scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Dual image based LSB steganography

TL;DR: A new steganographic model using dual image has been proposed to increase the obscurity of the secret as well as to make it more secure by using different dictionary word indexing scheme every time based on a random secret key that is appended in the embed key.
Abstract: A new steganographic model using dual image has been proposed to increase the obscurity of the secret as well as to make it more secure. It uses two different images namely reference image and cover image along with a secret embed key (stego key). Reference image is divided into blocks with assigned block-codes. Total number of blocks and other embedding parameters (block traversing direction, starting block etc.) are stored in the embed key. Secret message converted to binary and bit pairs are made. Bit pairs of secret message are encoded using the bit pairs of different blocks of reference image and sometimes updating a few LSB bits in the reference image. As an optional capacity enhancement module for text only secret messages dictionary word indexing based encoding is applied. Finally encoded bit stream is embedded into the cover image using any standard LSB technique with its own merits and demerits. LSB changes in the reference image are almost negligible. Embedding key is encrypted using public key of the receiver hence even if someone gets the encoded message it is not possible to get the secret message. As this model can use any existing LSB replacement scheme to embed encoded message into the cover image the state of the art security and other quality features are by default available to it. This is made more secure by using different dictionary word indexing scheme every time based on a random secret key that is appended in the embed key.
Citations
More filters
Journal ArticleDOI
TL;DR: A new steganographic scheme using a reference image along with the cover image has been proposed that enhances the robustness and security by increasing the obscurity of the hidden message and employs an additional dictionary-based encoding module to increase the hiding capacity as well as security.
Abstract: In the modern digital era, the privacy of personal communication is a serious concern to all netizens. A better way to preserve privacy could be to hide the secret message inside some innocent looking digital object such as image, audio, video, etc., which is known as steganography. A new steganographic scheme using a reference image along with the cover image has been proposed in this article. It enhances the robustness and security by increasing the obscurity of the hidden message. It also employs an additional dictionary-based encoding module to increase the hiding capacity as well as security. Experiments show that bit changes in the reference image are very few and undetectable to human perception, it also evades common statistical tests. Evaluation of standard quality parameters such as MSE, PSNR, UIQI, SSIM along with chi-squared statistics based embedding probability testing has been performed. When dictionary-based encoding is applied it further improves the quality parameters.

2 citations

Journal ArticleDOI
TL;DR: The discussion comprises the spatial, transform, and hybrid image watermarking methods as well as its comparison with the different schemes, which will be beneficial to the academicians for gaining deep knowledge about image water marking schemes.
Abstract: In this digital era, the vast development of multimedia environments and information technology creates a need for protecting digital content from unauthorized access. Digital watermarking is a universally accepted technique for tackling the issues in the field of multimedia security and information rights management. Several appropriate image watermarking processes have been designed to secure the digital content. An efficient watermarking technique should maintain the tradeoff among imperceptibility, robustness, embedding capacity, and security. Primarily, this paper presents the classifications and applications of digital image watermarking techniques. The discussion comprises the spatial, transform, and hybrid image watermarking methods as well as its comparison with the different schemes. The contribution of this article will be beneficial to the academicians for gaining deep knowledge about image watermarking schemes.

1 citations

TL;DR: The results showed that the proposed system provides the better results of accuracy to detect the DDos attack in SDN network as 99.90% accuracy of Decision Tree (DT) algorithm.
Abstract: Received May 28, 2022 Revised Jun 10, 2022 Accepted Jul 24, 2022 The term software defined networking (SDN) is a network model that contributes to redefining the network characteristics by making the components of this network programmable, monitoring the network faster and larger, operating with the networks from a central location, as well as the possibility of detecting fraudulent traffic and detecting special malfunctions in a simple and effective way. In addition, it is the land of many security threats that lead to the complete suspension of this network. To mitigate this attack this paper based on the use of machine learning techniques contribute to the rapid detection of these attacks and methods were evaluated detecting DDoS attacks and choosing the optimum accuracy for classifying these types within the SDN, the results showed that the proposed system provides the better results of accuracy to detect the DDos attack in SDN network as 99.90% accuracy of Decision Tree (DT) algorithm.
Book ChapterDOI
01 Jan 2020
TL;DR: A comparative analysis is made to evaluate the performance of the LSB replacement algorithm for different number of LSBs by computing capacity, mean square error (MSE), peak signal-to-noise ratio (PSNR) and robustness.
Abstract: Steganography is an approach of communication where sender and receiver can expect the hidden message. Major goal of steganography is to hide data and should not be susceptible, with less MSE, High PSNR and also with maximum capacity to hold the secret data. In this paper, a comparative analysis is made to evaluate the performance of the LSB replacement algorithm for different number of LSBs. The performance of the LSB replacement steganographic method has been evaluated by computing capacity, mean square error (MSE), peak signal-to-noise ratio (PSNR) and robustness.
Journal ArticleDOI
TL;DR: An overview of existing research related to various techniques and security in image steganography can be found in this paper , where various kinds of security techniques are explained, such as randomization, encryption, and region-based techniques.
Abstract: Given the increased popularity of the internet, the exchange of sensitive information leads to concerns about privacy and security. Techniques such as steganography and cryptography have been employed to protect sensitive information. Steganography is one of the promising tools for securely exchanging sensitive information through an unsecured medium. It is a powerful tool for protecting a user’s data, wherein the user can hide messages inside other media, such as images, videos, and audios (cover media). Image steganography is the science of concealing secret information inside an image using various techniques. The nature of the embedding process makes the hidden information undetectable to human eyes. The challenges faced by image steganography techniques include achieving high embedding capacity, good imperceptibility, and high security. These criteria are inter-related since enhancing one factor undermines one or more others. This paper provides an overview of existing research related to various techniques and security in image steganography. First, basic information in this domain is presented. Next, various kinds of security techniques used in steganography are explained, such as randomization, encryption, and region-based techniques. This paper covers research published from 2017 to 2022. This review is not exhaustive and aims to explore state-of-the-art techniques applied to enhance security, crucial issues in the domain, and future directions to assist new and current researchers. Keywords—Image steganography; data hiding; steganographic security; randomization; encryption
References
More filters
Journal ArticleDOI
TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.

1,572 citations


"Dual image based LSB steganography" refers background in this paper

  • ...tries to find or brute force the key to unscramble the secret) and eventually someday may get successful but in steganography no one other than the intended party is aware of the secret message being transmitted so it does not attract attackers [2]....

    [...]

Journal ArticleDOI
TL;DR: A new and efficient steganographic method for embedding secret messages into a gray-valued cover image that provides an easy way to produce a more imperceptible result than those yielded by simple least-significant-bit replacement methods.

1,078 citations


"Dual image based LSB steganography" refers methods in this paper

  • ...A large number of different LSB based steganographic methods with variations in hidden data embedding has been proposed and evaluated [11-13, 5-6]....

    [...]

  • ...In pixel value differencing method (PVD) [6] cover image is partitioned into 2 pixel width non-overlapping blocks and a difference value is calculated....

    [...]

Book ChapterDOI
14 Apr 1998
TL;DR: An information-theoretic model for steganography with passive adversaries is proposed and several secure steganographic schemes are presented; one of them is a universal information hiding scheme based on universal data compression techniques that requires no knowledge of the covertext statistics.
Abstract: An information-theoretic model for steganography with passive adversaries is proposed. The adversary’s task of distinguishing between an innocent cover message C and a modified message S containing a secret part is interpreted as a hypothesis testing problem. The security of a steganographic system is quantified in terms of the relative entropy (or discrimination) between P C and P S. Several secure steganographic schemes are presented in this model; one of them is a universal information hiding scheme based on universal data compression techniques that requires no knowledge of the covertext statistics.

882 citations


"Dual image based LSB steganography" refers background in this paper

  • ...Bandwidth to send the cover image increases by almost 8 times of the hidden message with 1 bit LSB [10]....

    [...]

Journal ArticleDOI
TL;DR: A novel method to embed important data in the host image so that the interceptors will not notice about the existence of the data is developed and an improved hiding technique is developed to obtain a high-quality embedding result.

703 citations


"Dual image based LSB steganography" refers methods in this paper

  • ...A large number of different LSB based steganographic methods with variations in hidden data embedding has been proposed and evaluated [11-13, 5-6]....

    [...]

  • ...Long back in 2001 researchers had used genetic algorithm to find heuristic solution to hide secret message optimally in the right most k LSB bits of cover image without doing huge computation for large k value [11]....

    [...]

Proceedings Article
01 Jan 2005
TL;DR: This paper intends to give an overview of image steganography, its uses and techniques, and attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which Steganographic techniques are more suitable for which applications.
Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.

538 citations


"Dual image based LSB steganography" refers background in this paper

  • ...Ontologically steganography is the art of hidden writing as in Greek “Steganos” implies hidden or covered and “Graphien” means writing [1]....

    [...]