A New Image Steganographic Approach for Secure Communication Based on LSB Replacement Method

被引:20
|
作者
Darabkh, Khalid A. [1 ]
Jafar, Iyad F. [1 ]
A-Zubi, Raed T. [2 ]
Hawa, Mohammed [2 ]
机构
[1] Univ Jordan, Dept Comp Engn, Amman 11942, Jordan
[2] Univ Jordan, Dept Elect Engn, Amman 11942, Jordan
来源
INFORMATION TECHNOLOGY AND CONTROL | 2015年 / 44卷 / 03期
关键词
Steganography; watermarking; data hiding; cover image; stego-image (watermarked data); geometric shape; least-significant-bit (LSB); security; imperceptibility; payload; WATERMARKING; QUALITY; SUBSTITUTION; MODELS;
D O I
10.5755/j01.itc.44.3.8949
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of internet technologies and communication services, message transmissions over the internet still have to face all kinds of security problems. Hence, how to protect secret messages during transmission becomes a challenging issue for most of current researchers. It is worth mentioning that many applications in computer science and other related fields rely on steganography and watermarking techniques to ensure information safety during communication. Unlike cryptography that focuses on scrambling the secret message so that it cannot be understood, the main objective of steganography and watermarking is to communicate securely in such a way that the hidden data are not visible to the observer. In other words, it seeks for the imperceptibility of stego-images quality to an unintended party through embedding efficiently the secret message in a digital media such as image, video, or audio. In this paper, we propose a new steganographic method to embed the secret data inside a cover image based on least-significant-bit (LSB) replacement method. The embedding process predominantly concentrates on distributing the secret message inside one share of a color image to appear like a 3D geometric shape that is constructed according to well-analyzed geometric equations. The dimensions of the geometric shape are determined pursuant to the size of secret message. Data distribution process makes our method to be of a great interest as of being so difficult for the hackers or intruders to reconstruct the shape from stego-images, thereby the security is improved. Furthermore, we compare the performance of our approach with two other relevant approaches in terms of peak signal-to-noise ratio (PSNR) and payload. The contribution of our approach was immensely impressive.
引用
收藏
页码:315 / 328
页数:14
相关论文
共 50 条
  • [21] Secure Wireless Image Communication Using LSB Steganography and Chaotic Baker Ciphering
    Nassar, Sabry S.
    Ayad, Nabil M.
    Kelash, Hamdy M.
    El-sayed, Hala S.
    El-Bendary, Mohsen A. M.
    Abd El-Samie, Fathi E.
    Faragallah, Osama S.
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (03) : 1023 - 1049
  • [22] Secure Wireless Image Communication Using LSB Steganography and Chaotic Baker Ciphering
    Sabry S. Nassar
    Nabil M. Ayad
    Hamdy M. Kelash
    Hala S. El-sayed
    Mohsen A. M. El-Bendary
    Fathi E. Abd El-Samie
    Osama S. Faragallah
    Wireless Personal Communications, 2016, 91 : 1023 - 1049
  • [23] Reversible steganographic method of hiding information based on image interpolation
    Naghiyeva A.F.
    Verdiyev S.G.
    Computer Optics, 2022, 46 (03) : 465 - 472
  • [24] Developing a Secure Image Steganographic System Using TPVD Adaptive LSB Matching Revisited Algorithm for Maximizing the Embedding Rate
    Kumar, P. Mohan
    Shunmuganathan, K. L.
    INFORMATION SECURITY JOURNAL, 2012, 21 (02): : 65 - 70
  • [25] An Adaptive Steganographic Method for Color Images Based on LSB Substitution and Pixel Value Differencing
    Al-Sadi, Azzat A.
    El-Alfy, El-Sayed M.
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 535 - 544
  • [26] LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis
    Lou, Der-Chyuan
    Hu, Chen-Hao
    INFORMATION SCIENCES, 2012, 188 : 346 - 358
  • [27] A Steganographic method based on DCT and new quantization technique
    Sakr, Ahmed Saber
    Ibrahem, Hani Mohamed
    Abdullkader, Hatem M.
    Amin, Mohamed
    2012 22ND INTERNATIONAL CONFERENCE ON COMPUTER THEORY AND APPLICATIONS (ICCTA), 2012, : 187 - 191
  • [28] A New Steganographic Method Based on Equivalence Class Partition
    Liu, Shaohui
    Chen, Yong
    Jiang, Feng
    Yao, Hongxun
    JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE, 2012, 9 (10) : 1757 - 1765
  • [29] New image steganographic methods using run-length approach
    Chang, Chin-Chen
    Lin, Chih-Yang
    Wang, Yu-Zheng
    INFORMATION SCIENCES, 2006, 176 (22) : 3393 - 3408
  • [30] Optimal Steganographic Method Based on Image Encryption
    Al-Bdour, Nashat
    Mansour, Ayman M.
    PRZEGLAD ELEKTROTECHNICZNY, 2021, 97 (06): : 10 - 14