An Improved Image Steganography Method Based on LSB Technique with Random Pixel Selection

被引:0
作者
Emam, Marwa M. [1 ]
Aly, Abdelmgeid A. [1 ]
Omara, Fatma A. [2 ]
机构
[1] Menia Univ, Dept Comp Sci, Al Minya, Egypt
[2] Cairo Univ, Dept Comp Sci, Cairo, Egypt
关键词
Image Steganography; PRNG (Pseudorandom Number Generator); Peak Signal-to-Noise Rate (PSNR); Mean Square Error (MSE);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
with the rapid advance in digital network, information technology, digital libraries, and particularly World Wide Web services, many kinds of information could be retrieved any time. Thus, the security issue has become one of the most significant problems for distributing new information. It is necessary to protect this information while passing over insecure channels. Steganography introduces a strongly approach to hide the secret data in an appropriate media carriers such as images, audio files, text files, and video files. In this paper, a new image steganography method based on spatial domain is proposed. According to the proposed method, the secret message is embedded randomly in the pixel location of the cover image using Pseudo Random Number Generator (PRNG) of each pixel value of the cover image instead of embedding sequentially in the pixels of the cover image. This randomization is expected to increase the security of the system. The proposed method works with two layers (Blue and Green), as (2-1-2) layer, and the byte of the message will be embedded in three pixels only in this form (3-2-3). From the experimental results, it has found that the proposed method achieves a very high Maximum Hiding Capacity (MHC), and higher visual quality as indicated by the Peak Signal-to-Noise Ratio (PSNR).
引用
收藏
页码:361 / 366
页数:6
相关论文
共 50 条
  • [31] Object Based Image Steganography with Pixel Polygon Tracing
    Roy, Ratnakirti
    Changder, Suvamoy
    COMPUTATIONAL INTELLIGENCE IN DATA MINING, VOL 1, 2015, 31 : 699 - 709
  • [32] A modified LSB image steganography method using filtering algorithm and stream of password
    Islam, M. R.
    Tanni, T. R.
    Parvin, S.
    Sultana, M. J.
    Siddiqa, A.
    INFORMATION SECURITY JOURNAL, 2021, 30 (06): : 359 - 370
  • [33] Analysis of Spatial Domain Image Steganography Based on Pixel-Value Differencing Method
    Nisha, C. D.
    Monoth, Thomas
    SOFT COMPUTING FOR PROBLEM SOLVING, SOCPROS 2018, VOL 2, 2020, 1057 : 385 - 397
  • [34] Improvement of Image Steganography Scheme Based on LSB Value with Two Control Random Parameters and Multi-level Encryption
    Hashim, Mohammed Mahdi
    Abdulrazzaq, Ali Abdulwahhab
    Rahim, Mohd Shafry Mohd
    Taha, Mustafa Sabah
    Khalid, Hiyam Nadhim
    Iafta, Sameer Abdulsattar
    2ND INTERNATIONAL CONFERENCE ON SUSTAINABLE ENGINEERING TECHNIQUES (ICSET 2019), 2019, 518
  • [35] CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method
    Muhammad, Khan
    Ahmad, Jamil
    Rehman, Naeem Ur
    Jan, Zahoor
    Sajjad, Muhammad
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (06) : 8597 - 8626
  • [36] CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method
    Khan Muhammad
    Jamil Ahmad
    Naeem Ur Rehman
    Zahoor Jan
    Muhammad Sajjad
    Multimedia Tools and Applications, 2017, 76 : 8597 - 8626
  • [37] Ensemble of Logistic Maps with Genetic Algorithm for Optimal Pixel Selection in Image Steganography
    Chandrasekaran, Jeyamala
    Arumugam, Girija
    DeepthiRajkumar
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 1172 - 1175
  • [38] A New LSB-S Image Steganography Method Blend with Cryptography for Secret Communication
    Joshi, Kamaldeep
    Yadav, Rajkumar
    2015 THIRD INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2015, : 86 - 90
  • [39] High Capacity Image Steganography based on Pixel Value Differencing and Pixel Value Sum
    Tyagi, Avinash
    Roy, Ratnakirti
    Changder, Suvamoy
    2015 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATION ENGINEERING ICACCE 2015, 2015, : 488 - 493
  • [40] Cover selection technique for secure transform domain image steganography
    Mansi S. Subhedar
    Iran Journal of Computer Science, 2021, 4 (4) : 241 - 252