scispace - formally typeset
Search or ask a question
Book ChapterDOI

Image Steganography: An Inevitable Need for Data Security

01 Jan 2021-pp 409-417
TL;DR: In this paper, an image steganography methodology is performed using MATLAB/Simulink and a brief analysis of various algorithms is done and a histogram is also plotted.
Abstract: With the advent of growing terrorism in the world and the availability of the internet, data integrity is being endangered. Hence ensuring the security of the messages is paramount. Steganography is used—the process of hiding information in image, video, etc. Steganography is not any novel technique, it had been used too earlier where they use to shave the head and embed the message on to it and then wait for the hair to grow in ancient Greece; it was also used in war times. The methodology carried out here is of least significant bit technique and random pixel technique. A brief analysis of various algorithms is done and a histogram is also plotted. The image steganography methodology is performed using MATLAB/Simulink. It is also vindicated as to where to hide the message in the image so that, it is barely noticed by any observer, keeping in view the quality, size, and resolution of the image.
Citations
More filters
Journal ArticleDOI
TL;DR: In this article , the authors presented a new method to hide the data into an image using RSA cryptosystem, which can be considered as a hybrid of steganography techniques and the public-key cryptography system and it can be used effectively for this purpose.
Abstract: Combine steganography techniques and the public key cryptosystem is new line to protect the transferring information. This paper presents a new method to hide the data into an image using RSA cryptosystem. Proposed algorithm is clarified in detail through the overall scenario and through concrete examples. The experiments on the proposed algorithm demon strated that it is a simple and efficient technique with a high level of security for transferring information. Accordingly, this proposed algorithm can be considered as a hybrid of steganography techniques and the public key cryptosystem and it can be used effectively for this purpose.
References
More filters
Journal ArticleDOI
TL;DR: This work proposes a data securing technique that is used for hiding multiple color images into a single color image using the Discrete Wavelet Transform and has a less perceptible changes compared to the original image with high overall security.

71 citations

01 Jan 2012
TL;DR: This paper introduces the concept of steganography using a new Algorithm “Enhanced LSB Algorithm”, which has negligent distortion as compared to the Least Significant Bit Algorithm.
Abstract: The rapid development of data transfer through internet has made it easier to send the data accurate and faster to the destination, but in order to transfer the data securely to the destination without any modifications, there are many approaches like steganography. This paper introduces the concept of steganography using a new Algorithm “Enhanced LSB Algorithm”, which has negligent distortion as compared to the Least Significant Bit Algorithm.

69 citations

Journal ArticleDOI
TL;DR: The LSB++ method is improved by proposing a technique to distinguish sensitive pixels and protect them from extra bit embedding, which causes lower distortion in the co-occurrence matrices and is extended to preserve the DCT coefficients histogram of jpeg images.

69 citations

Journal ArticleDOI
TL;DR: Experimental investigations reveal that the proposed steganographic algorithm is capable of providing high quality of stego-images for a fairly high pay load and a comparison of the proposed technique with some state of art schemes substantiates the above arguments.
Abstract: The multimedia security is becoming more and more important as the data being exchanged on the Internet is increasing exponentially. Though cryptography is one of the methods which is used to secure the data during transit, but the camouflaged appearance of the scrambled data alerts the adversary about some critical information being shared. In such a scenario, steganography has been used as an alternate solution to secure the secret information. In this paper a color image steganographic algorithm based on hybrid edge detection is proposed. The color image is partitioned into constituent Red (R), Green (G) and Blue (B) planes. Hybrid edge detection is used for finding the edge and non-edge pixels of Green and Blue planes of cover image. The Green and Blue planes are used for hiding the data while Red plane holds the pixel status (whether edge or non-edge) of these planes. The RC4 encryption algorithm is used to encrypt secret message before embedding it in the cover image to enhance security of the secret data. A fragile watermark/logo (whose size is less than 1% of total secret data) has been embedded, besides secret data in the cover image, to facilitate content authentication and early tamper detection. At the receiver, firstly logo is extracted. If it is same as one embedded at transmitter, indicating that secret data has not been altered during transit, secret data is extracted. Otherwise (if extracted logo is not same as used at input) the receiver does not waste critical time to extract compromised data but sends an automatic retransmission request. Experimental investigations reveal that the proposed scheme is capable of providing high quality of stego-images for a fairly high pay load. A comparison of the proposed technique with some state of art schemes substantiates the above arguments.

68 citations

Proceedings ArticleDOI
03 Apr 2014
TL;DR: The proposed bit inversion technique provides good improvement to LSB Steganography and could be combined with other methods to improve the steganography further.
Abstract: In this paper, an improvement in the plain LSB based image steganography is proposed and implemented. The paper proposes the use of bit inversion technique to improve the stego-image quality. Two schemes of the bit inversion techniques are proposed and implemented. In these techniques, LSBs of some pixels of cover image are inverted if they occur with a particular pattern of some bits of the pixels. In this way, less number of pixels is modified in comparison to plain LSB method. So PSNR of stego-image is improved. For correct de-steganography, the bit patterns for which LSBs has inverted needs to be stored within the stego-image somewhere. The proposed bit inversion technique provides good improvement to LSB steganography. This technique could be combined with other methods to improve the steganography further.

61 citations