A New Image Steganographic Approach for Secure Communication Based on LSB Replacement Method

被引:20
|
作者
Darabkh, Khalid A. [1 ]
Jafar, Iyad F. [1 ]
A-Zubi, Raed T. [2 ]
Hawa, Mohammed [2 ]
机构
[1] Univ Jordan, Dept Comp Engn, Amman 11942, Jordan
[2] Univ Jordan, Dept Elect Engn, Amman 11942, Jordan
来源
INFORMATION TECHNOLOGY AND CONTROL | 2015年 / 44卷 / 03期
关键词
Steganography; watermarking; data hiding; cover image; stego-image (watermarked data); geometric shape; least-significant-bit (LSB); security; imperceptibility; payload; WATERMARKING; QUALITY; SUBSTITUTION; MODELS;
D O I
10.5755/j01.itc.44.3.8949
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of internet technologies and communication services, message transmissions over the internet still have to face all kinds of security problems. Hence, how to protect secret messages during transmission becomes a challenging issue for most of current researchers. It is worth mentioning that many applications in computer science and other related fields rely on steganography and watermarking techniques to ensure information safety during communication. Unlike cryptography that focuses on scrambling the secret message so that it cannot be understood, the main objective of steganography and watermarking is to communicate securely in such a way that the hidden data are not visible to the observer. In other words, it seeks for the imperceptibility of stego-images quality to an unintended party through embedding efficiently the secret message in a digital media such as image, video, or audio. In this paper, we propose a new steganographic method to embed the secret data inside a cover image based on least-significant-bit (LSB) replacement method. The embedding process predominantly concentrates on distributing the secret message inside one share of a color image to appear like a 3D geometric shape that is constructed according to well-analyzed geometric equations. The dimensions of the geometric shape are determined pursuant to the size of secret message. Data distribution process makes our method to be of a great interest as of being so difficult for the hackers or intruders to reconstruct the shape from stego-images, thereby the security is improved. Furthermore, we compare the performance of our approach with two other relevant approaches in terms of peak signal-to-noise ratio (PSNR) and payload. The contribution of our approach was immensely impressive.
引用
收藏
页码:315 / 328
页数:14
相关论文
共 50 条
  • [1] A New Steganographic Approach Based On Color Change With LSB Method
    Senturk, Zekeriya
    Vatankulu, Y. Emre
    Durna, Yilmaz
    2015 23RD SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2015, : 1954 - 1956
  • [2] A Clustering Based Steganographic Approach for Secure Data Communication
    SaiKrishna, A.
    Parimi, Shankar
    Manikandan, G.
    Sriram, N.
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [3] A New Steganographic Algorithm Based on Multi Directional PVD and Modified LSB
    Darabkh, Khalid A.
    Al-Dhamari, Ahlam K.
    Jafar, Iyad F.
    INFORMATION TECHNOLOGY AND CONTROL, 2017, 46 (01): : 16 - 36
  • [4] Steganographic approach to enhancing secure data communication using contours and clustering
    Manikandan, G.
    Krishnan, R. Bala
    Kumar, N. Rajesh
    Narasimhan, D.
    Srinivasan, A.
    Raajan, N. R.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (24) : 32257 - 32273
  • [5] High-capacity steganographic method based on pixel-value differencing and LSB replacement methods
    Jung, Ki-Hyun
    IMAGING SCIENCE JOURNAL, 2010, 58 (04) : 213 - 221
  • [6] Steganographic method based on interpolation and LSB substitution of digital images
    Ki-Hyun Jung
    Kee-Young Yoo
    Multimedia Tools and Applications, 2015, 74 : 2143 - 2155
  • [7] Steganographic method based on interpolation and LSB substitution of digital images
    Jung, Ki-Hyun
    Yoo, Kee-Young
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (06) : 2143 - 2155
  • [8] Steganographic approach to enhancing secure data communication using contours and clustering
    G. Manikandan
    R. Bala Krishnan
    N. Rajesh Kumar
    D. Narasimhan
    A. Srinivasan
    N. R. Raajan
    Multimedia Tools and Applications, 2018, 77 : 32257 - 32273
  • [9] Image steganography based on LSB substitution and encryption method: adaptive LSB+3
    Solak, Serdar
    Altinisik, Umut
    JOURNAL OF ELECTRONIC IMAGING, 2019, 28 (04)
  • [10] Secure RGB image steganography based on modified LSB substitution
    Almazaydeh, Laiali
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2020, 12 (04) : 453 - 457