Robust Method for Embedding an Image Inside Cover Image Based on Least Significant Bit Steganography

被引:0
|
作者
Almola S.A.S. [1 ]
Qasim N.H. [2 ]
Ali Abed Alasadi H. [2 ,3 ]
机构
[1] Department of Information System, College of Computer Sciences and Information Technology, University of Basrah
[2] Department of Computer Science, College of Education for Pure Sciences, University of Basrah
[3] Communications Engineering Department, Iraq University College, Istqlal Street, Basra
来源
Informatica (Slovenia) | 2022年 / 46卷 / 09期
关键词
Cryptography; Hiding; Image; LSB; MSB; Security; Steganography; Stego;
D O I
10.31449/inf.v46i9.4362
中图分类号
学科分类号
摘要
According to the enormous evolution of the internet and communications, the security of private or sensitive information has become the important issue. The private information can be passed between a sender and a receiver with high security using Cryptography and Steganography. By the cryptography, as the information can be secured with the cipher key for encryption. By the Steganography, the secret information can hide within usual data such as images, videos, audios. In this paper we proposed the robust method that includes two phases. The first phase consists of two stages. In the first stage we encrypt a secret image using encryption algorithm in order of increasing security of information. In the second stage, we complete the first stage for embedding the most significant bits (MSB) of the encrypted image into the least significant bits (LSB) of the cover image for instituting the stego image. The second phase is the obverse of the first phase, where, the encrypted image is retrieved from the stego image and then, decrypted process construct the secret image. The proposed method is efficient in terms of security compare with the other methods. Where, both encryption and embedding algorithms have an efficient role for embedding the secret image and preserving the good visual quality of stego images. Furthermore, extraction algorithms obtained better and faster results to a restoration of the secret image. © 2022 Slovene Society Informatika. All rights reserved.
引用
收藏
页码:53 / 60
页数:7
相关论文
共 50 条
  • [41] Steganalysis of least significant bit matching based on image histogram and correlation
    Xia, Zhihua
    Wang, Shufang
    Sun, Xingming
    Wang, Baowei
    JOURNAL OF ELECTRONIC IMAGING, 2013, 22 (03)
  • [42] An approach of detecting least significant bit matching based on image content
    Xiong, Gang
    Ping, Xi-Jian
    Zhang, Tao
    Sun, Bing
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2012, 34 (06): : 1380 - 1387
  • [43] Image Steganography Using AES Encryption and Least Significant Nibble
    Sheth, Utsav
    Saxena, Shiva
    2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), VOL. 1, 2016, : 876 - 879
  • [44] Least significant bit-steganography detection using least significant bit plane smoothness
    Munirajan, VK
    Cole, E
    Ring, S
    PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, 2004, : 666 - 671
  • [45] Undetectable least significant bit replacement steganography
    Shreelekshmi, R.
    Wilscy, M.
    Madhavan, C. E. Veni
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (08) : 10565 - 10582
  • [46] Undetectable least significant bit replacement steganography
    R. Shreelekshmi
    M. Wilscy
    C. E. Veni Madhavan
    Multimedia Tools and Applications, 2019, 78 : 10565 - 10582
  • [47] Least Significant Bit Steganography Method for the Digital Data Protection in the Barcode
    Alma
    Wardhani, Rini Wisnu
    Muhasyah, Surano
    Delina, Mutia
    8TH NATIONAL PHYSICS SEMINAR 2019, 2019, 2169
  • [48] Steganography forensics method for detecting least significant bit replacement attack
    Wang, Xiaofeng
    Wei, Chengcheng
    Han, Xiao
    JOURNAL OF ELECTRONIC IMAGING, 2015, 24 (01)
  • [49] LSB Array Based Image Steganography Technique by Exploring the Four Least Significant Bits
    Swain, Gandharba
    Lenka, Saroj Kumar
    GLOBAL TRENDS IN INFORMATION SYSTEMS AND SOFTWARE APPLICATIONS, PT 2, 2012, 270 : 479 - +
  • [50] Robust Image Watermarking Based on Dual Intermediate Significant Bit (DISB)
    Mohammed, Ghassan N.
    Yasin, Azman
    Zeki, Akram M.
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2014, : 18 - 22