Robust Method for Embedding an Image Inside Cover Image Based on Least Significant Bit Steganography

被引:0
|
作者
Almola S.A.S. [1 ]
Qasim N.H. [2 ]
Ali Abed Alasadi H. [2 ,3 ]
机构
[1] Department of Information System, College of Computer Sciences and Information Technology, University of Basrah
[2] Department of Computer Science, College of Education for Pure Sciences, University of Basrah
[3] Communications Engineering Department, Iraq University College, Istqlal Street, Basra
来源
Informatica (Slovenia) | 2022年 / 46卷 / 09期
关键词
Cryptography; Hiding; Image; LSB; MSB; Security; Steganography; Stego;
D O I
10.31449/inf.v46i9.4362
中图分类号
学科分类号
摘要
According to the enormous evolution of the internet and communications, the security of private or sensitive information has become the important issue. The private information can be passed between a sender and a receiver with high security using Cryptography and Steganography. By the cryptography, as the information can be secured with the cipher key for encryption. By the Steganography, the secret information can hide within usual data such as images, videos, audios. In this paper we proposed the robust method that includes two phases. The first phase consists of two stages. In the first stage we encrypt a secret image using encryption algorithm in order of increasing security of information. In the second stage, we complete the first stage for embedding the most significant bits (MSB) of the encrypted image into the least significant bits (LSB) of the cover image for instituting the stego image. The second phase is the obverse of the first phase, where, the encrypted image is retrieved from the stego image and then, decrypted process construct the secret image. The proposed method is efficient in terms of security compare with the other methods. Where, both encryption and embedding algorithms have an efficient role for embedding the secret image and preserving the good visual quality of stego images. Furthermore, extraction algorithms obtained better and faster results to a restoration of the secret image. © 2022 Slovene Society Informatika. All rights reserved.
引用
收藏
页码:53 / 60
页数:7
相关论文
共 50 条
  • [2] A novel image gravity transform based on least significant bit in image steganography
    Nikpour, Mehdi
    Kheirabadi, Mohammad Taghi
    Nodehi, Ali
    MATHEMATICS AND COMPUTERS IN SIMULATION, 2025, 234 : 396 - 418
  • [3] Image Steganography and Steganalysis Based on Least Significant Bit (LSB)
    Rachael, Olomo
    Misra, Sanjay
    Ahuja, Ravin
    Adewumi, Adewole
    Ayeni, Foluso
    Mmaskeliunas, Rytis
    PROCEEDINGS OF ICETIT 2019: EMERGING TRENDS IN INFORMATION TECHNOLOGY, 2020, 605 : 1100 - 1111
  • [4] Image Steganography - Least Significant Bit with Multiple Progressions
    Goel, Savita
    Gupta, Shilpi
    Kaushik, Nisha
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 105 - 112
  • [5] The Performance of Cover Image Steganography for Hidden Information within Image File using Least Significant bit algorithm
    Gedkhaw, Eakbodin
    Soodtoetong, Nantinee
    Ketcham, Mahasak
    2018 18TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES (ISCIT), 2018, : 504 - 508
  • [6] A Robust Image Steganography Technique Using Dynamic Embedding With Two Least Significant Bits
    Swain, Gandharba
    Lenka, Saroj Kumar
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 835 - +
  • [7] Steganography Based on Least Significant Bit Method was designed for Digital Image with Lossless Compression Technique
    Wiryawan, I. Gede
    Sariyasa
    Gunadi, I. Gede Aris
    2018 INTERNATIONAL CONFERENCE ON SIGNALS AND SYSTEMS (ICSIGSYS), 2018, : 98 - 102
  • [8] Hybrid curvelet transform and least significant bit for image steganography
    Mostafa, Reba
    Ali, Ahmed Fouad
    El Taweal, Ghada
    2015 IEEE SEVENTH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INFORMATION SYSTEMS (ICICIS), 2015, : 300 - 305
  • [9] An analysis of empirical PMF based tests for least significant bit image steganography
    Draper, S
    Ishwar, P
    Molnar, D
    Prabhakaran, V
    Ramchandran, K
    Schonberg, D
    Wagner, D
    INFORMATION HIDING, 2005, 3727 : 327 - 341
  • [10] Image-to-Image Steganography with Josephus Permutation and Least Significant Bit (LSB) 3-3-2 Embedding
    Yanuar, Muhammad Rafly
    Suryadi, M. T.
    Apriono, Catur
    Syawaludin, Muhammad Firdaus
    APPLIED SCIENCES-BASEL, 2024, 14 (16):