A SECRET-KEY IMAGE STEGANOGRAPHY TECHNIQUE USING RANDOM CHAIN CODES

被引:5
|
作者
Al-Husainy, Mohammed Abbas Fadhil [1 ]
Uliyan, Diaa Mohammed [2 ]
机构
[1] Middle East Univ, Fac Informat Technol, Dept Comp Sci, Amman 11831, Jordan
[2] Univ Hail, Fac Comp Sci & Engn, Dept Comp Sci, Hail 2440, Saudi Arabia
关键词
Chains of pixels; Hiding capacity; Image steganography; Information hiding; Information security; Secret key; SEGMENTATION; SECURITY;
D O I
10.14716/ijtech.v10i4.653
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the wide range use of digital communication technologies, the Internet has been commonly used as a channel for transmitting various images. Steganography practises have been implemented for achieving such secure transmission. The main focus of steganography is data hiding where, digital images are utilized as the cover image. One of the image steganography techniques is based on LSB method, where the secret message bits are embedded sequentially in LSB of the bytes of the carrier image. This makes the hidden message vulnerable to detection by attackers. Many secret key image steganography techniques have been developed as alternative techniques to achieve a high level of security for the hidden secret message. But, these techniques failed to use the full capacity of the carrier image. In this paper, a secret key image steganography technique has been implemented using chains of a random sequence of indices (codes) of the bytes in the carrier image. These chains have been constructed based on the secret key used. This makes the hidden message more secure and difficult to depict by attackers. Furthermore, the proposed technique uses the full capacity of the carrier image. Visual and numerical tests have been conducted for the performance of the proposed technique, the recorded results proved it can be used effectively in the field of information hiding.
引用
收藏
页码:731 / 740
页数:10
相关论文
共 50 条
  • [1] Color Image Steganography Using Random Key Matrix
    Anurag
    Meena, Shweta
    2018 3RD INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2018,
  • [2] Steganography Based Secret Image Sharing Using Block Division Technique
    Tulasidasu, M.
    Sirisha, B. Lakshmi
    Reddy, K. Rasool
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1173 - 1176
  • [3] Secret-Key Generation Using Correlated Sources and Channels
    Khisti, Ashish
    Diggavi, Suhas N.
    Wornell, Gregory W.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (02) : 652 - 670
  • [4] Secret Communication using Public key Steganography
    Mishra, Madhusudhan
    Tiwari, Gangadhar
    Yadav, Arun Kumar
    2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,
  • [5] Methodologies of Secret-Key Agreement Using Wireless Channel Characteristics
    Syed Taha Ali
    Vijay Sivaraman
    ZTECommunications, 2013, 11 (03) : 20 - 25
  • [6] Secret Key-Based Image Steganography in Spatial Domain
    Gajabe, Rajashree
    Ali, Syed Taqi
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2022, 22 (02)
  • [7] Secret key estimation for image sequential steganography in transform domain
    Luo, Xiangyang
    Wang, Daoshun
    Wang, Ping
    Liu, Fenlin
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 538 - +
  • [8] MULTIPLE EMBEDDING SECRET KEY IMAGE STEGANOGRAPHY USING LSB SUBSTITUTION AND ARNOLD TRANSFORM
    Das, Pallavi
    Kushwaha, Satish Chandra
    Chakraborty, Madhuparna
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 845 - 849
  • [9] Chaotic map based random image steganography using LSB technique
    Rajendran S.
    Doraipandian M.
    International Journal of Network Security, 2017, 19 (04) : 593 - 598
  • [10] On Secret-Key Generation Using Wideband Channels in Mobile Networks
    Shen, Yuan
    Win, Moe Z.
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 4151 - 4156