Robust Method for Embedding an Image Inside Cover Image Based on Least Significant Bit Steganography

被引:0
|
作者
Almola S.A.S. [1 ]
Qasim N.H. [2 ]
Ali Abed Alasadi H. [2 ,3 ]
机构
[1] Department of Information System, College of Computer Sciences and Information Technology, University of Basrah
[2] Department of Computer Science, College of Education for Pure Sciences, University of Basrah
[3] Communications Engineering Department, Iraq University College, Istqlal Street, Basra
来源
Informatica (Slovenia) | 2022年 / 46卷 / 09期
关键词
Cryptography; Hiding; Image; LSB; MSB; Security; Steganography; Stego;
D O I
10.31449/inf.v46i9.4362
中图分类号
学科分类号
摘要
According to the enormous evolution of the internet and communications, the security of private or sensitive information has become the important issue. The private information can be passed between a sender and a receiver with high security using Cryptography and Steganography. By the cryptography, as the information can be secured with the cipher key for encryption. By the Steganography, the secret information can hide within usual data such as images, videos, audios. In this paper we proposed the robust method that includes two phases. The first phase consists of two stages. In the first stage we encrypt a secret image using encryption algorithm in order of increasing security of information. In the second stage, we complete the first stage for embedding the most significant bits (MSB) of the encrypted image into the least significant bits (LSB) of the cover image for instituting the stego image. The second phase is the obverse of the first phase, where, the encrypted image is retrieved from the stego image and then, decrypted process construct the secret image. The proposed method is efficient in terms of security compare with the other methods. Where, both encryption and embedding algorithms have an efficient role for embedding the secret image and preserving the good visual quality of stego images. Furthermore, extraction algorithms obtained better and faster results to a restoration of the secret image. © 2022 Slovene Society Informatika. All rights reserved.
引用
收藏
页码:53 / 60
页数:7
相关论文
共 50 条
  • [11] LEAST SIGNIFICANT BIT IMAGE STEGANOGRAPHY ALGORITHM BASED ON CHAOTIC ROTATION EQUATIONS
    Stoyanov, Borislav P.
    Zhelezov, Stanimir K.
    Kordov, Krasimir M.
    COMPTES RENDUS DE L ACADEMIE BULGARE DES SCIENCES, 2016, 69 (07): : 845 - 850
  • [12] A Secure Image Steganography Technique with Moderately Higher Significant Bit Embedding
    Gupta, Piyush Kumar
    Roy, Ratnakirti
    Changder, Suvamoy
    2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,
  • [13] Multibit Least Significant Bit Matching: A Novel Approach to Image Steganography
    Essa, Almabrok
    Wu, Ian
    MULTIMODAL IMAGE EXPLOITATION AND LEARNING 2024, 2024, 13033
  • [14] Implementation of Least Significant Bit Image Steganography with Advanced Encryption Standard
    Pabbi, Adit
    Malhotra, Rakshit
    Manikandan, K.
    2021 INTERNATIONAL CONFERENCE ON EMERGING SMART COMPUTING AND INFORMATICS (ESCI), 2021, : 363 - 366
  • [15] A secure image steganography algorithm based on least significant bit and integer wavelet transform
    Elshazly, Emad
    Abdelwahab, Safey
    Abouzaid, Refaat
    Zahran, Osama
    Elaraby, Sayed
    Elkordy, Mohamed
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2018, 29 (03) : 639 - 649
  • [16] A secure image steganography algorithm based on least significant bit and integer wavelet transform
    ELSHAZLY Emad
    ABDELWAHAB Safey
    ABOUZAID Refaat
    ZAHRAN Osama
    ELARABY Sayed
    ELKORDY Mohamed
    Journal of Systems Engineering and Electronics, 2018, 29 (03) : 639 - 649
  • [17] A Survey on Image Steganography Based on Least Significant Bit Matched Revisited (LSBMR) Algorithm
    Smitha, G. L.
    Baburaj, E.
    IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGICAL TRENDS IN COMPUTING, COMMUNICATIONS AND ELECTRICAL ENGINEERING (ICETT), 2016,
  • [18] A Modified Least Significant Bit Randomized Embedding Method based on Image Partitioning and Columnar Transposition with Encryption
    Calanda, Fredilyn B.
    Sison, Ariel M.
    Molato, Mark Rennel D.
    Medina, Ruji P.
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTING AND BIG DATA (ICCBD 2019), 2019, : 68 - 72
  • [19] An Improved Approach of Image Steganography Based on Least Significant Bit Technique for Secure Communication in Cloud
    Alam, Md. Khorshed
    Nushrat, Samia
    Patwary, Md. Amir Hamza
    Ullah, Ahsan
    Robin, Kazi Hassan
    ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2022, PT I, 2023, 1797 : 215 - 233
  • [20] Image complexity and feature mining for steganalysis of least significant bit matching steganography
    Liu, Qingzhong
    Sung, Andrew H.
    Ribeiro, Bernardete
    Wei, Mingzhen
    Chen, Zhongxue
    Xu, Jianyun
    INFORMATION SCIENCES, 2008, 178 (01) : 21 - 36