scispace - formally typeset
Search or ask a question
DOI

Enhancing the confidentiality of text embedding using image steganography in spatial domain

01 Nov 2021-Vol. 2387, Iss: 1, pp 140013
TL;DR: In this paper, the authors proposed a system that combines steganography and encryption for enhancing the confidentiality of the intended messages by using onetime pad algorithm in spatial domain, where the encrypted text is hidden the Least Significant Bit (LSB) of the different components of the color image in such a way that as to minimize the perceived loss of quality of the cover image.
Abstract: Rapid growth in technological development, the use of the internet has grown many folds. Along with it, the sharing of privacy information in networks creates ownership issues. In order to create a high level of security for sharing private information, the concept of steganography is introduced along with encryption based invisible watermarking techniques. The proposed system hides the encrypted private messages by using onetime pad which follows the concept LSB algorithm in spatial domain. The system combines steganography and encryption for enhancing the confidentiality of the intended messages. At first, the private information of the user is encrypted by using the onetime pad algorithm. Then the encrypted text is hidden the Least Significant Bit (LSB) of the different components of the color image in such a way that as to minimize the perceived loss of quality of the cover image. The beneficiary of the message is able to retrieve the hidden back and from the stego-image and extract the cipher text and find the plaintext from using the onetime pad algorithm. The proposed algorithm will be tested and analysed against three different hiding positions of color image components.
References
More filters
Journal ArticleDOI
TL;DR: An adaptive LSB based steganography is proposed for embedding data based on the data available in MSB’s (Most Significant Bits) of red, green, and blue components of randomly selected pixels across smooth areas to provide two-tier security.
Abstract: —This research paper proposes a secured, robust approach of information security using steganography. It presents two component based LSB (Least Significant Bit) steganography methods for embedding secret data in the least significant bits of blue components and partial green components of random pixel locations in the edges of images. An adaptive LSB based steganography is proposed for embedding data based on the data available in MSB’s (Most Significant Bits) of red, green, and blue components of randomly selected pixels across smooth areas. A hybrid feature detection filter is also proposed that performs better to predict edge areas even in noisy conditions. AES (Advanced Encryption Standard) and random pixel embedding is incorporated to provide two-tier security. The experimental results of the proposed approach are better in terms of PSNR and capacity. The comparison analysis of output results with other existing techniques is giving the proposed approach an edge over others. It has been thoroughly tested for various steganalysis attacks like visual analysis, histogram analysis, chi-square, and RS analysis and could sustain all these attacks very well.

40 citations

Proceedings ArticleDOI
30 Jun 2011
TL;DR: This work presents a simple but effective steganographic schema that can be used to deploy robust secret communication through e-mail that is able to bypass the most sophisticated firewalls and traffic analyzers and causes any perceivable performance degradation or data loss to the end-users.
Abstract: Current Internet e-mail facilities are built on the foundation of standard rules and protocols, which usually allow a considerable amount of ``freedom'' to their designers. Each of these standards has been defined based on a number of vendor specific implementations, in order to provide common inter-working procedures for cross-vendor communication. Thus, a lot of optional and redundant information is being exchanged during e-mail sessions, which is available to implement versatile covert channel mechanisms. The work exploits this possibility by presenting a simple but effective steganographic schema that can be used to deploy robust secret communication through e-mail. This schema can offer unidirectional asynchronous one-to-one or one-to-many covert channel facilities that are able to bypass the most sophisticated firewalls and traffic analyzers. Its implementation neither affects the involved transport protocols nor causes any perceivable performance degradation or data loss to the end-users.

20 citations

Proceedings Article
01 Jul 2003
TL;DR: The Secure Information Hiding System (SIHS) is proposed that is based on Least Significant Bit (LSB) technique in hiding messages in an image and enhanced the LSB technique by randomly dispersing the bits of the message in the image and thus making it harder for unauthorized people to extract the original message.
Abstract: Due to advances in ICT, most of information are kept electronically. Consequently, the security of information has become a fundamental issue. Besides cryptography, steganography can be employed to secure information. Steganography is a technique of hiding information in digital media, whereby the message is embedded in a digital host before passing it through the network. Hence, the existence of the message is unknown. Besides hiding data for confidentiality, this approach of information hiding can be extended to copyright protection for digital media: audio, video, and images. In this paper, we proposed the Secure Information Hiding System (SIHS) that is based on Least Significant Bit (LSB) technique in hiding messages in an image. The system enhanced the LSB technique by randomly dispersing the bits of the message in the image and thus making it harder for unauthorized people to extract the original message. Discrete logarithm calculation technique is used for determining the location of the image pixels to embed the message. The proposed algorithm provides a stego-key that will be used during the embedding and extracting of the message.

13 citations

Proceedings ArticleDOI
01 Dec 2011
TL;DR: An algorithm based upon Least Significant Bit (LSB) algorithm called Distributed LSB is proposed which has better performance both in capacity and the amount of degradation which takes place in the cover image during secret data hiding.
Abstract: In this paper we propose an algorithm based upon Least Significant Bit (LSB) algorithm called Distributed LSB. This algorithm has better performance both in capacity and the amount of degradation which takes place in the cover image during secret data hiding. The embedding method is distributed amongst pixel based upon their intensity levels and not sequential as in case of the conventional LSB algorithm. Both algorithms are tested on various intensity images and results are presented in the form of absolute entropy curves. Obtain results show that Distributed LSB has better hiding capacity than conventional LSB technique.

9 citations

Posted Content
TL;DR: This work has proposed a novel methodology for concealing a voluminous data with high levels of security wall by using movie clip as a carrier file.
Abstract: Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the internet. One of the key methods for establishing hidden communication is steganography. Modern day steganography mainly deals with hiding information within files like image, text, html, binary files etc. These file contains small irrelevant information that can be substituted for small secret data. To store a high capacity secret data these carrier files are not very supportive. To overcome the problem of storing the high capacity secret data with the utmost security fence, we have proposed a novel methodology for concealing a voluminous data with high levels of security wall by using movie clip as a carrier file.

6 citations