An Improved Image Steganography Method Based on LSB Technique with Random Pixel Selection

被引:0
|
作者
Emam, Marwa M. [1 ]
Aly, Abdelmgeid A. [1 ]
Omara, Fatma A. [2 ]
机构
[1] Menia Univ, Dept Comp Sci, Al Minya, Egypt
[2] Cairo Univ, Dept Comp Sci, Cairo, Egypt
关键词
Image Steganography; PRNG (Pseudorandom Number Generator); Peak Signal-to-Noise Rate (PSNR); Mean Square Error (MSE);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
with the rapid advance in digital network, information technology, digital libraries, and particularly World Wide Web services, many kinds of information could be retrieved any time. Thus, the security issue has become one of the most significant problems for distributing new information. It is necessary to protect this information while passing over insecure channels. Steganography introduces a strongly approach to hide the secret data in an appropriate media carriers such as images, audio files, text files, and video files. In this paper, a new image steganography method based on spatial domain is proposed. According to the proposed method, the secret message is embedded randomly in the pixel location of the cover image using Pseudo Random Number Generator (PRNG) of each pixel value of the cover image instead of embedding sequentially in the pixels of the cover image. This randomization is expected to increase the security of the system. The proposed method works with two layers (Blue and Green), as (2-1-2) layer, and the byte of the message will be embedded in three pixels only in this form (3-2-3). From the experimental results, it has found that the proposed method achieves a very high Maximum Hiding Capacity (MHC), and higher visual quality as indicated by the Peak Signal-to-Noise Ratio (PSNR).
引用
收藏
页码:361 / 366
页数:6
相关论文
共 50 条
  • [41] Improved LSB image steganography with high imperceptibility based on cover-stego matching
    Al-Faydi, Sama N. M.
    Ahmed, Sahar Khalid
    Al-Talb, Heba N. Y.
    IET IMAGE PROCESSING, 2023, 17 (07) : 2072 - 2082
  • [42] Improved Algorithm of Edge Adaptive Image Steganography Based on LSB Matching Revisited Algorithm
    Huang, Fangjun
    Zhong, Yane
    Huang, Jiwu
    DIGITAL-FORENSICS AND WATERMARKING, IWDW 2013, 2014, 8389 : 19 - 31
  • [43] LSB Technique-Based Dual-Image Steganography Using COS Function
    Jan, Aiman
    Parah, Shabir A.
    Hussan, Muzamil
    Malik, Bilal A.
    PROCEEDINGS OF EMERGING TRENDS AND TECHNOLOGIES ON INTELLIGENT SYSTEMS (ETTIS 2021), 2022, 1371 : 243 - 249
  • [44] A Novel Quantum Image Steganography Scheme Based on LSB
    Zhou, Ri-Gui
    Luo, Jia
    Liu, XingAo
    Zhu, Changming
    Wei, Lai
    Zhang, Xiafen
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2018, 57 (06) : 1848 - 1863
  • [45] Steganalysis of AE-LSB Steganography Based on Pixel Value Differencing
    Zhu, Zhenhao
    Zhang, Tao
    Zhu, Pengwei
    Wan, Baoji
    Hou, Xiaodan
    2013 NINTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2013, : 1449 - 1453
  • [46] LSB Array Based Image Steganography Technique by Exploring the Four Least Significant Bits
    Swain, Gandharba
    Lenka, Saroj Kumar
    GLOBAL TRENDS IN INFORMATION SYSTEMS AND SOFTWARE APPLICATIONS, PT 2, 2012, 270 : 479 - +
  • [47] A Secure Video Steganography with Encryption Based on LSB Technique
    Yadav, Pooja
    Mishra, Nishchol
    Sharma, Sanjeev
    2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 436 - 440
  • [48] A Novel Quantum Image Steganography Scheme Based on LSB
    Ri-Gui Zhou
    Jia Luo
    XingAo Liu
    Changming Zhu
    Lai Wei
    Xiafen Zhang
    International Journal of Theoretical Physics, 2018, 57 : 1848 - 1863
  • [49] Design of Image Steganography using LSB XOR Substitution Method
    Arun, Chandni
    Murugan, Senthil
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 674 - 677
  • [50] RGB Image Steganography on Multiple Frame Video using LSB Technique
    Kumar, Saket
    Yadav, Ajay Kumar
    Gupta, Ashutosh
    Kumar, Pradeep
    2015 INTERNATIONAL CONFERENCE ON COMPUTER AND COMPUTATIONAL SCIENCES (ICCCS), 2015, : 226 - 231