A SECRET-KEY IMAGE STEGANOGRAPHY TECHNIQUE USING RANDOM CHAIN CODES

被引:5
|
作者
Al-Husainy, Mohammed Abbas Fadhil [1 ]
Uliyan, Diaa Mohammed [2 ]
机构
[1] Middle East Univ, Fac Informat Technol, Dept Comp Sci, Amman 11831, Jordan
[2] Univ Hail, Fac Comp Sci & Engn, Dept Comp Sci, Hail 2440, Saudi Arabia
关键词
Chains of pixels; Hiding capacity; Image steganography; Information hiding; Information security; Secret key; SEGMENTATION; SECURITY;
D O I
10.14716/ijtech.v10i4.653
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the wide range use of digital communication technologies, the Internet has been commonly used as a channel for transmitting various images. Steganography practises have been implemented for achieving such secure transmission. The main focus of steganography is data hiding where, digital images are utilized as the cover image. One of the image steganography techniques is based on LSB method, where the secret message bits are embedded sequentially in LSB of the bytes of the carrier image. This makes the hidden message vulnerable to detection by attackers. Many secret key image steganography techniques have been developed as alternative techniques to achieve a high level of security for the hidden secret message. But, these techniques failed to use the full capacity of the carrier image. In this paper, a secret key image steganography technique has been implemented using chains of a random sequence of indices (codes) of the bytes in the carrier image. These chains have been constructed based on the secret key used. This makes the hidden message more secure and difficult to depict by attackers. Furthermore, the proposed technique uses the full capacity of the carrier image. Visual and numerical tests have been conducted for the performance of the proposed technique, the recorded results proved it can be used effectively in the field of information hiding.
引用
收藏
页码:731 / 740
页数:10
相关论文
共 50 条
  • [21] Secret data transmission using advance steganography and image compression
    Pandey, Digvijay
    Wairya, Subodh
    Mandawi, Raghda Salam Ai
    Najim, Saif Al-din M.
    Khalaf, Haitham Abbas
    Al-Barzinji, Shokhan M.
    Obaid, Ahmed J.
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2021, 12 : 1243 - 1257
  • [22] Secret Image Sharing Using Steganography with Different Cover Images
    Jagadeesh, Noopa
    Nandakumar, Aishwarya
    Harmya, P.
    Anju, S. S.
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 490 - 497
  • [23] Secret image sharing using grayscale payload decomposition and irreversible image steganography
    Chakraborty, Soumendu
    Jalal, Anand Singh
    Bhatnagar, Charul
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2013, 18 (04) : 180 - 192
  • [24] An Enhanced Image Encryption Technique using DES Algorithm with Random Image overlapping and Random key Generation
    Shivhare, Ritesh
    Shrivastava, Ritu
    Gupta, Chetan
    2018 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATION AND TELECOMMUNICATION (ICACAT), 2018,
  • [25] Digital Image Steganography using Dithering Technique
    Biswas, D.
    Biswas, S.
    Majumder, A.
    Sarkar, D.
    Sinha, D.
    Chowdhury, A.
    Das, S. K.
    2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT-2012), 2012, 4 : 251 - 255
  • [26] Image Transformation Technique Using Steganography Methods Using LWT Technique
    Kumar, Singamaneni Kranthi
    Reddy, Pallela Dileep Kumar
    Ramesh, Gajula
    Maddumala, Venkata Rao
    TRAITEMENT DU SIGNAL, 2019, 36 (03) : 233 - 237
  • [27] Secret-Key Generation Using Compound Sources and One-Way Public Communication
    Tavangaran, Nima
    Boche, Holger
    Schaefer, Rafael F.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (01) : 227 - 241
  • [28] Locally most powerful detector for secret key estimation in spread spectrum image steganography
    Trivedi, S
    Chandramouli, R
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VI, 2004, 5306 : 1 - 12
  • [29] Design of Random Image Slicer using Implementation on Steganography
    Chavan, Tanvi
    Kulkarni, Umesh
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3688 - 3691
  • [30] Key Dependent Image Steganography Using Edge Detection
    Alam, Shahzad
    Kumar, Vipin
    Siddiqui, Waseem A.
    Ahmad, Musheer
    2014 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES (ACCT 2014), 2014, : 85 - 88