A robust way of steganography by using blocks of an image in spatial domain

被引:0
作者
Abdulraman, Ladeh S. [1 ]
Salah, Sheerko R. Hma [1 ]
Maghdid, Halgurd S. [1 ]
Sabir, Azhin T. [1 ]
机构
[1] Koya Univ, Software Engn Dept, Koya, Iraq
来源
REVISTA INNOVACIENCIA | 2019年 / 7卷 / 01期
关键词
Steganography; Information hiding; Spatial domain; LSB Matching;
D O I
10.15649/2346075X.516
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Steganography is a way to convey secret communication, with rapid electronic communication and high demand of using the internet, steganography has become a wide field of research and discussion. In this paper a new approach for hiding information in cover image proposed in spatial domain, the proposed approach divides the host image into blocks of size (8x8) pixels and message bits are embeds into the pixels of a cover image. The 64-pixel values of each block converted to be represented in binary system and compared with corresponding secret data bits for finding the matching and hold 6-pixels. The search process performed by comparing each secret data bit (8-bits) with created binary plane at the cover image, if matching is found the last row of the created binary plane which is (LSB) is modified to indicate the location of the matched bits sequence "which is the secret data" and number of the row, if matching is not found in all 7th rows the secret sequence is copied in to the corresponding 8th row location. The payload of this technique is 6 pixels' message (48-bits) in each block. In the experiments secret messages are randomly embedded into different images. The quality of the stego-image from which the original text message is extracted is not affected at all. For validation of the presented mechanism, the capacity, the circuit complexity, and the measurement of distortion against steganalysis is evaluated using the peak-signal-to-noise ratio (PSNR) are analyzed.
引用
收藏
页数:7
相关论文
共 11 条
  • [1] Akhter F., 2013, NOVEL APPROACH IMAGE, V13
  • [2] Al-Shatnawi AM, 2012, NEW METHOD IMAGE STE, P6
  • [3] Borse Dipalee, 2015, REV ANAL MULTIFARIOU, V4
  • [4] Chan Chi-Kwong, 2004, HIDING DATA IMAGES S, P37, DOI [10.1016/j.patcog.2003.08.007, DOI 10.1016/J.PATCOG.2003.08.007]
  • [5] Cheddad AaCJaCKaMKP, 2010, DIGITAL IMAGE STEGAN, P90, DOI [10.1016/j.sigpro.2009.08.010, DOI 10.1016/J.SIGPRO.2009.08.010]
  • [6] Kurtuldu Omer, 2008, NEW STEGANOGRAPHY ME, DOI [10.1109/ISCIS.2008.4717893, DOI 10.1109/ISCIS.2008.4717893]
  • [7] Liu Qingzhong, 2008, IMAGE COMPLEXITY FEA, P178, DOI [10.1016/j.ins.2007.08.007, DOI 10.1016/J.INS.2007.08.007]
  • [8] Neeta DaSKaJD, 2006, IMPLEMENTATION LSB S
  • [9] Prasad Koyi Lakshmi, 2013, NOVEL SECURED RGB LS, P3
  • [10] Samaratunge S., 2007, NEW STEGANOGRAPHY TE, DOI [10.1109/ICIINFS.2007.4579198, DOI 10.1109/ICIINFS.2007.4579198]