] Wang, H. and S. Wang, Cyber warfare:
steganography vs. steganalysis.
Communications of the ACM, 2004. 47(10): p.
76-82.
[5] c. Kessler. (2001). Steganography: Hiding Data
within Data. An edited version of this paper with
the title "Hiding Data in Data". Windows & .NET
Magazine.
http://www.garykessler.net/library/steganograp
hy.html
[6] Chan, C.-K. and L.-M. Cheng, Hiding data in
images by simple LSB substitution. Pattern
recognition, 2004. 37(3): p. 469-474.
[7] Neil F. Johnson, S.C. Katzenbeisser,”A survey
of steganography technique”.
[8] Rawat, D. and V. Bhandari, A Steganography
Technique for Hiding Image in an Image using
LSB Method for 24 Bit Color Image.
International Journal of Computer Applications
(0975–8887), 2013. 64(20).
[9] Karim, S.M., M.S. Rahman, and M.I. Hossain.
A new approach for LSB based image
steganography using secret key. in Computer
and Information Technology (ICCIT), 2011
14th International Conference on. 2011. IEEE.
[10] Dagar, S. Highly randomized image
steganography using secret keys. in Recent
Advances and Innovations in Engineering
(ICRAIE), 2014. 2014. IEEE.
[11] Maurya, S. and V. Shrivastava, An Improved
Novel Steganographic Technique For RGB
And YCbCr Colorspace. 2014.
[12] wang, c.-m., et al., a high quality
steganographic method with pixel-value
differencing and modulus function. journal of
systems and software, 2008. 81(1): p.150-158.
... In this method, the number of pixels that is modified is less than that in the standard LSB method. This improves the quality of stego image and then enhance the PSNR values [15]. ...
... Mohammed and Rossilawati [15] introduced a new bit inversion approach of steganography improves the color stego image quality. They proposed two additional levels of security to the standard LSB steganography. ...
Article
Steganography is a data-hiding scientific branch that aims to hide secret data in an image, video, or audio. Image steganography methods try to embed a large amount of data into images with high imperceptibility. However, increasing the number of embedded data in the image decreases its quality. Therefore, in this paper, a new method based on Least Significant Bit (LSB) using Hough Transform is proposed to improve the stego image quality with increasing the amount of embedded data. The LSB is the common embedding steganography method due to its simplicity of implementation and low complexity. The proposed method inverts the LSBs of image pixels to enhance the quality of stego image. First, improved edge detection filter is used to detect edges areas. Then, we invert LSBs for the pixel in edge area pixels. Finally, the LSBs smooth area pixels of the cover image are inverted. The performance of the presented method is evaluated for the stego image quality and the amount of embedded data. The results show that the new method has better performance in comparison with the current methods in terms of Peak Signal-to-Noise Ratio (PSNR) and capacity.
... Steganography is the science of hiding relatively smaller information in a larger multimedia cover. Cover media could take the form of text [3], image [4], audio [5], or video [6]. Image steganography is the process of concealing secret data within an image that appears normal to the human eye. ...
... In [42], standard deviation is utilized to select a richlytextured block of pixels to hold the secret message. Next, four Most Significant Bits (MSBs) of three diagonal pixels in the treated block are selected using SKTM to generate three correcting bits [Hamming code H (7,4)]. Two of these bits are XORed with the two secret bits and embedded in the neighboring pixels. In [43], the embedding position is located by a key generated utilizing a chaotic LM. ...
Article
Full-text available
Given the increased popularity of the internet, the exchange of sensitive information leads to concerns about privacy and security. Techniques such as steganography and cryptography have been employed to protect sensitive information. Steganography is one of the promising tools for securely exchanging sensitive information through an unsecured medium. It is a powerful tool for protecting a user's data, wherein the user can hide messages inside other media, such as images, videos, and audios (cover media). Image steganography is the science of concealing secret information inside an image using various techniques. The nature of the embedding process makes the hidden information undetectable to human eyes. The challenges faced by image steganography techniques include achieving high embedding capacity, good imperceptibility, and high security. These criteria are interrelated since enhancing one factor undermines one or more others. This paper provides an overview of existing research related to various techniques and security in image steganography. First, basic information in this domain is presented. Next, various kinds of security techniques used in steganography are explained, such as randomization, encryption, and region-based techniques. This paper covers research published from 2017 to 2022. This review is not exhaustive and aims to explore state-of-the-art techniques applied to enhance security, crucial issues in the domain, and future directions to assist new and current researchers.
... Steganography name contains two ancient Greek words: "Stegano" and "Graphy", and both relate to "Cover Writing". Steganography has been in use for decades [1]. As compared to other media like images, sounds, and video, text contains fewer redundant bits [2]. ...
Article
Full-text available
The transmission of confidential data using cover media is called steganography. The three requirements of any effective steganography system are high embedding capacity, security, and imperceptibility. The text file's structure, which makes syntax and grammar more visually obvious than in other media, contributes to its poor imperceptibility. Text steganography is regarded as the most challenging carrier to hide secret data because of its insufficient redundant data compared to other digital objects. Unicode characters, especially non-printing or invisible, are employed for hiding data by mapping a specific amount of secret data bits in each character and inserting the character into cover text spaces. These characters are known with limited spaces to embed secret data. Current studies that used Unicode characters in text steganography focused on increasing the data hiding capacity with insufficient redundant data in a text file. A sequential embedding pattern is often selected and included in all available positions in the cover text. This embedding pattern negatively affects the text steganography system's imperceptibility and security. Thus, this study attempts to solve these limitations using the Part-of-speech (POS) tagging technique combined with the randomization concept in data hiding. Combining these two techniques allows inserting the Unicode characters in randomized patterns with specific positions in the cover text to increase data hiding capacity with minimum effects on imperceptibility and security. Format-preserving encryption (FPE) is also used to encrypt a secret message without changing its size before the embedding processes. By comparing the proposed technique to already existing ones, the results demonstrate that it fulfils the cover file's capacity, imperceptibility, and security requirements.
... Various information security approaches have been suggested such as cryptography [1] and steganography [2] for secure transmission of data, digital watermarks [3][4][5] and fingerprints [6] for copyright marking and authentication. While cryptography seeks to change the information to be unreadable by a third party, steganography serves to hide the information within various mediums, typically texts [7,8], images [9][10][11], audio [12,13], and videos [14,15], commonly referred to as cover mediums. All the mentioned cover mediums are struggling to keep up with the growing volume of data while having to meet the required security criteria. ...
Article
Full-text available
Genome steganography has emerged as a promising field for transmitting large amounts of data over an untrusted channel in the last two decades. DNA has many advantages over other multimedia cover mediums. Substitution is the most common approach to developing a DNA-based steganography algorithm. Components of the secret message are converted to DNA letters, which replace nucleotides in the cover sequence. The conversion is conducted through predetermined tables like binary coding rules and lookup/dictionary tables. These tables are static, limited to specific alphanumeric characters, and may compromise the hidden message if discovered by intruders. Most previously proposed algorithms adopt a simple sequential and ordered hiding pattern. This leads to poor utilization of the available hiding spots and creates a region of interest for attackers to apply steganalysis. In this paper, a novel DNA-based algorithm is proposed. Using two DNA sequences, primary and secondary, is the basis for this algorithm. Both sequences are segmented, where the primary sequence segments are for hiding the data, and the secondary sequence segments are for conveying the required information to find and extract the hidden data. Three enhanced tables are proposed: a modified ASCII table, a 4-bit binary coding rule table, and a two-tier lookup encoding table to convert the message to DNA form. The segmentation ensures that the hiding spots are randomly scattered across the primary cover DNA sequence, addressing the region of interest issue. The data is hidden in the cover using the least significant base substitutions. The result is an all-rounded algorithm that fulfills the desired performance measurements such as zero payloads, blindness, preserving functionality, high hiding capacity, low modification rate, and low cracking probability.
... The spatial domain-based techniques are widely used among which is the least significant bit (LSB)-based techniques. In addition, other techniques such as Pixel Value Differencing (PVD), Pixel Indicator Techniques (PIT), Exploiting Modification Direction (EMD) techniques, and Pixel Mapping Method (PMM) are also employed [7]. ...
Conference Paper
Full-text available
The rapid increase in Internet speed led to people exchanging a huge amount of information every moment, including sensitive and private information. Hence, confidentiality and privacy are a big concern. Image steganography is a tool used to ensure that sensitive information is securely shared by concealing it in a cover image. Many techniques have been proposed to protect the information, such as the Least Significant Bit (LSB), Pixel Value Differencing (PVD), Pixel Indicator Techniques (PIT), etc. This paper presents a new PIT -based technique for RGB images to enhance the requirement ofimperceptibility and security. This technique uses the LSB of the green channel as an indicator to hide and encode the secret information in the red and blue channels. The technique is developed in three versions wherein two LSBs, two to four LSBs, or four LSBs of the red and blue channels are utilised to encode up to six bits of the secret information. The experimental results of the proposed method are obtained using MATLAB 2022a. The experimental results showed promising results against standard images with higher Peak Signal-to-Noise Ratio (PSNR) values and Mean Square Error (MSE).
... Due to the scarcity of redundant bits, any little adjustments made to the cover text will be noticeable. Any steganography system must have three main requirements: capacity, security, and imperceptibility [6] [7]. Steganography highly values the imperceptibility of hiding sensitive data in other media. ...
Article
Full-text available
Steganography is the process of hiding secret data inside other media or cover media. Balancing the requirements for capacity, security, and imperceptibility is the main challenge for any successful steganography system. In text steganography, the data hiding capacity is limited because of the lack of redundant data compared to other digital media, such as images, video, or audio. Other challenges in text steganography are imperceptibility and security. Poor imperceptibility results from the structure of the text file, which is more visually apparent in terms of syntax and grammar than in other media. Low level of security results from the sequential selection of positions for embedding secret data due to insufficient redundant data in a text file. Therefore, an attacker or a third party would notice slight changes in the text file. This paper proposes a new text steganography method that combines cryptography and compression techniques to deal with these issues. This technique is used to conceal secret data to achieve high data hiding capacity in the cover text while maintaining security and imperceptibility. Multilayer encoding and Format-Preserving Encryption (FPE) with Huffman Coding are applied to secret data before embedding. Invisible Unicode characters are employed to embed secret data into English text files to generate stego files. Results show that the proposed method satisfies capacity and imperceptibility in the cover file by comparing it with previously developed methods.
Article
Full-text available
This study is aimed at developing an improved LSB technique by overcoming the standard LSB technique's high imperceptibility and transparency, especially in JPEG and BMP formats which are the characteristics of a truly secure and reliable security technique for remote data transmission. The creation of a modified LSB (mLSB+DWT) algorithm combined with RSA would enhance secured data transmission and image security. The standard LSB was modified to create a balance between the algorithm's exploration and exploitation stages so as to improve quantity solution in detecting high energy coefficient (optimal wavelet coefficient) of DWT and to resolve conflicting requirements of different parameters and properties of digital images. The techniques achieved improved Average difference, Mean Square Error (MSE), Root Mean Square Error (RMSE), Peak Signal to Noise Ratio (PSNR), Image Fidelity and Normalized Cross Correlation (NCC), indicating a higher quality measurement between the original and compressed images using different formats
Article
Kriptografi dan steganografi adalah teknik yang digunakan untuk mengamankan data untuk meminimalkan pencurian data dan akses oleh orang yang tidak berwenang. Kombinasi Rivest Cipher 4 - Least Significant Bit diusulkan dalam penelitian ini untuk memberikan perlindungan bagi pesan dan berbagai format file yang tertanam dalam gambar digital. Pesan rahasia dienkripsi dengan metode RC4 sebelum dimasukkan kedalam gambar menggunakan LSB. Studi ini juga menganalisis kinerja kombinasi algoritma LSB – RC4 pada berbagai file dan ukuran gambar sampul. Gambar sampul menggunakan gambar dengan saluran RGB. Untuk pengukuran kinerja imperceptibilitas digunakan Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), dan analisis histogram.Nilai rata – rata PSNR yang didapatkan pada penelitian ini lebih dari 30 dB, ini membuktikan bahwa kualitas gambar stego sangat baik dan kualitas gambar stego yang baik memiliki nilai PSNR minimal 30 dB. Nilai PSNR yang didapatkan secara keseluruhan lebih dari 30 dB dengan nilai terendahnya 45,15 dB dengan ukuran citra 128x128 pixel.
Conference Paper
Full-text available
This paper introduces a best approach for Least Significant Bit (LSB) based on image steganography that enhances the existing LSB substitution techniques to improve the security level of hidden information. It is a new approach to substitute LSB of RGB true color image. The new security conception hides secret information within the LSB of image where a secret key encrypts the hidden information to protect it from unauthorized users. In general, in LSB methods, hidden information is stored into a specific position of LSB of image. For this reason, knowing the retrieval methods, anyone can extract the hidden information. In our paper, hidden information is stored into different position of LSB of image depending on the secret key. As a result, it is difficult to extract the hidden information knowing the retrieval methods. We have used the Peak Signal-to-Noise Ratio (PSNR) to measure the quality of the stego images. The value of PSNR gives better result because our proposed method changes very small number of bits of the image. The obtained results show that the proposed method results in LSB based image steganography using secret key which provides good security issue and PSNR value than general LSB based image steganography methods.
Article
Full-text available
For every clever method and tool being developed to hide information in multimedia data, an equal number of clever methods and tools are being developed to detect and reveal its secrets.
Conference Paper
Full-text available
Due to advances in ICT, most information is kept electronically. Consequently, the security of information has become a fundamental issue. Besides cryptography, steganography can be employed to secure information. Steganography is a technique of hiding information in digital media. In contrast to cryptography, the message or encrypted message is embedded in a digital host before passing it through the network, thus the existence of the message is unknown. Besides hiding data for confidentiality, this approach of information hiding can be extended to copyright protection for digital media: audio, video, and images.
Conference Paper
Steganography is an art and specially a science of hiding secret information inside a carrier like image, audio, video. This paper proposes a new approach of image steganography which uses two secret keys to randomize the bit hiding process. Use of two secret keys enhances the security of secret information. This approach uses red, green and blue values of a pixel and performs some calculation. Based on this calculation, secret information bits will be placed at the random position of the pixels. This approach maintains high data hiding capacity like LSB substitution but maintains a much better security level, which is not present in LSB substitution as LSB substitution technique is predictable. As the hidden information is highly randomized, so it is difficult for attacker to retrieve the secret information from stego image. I used PSNR value to determine the quality of stego image and also compare it with other efficient image steganography techniques. The obtained result showed that this algorithm is highly efficient as compared to many other techniques.
Article
Steganography is a branch of information hiding. It allows the people to communicate secretly. As increasingly more material becomes available electronically, the influence of steganography on our lives will continue to grow. Many confidential information were leaked to a rival firm using steganographic tools that hid the information in music and picture files. The application of steganography is an important motivation for feature selection. In recent years, many successful steganography methods have been proposed. They challenge by steganalysis. Steganalysis (type of attack on steganography Algorithm)Algorithm which detects the stego-message by the statistic analysis of pixel values[1][2], To ensure the security against the steganalysis attack, a new steganographic algorithm for 8bit(grayscale) or 24 bit (colour image) is presented in this paper, based on Logical operation. Algorithm embedded MSB of secret image in to LSB of cover image. in this n LSB of cover image,from a byte is replaced by n MSB of secret image. the image quality of the stego-image can be greatly improved with low extra computational complexity. The worst case mean-square-error between the stego-image and the cover-image is derived. Experimental results show that the stego-image is visually indistinguishable from the original cover-image when n<=4, because of better PSNR which is achieved by this technique. It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is always to cover up the very existence of the embedded data.
Article
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications. The proposed work improves the imperceptibility of steganographic approach and developed new algorithm using modifying approach. A comparative analysis of the proposed algorithm with the existing techniques using the statistical hypothesis testing framework is introduced in the proposed work and also we have evaluated the performance on comprehensive set of color images.
Article
In this paper, a data hiding scheme by simple LSB substitution is proposed. By applying an optimal pixel adjustment process to the stego-image obtained by the simple LSB substitution method, the image quality of the stego-image can be greatly improved with low extra computational complexity. The worst case mean-square-error between the stego-image and the cover-image is derived. Experimental results show that the stego-image is visually indistinguishable from the original cover-image. The obtained results also show a significant improvement with respect to a previous work.
Article
In this paper, we shall propose a new image steganographic technique capable of producing a secret-embedded image that is totally indistinguishable from the original image by the human eye. In addition, our new method avoids the falling-off-boundary problem by using pixel-value differencing and the modulus function. First, we derive a difference value from two consecutive pixels by utilizing the pixel-value differencing technique (PVD). The hiding capacity of the two consecutive pixels depends on the difference value. In other words, the smoother area is, the less secret data can be hidden; on the contrary, the more edges an area has, the more secret data can be embedded. This way, the stego-image quality degradation is more imperceptible to the human eye. Second, the remainder of the two consecutive pixels can be computed by using the modulus operation, and then secret data can be embedded into the two pixels by modifying their remainder. In our scheme, there is an optimal approach to alter the remainder so as to greatly reduce the image distortion caused by the hiding of the secret data. The values of the two consecutive pixels are scarcely changed after the embedding of the secret message by the proposed optimal alteration algorithm. Experimental results have also demonstrated that the proposed scheme is secure against the RS detection attack.