Robust Method for Embedding an Image Inside Cover Image Based on Least Significant Bit Steganography

被引:0
|
作者
Almola S.A.S. [1 ]
Qasim N.H. [2 ]
Ali Abed Alasadi H. [2 ,3 ]
机构
[1] Department of Information System, College of Computer Sciences and Information Technology, University of Basrah
[2] Department of Computer Science, College of Education for Pure Sciences, University of Basrah
[3] Communications Engineering Department, Iraq University College, Istqlal Street, Basra
来源
Informatica (Slovenia) | 2022年 / 46卷 / 09期
关键词
Cryptography; Hiding; Image; LSB; MSB; Security; Steganography; Stego;
D O I
10.31449/inf.v46i9.4362
中图分类号
学科分类号
摘要
According to the enormous evolution of the internet and communications, the security of private or sensitive information has become the important issue. The private information can be passed between a sender and a receiver with high security using Cryptography and Steganography. By the cryptography, as the information can be secured with the cipher key for encryption. By the Steganography, the secret information can hide within usual data such as images, videos, audios. In this paper we proposed the robust method that includes two phases. The first phase consists of two stages. In the first stage we encrypt a secret image using encryption algorithm in order of increasing security of information. In the second stage, we complete the first stage for embedding the most significant bits (MSB) of the encrypted image into the least significant bits (LSB) of the cover image for instituting the stego image. The second phase is the obverse of the first phase, where, the encrypted image is retrieved from the stego image and then, decrypted process construct the secret image. The proposed method is efficient in terms of security compare with the other methods. Where, both encryption and embedding algorithms have an efficient role for embedding the secret image and preserving the good visual quality of stego images. Furthermore, extraction algorithms obtained better and faster results to a restoration of the secret image. © 2022 Slovene Society Informatika. All rights reserved.
引用
收藏
页码:53 / 60
页数:7
相关论文
共 50 条
  • [31] High Security Data Hiding Using Image Cropping and LSB Least Significant Bit Steganography
    Al-Afandy, Khalid A.
    El-Rabaie, El-Sayed
    Faragallah, Osama S.
    Elmhalawy, Ahmed
    El-Banby, Gh. M.
    2016 4TH IEEE INTERNATIONAL COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST), 2016, : 400 - 404
  • [32] Steganography for Inserting Message on Digital Image Using Least Significant Bit and AES Cryptographic Algorithm
    Nurhavati
    Ahmad, Syukri Sayyid
    2016 4TH INTERNATIONAL CONFERENCE ON CYBER AND IT SERVICE MANAGEMENT, 2016, : 25 - 30
  • [33] Multi-bit robust image steganography based on modular arithmetic
    Biswajita Datta
    Sudipta Roy
    Subhranil Roy
    Samir Kumar Bandyopadhyay
    Multimedia Tools and Applications, 2019, 78 : 1511 - 1546
  • [34] Multi-bit robust image steganography based on modular arithmetic
    Datta, Biswajita
    Roy, Sudipta
    Roy, Subhranil
    Bandyopadhyay, Samir Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (02) : 1511 - 1546
  • [35] A Novel Coverless Information Hiding Method Based on the Most Significant Bit of the Cover Image
    Yang, Lina
    Deng, Haiyu
    Dang, Xiaocui
    IEEE ACCESS, 2020, 8 (08): : 108579 - 108591
  • [36] Cover selection for image steganography based on image characteristics
    Yang, R.-E. (yangrener@nbu.edu.cn), 1600, Board of Optronics Lasers, No. 47 Yang-Liu-Qing Ying-Jian Road, Tian-Jin City, 300380, China (25):
  • [37] Research on Least Significant Bits (LSB) Image Information Hiding Based on Random Bit Selection Embedding Algorithm
    Dong, Wen
    2019 4TH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION PROCESSING (ICIIP 2019), 2019, : 41 - 43
  • [38] Cover Selection Steganography Method Based on Similarity of Image Blocks
    Sajedi, Hedieh
    Jamzad, Mansour
    8TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY WORKSHOPS: CIT WORKSHOPS 2008, PROCEEDINGS, 2008, : 379 - 384
  • [39] Unified Embedding method for Color Image Steganography
    Hemalatha, R. K.
    Maneesha, Patra
    2016 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2016,
  • [40] A Robust Generative Image Steganography Method based on Guidance Features in Image Synthesis
    Sun, Youqiang
    Liu, Jianyi
    Zhang, Ru
    2023 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, ICME, 2023, : 55 - 60