A SECRET-KEY IMAGE STEGANOGRAPHY TECHNIQUE USING RANDOM CHAIN CODES

被引:5
|
作者
Al-Husainy, Mohammed Abbas Fadhil [1 ]
Uliyan, Diaa Mohammed [2 ]
机构
[1] Middle East Univ, Fac Informat Technol, Dept Comp Sci, Amman 11831, Jordan
[2] Univ Hail, Fac Comp Sci & Engn, Dept Comp Sci, Hail 2440, Saudi Arabia
关键词
Chains of pixels; Hiding capacity; Image steganography; Information hiding; Information security; Secret key; SEGMENTATION; SECURITY;
D O I
10.14716/ijtech.v10i4.653
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the wide range use of digital communication technologies, the Internet has been commonly used as a channel for transmitting various images. Steganography practises have been implemented for achieving such secure transmission. The main focus of steganography is data hiding where, digital images are utilized as the cover image. One of the image steganography techniques is based on LSB method, where the secret message bits are embedded sequentially in LSB of the bytes of the carrier image. This makes the hidden message vulnerable to detection by attackers. Many secret key image steganography techniques have been developed as alternative techniques to achieve a high level of security for the hidden secret message. But, these techniques failed to use the full capacity of the carrier image. In this paper, a secret key image steganography technique has been implemented using chains of a random sequence of indices (codes) of the bytes in the carrier image. These chains have been constructed based on the secret key used. This makes the hidden message more secure and difficult to depict by attackers. Furthermore, the proposed technique uses the full capacity of the carrier image. Visual and numerical tests have been conducted for the performance of the proposed technique, the recorded results proved it can be used effectively in the field of information hiding.
引用
收藏
页码:731 / 740
页数:10
相关论文
共 50 条
  • [31] Secret-Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels
    Yachongka, Vamoua
    Yagi, Hideki
    Ochiai, Hideki
    2022 IEEE INFORMATION THEORY WORKSHOP (ITW), 2022, : 232 - 237
  • [32] Secret data modification based image steganography technique using genetic algorithm having a flexible chromosome structure
    Shah, Pratik D.
    Bichkar, Rajankumar S.
    ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2021, 24 (03): : 782 - 794
  • [33] Cropping and Noise Resilient Steganography Algorithm using Secret Image Sharing
    Juarez-Sandoval, Oswaldo
    Fierro-Radilla, Atoany
    Espejel-Trujillo, Angelina
    Nakano-Miyatake, Mariko
    Perez-Meana, Hector
    SIXTH INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2014), 2015, 9443
  • [34] Image steganography for securing secret data using hybrid hiding model
    Sumeet Kaur
    Savina Bansal
    Rakesh Kumar Bansal
    Multimedia Tools and Applications, 2021, 80 : 7749 - 7769
  • [35] An Improved Video Steganography: Using Random Key-Dependent
    Alia, Mohammad A.
    Abu Maria, Khulood
    Alsarayreh, Maher A.
    Abu Maria, Eman
    Almanasra, Sally
    2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), 2019, : 234 - 237
  • [36] A technique for secret communication using a new block cipher with dynamic steganography
    Swain, G. (gswain1234@gmail.com), 2012, Science and Engineering Research Support Society, Room 402, Man-Je Bld., 449-8, Ojung-Dong, Daedoek-Gu, Korea, Republic of (06):
  • [37] A Technique for Secret Communication Using a New Block Cipher with Dynamic Steganography
    Swain, Gandharba
    Lenka, Saroj Kumar
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 1 - 12
  • [38] Randomly Hiding Secret Data using Dynamic Programming for Image Steganography
    Khandelwal, Pulkit
    Bisht, Neha
    Thanikaiselvan, V
    2015 INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORK COMMUNICATIONS (COCONET), 2015, : 777 - 783
  • [39] Steganography of capacity required using modulo operator for embedding secret image
    Wang, SJ
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 164 (01) : 99 - 116
  • [40] Authentication of Secret Message using Rabin-Karp in Image Steganography
    Karthikeyan, B.
    Nishmitha, P.
    Poojasree, B.
    Asha, S.
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 388 - 391