A New Image Steganographic Approach for Secure Communication Based on LSB Replacement Method

被引:20
|
作者
Darabkh, Khalid A. [1 ]
Jafar, Iyad F. [1 ]
A-Zubi, Raed T. [2 ]
Hawa, Mohammed [2 ]
机构
[1] Univ Jordan, Dept Comp Engn, Amman 11942, Jordan
[2] Univ Jordan, Dept Elect Engn, Amman 11942, Jordan
来源
INFORMATION TECHNOLOGY AND CONTROL | 2015年 / 44卷 / 03期
关键词
Steganography; watermarking; data hiding; cover image; stego-image (watermarked data); geometric shape; least-significant-bit (LSB); security; imperceptibility; payload; WATERMARKING; QUALITY; SUBSTITUTION; MODELS;
D O I
10.5755/j01.itc.44.3.8949
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of internet technologies and communication services, message transmissions over the internet still have to face all kinds of security problems. Hence, how to protect secret messages during transmission becomes a challenging issue for most of current researchers. It is worth mentioning that many applications in computer science and other related fields rely on steganography and watermarking techniques to ensure information safety during communication. Unlike cryptography that focuses on scrambling the secret message so that it cannot be understood, the main objective of steganography and watermarking is to communicate securely in such a way that the hidden data are not visible to the observer. In other words, it seeks for the imperceptibility of stego-images quality to an unintended party through embedding efficiently the secret message in a digital media such as image, video, or audio. In this paper, we propose a new steganographic method to embed the secret data inside a cover image based on least-significant-bit (LSB) replacement method. The embedding process predominantly concentrates on distributing the secret message inside one share of a color image to appear like a 3D geometric shape that is constructed according to well-analyzed geometric equations. The dimensions of the geometric shape are determined pursuant to the size of secret message. Data distribution process makes our method to be of a great interest as of being so difficult for the hackers or intruders to reconstruct the shape from stego-images, thereby the security is improved. Furthermore, we compare the performance of our approach with two other relevant approaches in terms of peak signal-to-noise ratio (PSNR) and payload. The contribution of our approach was immensely impressive.
引用
收藏
页码:315 / 328
页数:14
相关论文
共 50 条
  • [31] A steganographic approach for secure communication of medical images based on the DCT-SVD and the compressed sensing (CS) theory
    Thanki, Rohit
    Borra, Surekha
    Dwivedi, Vedvyas
    Borisagar, Komal
    IMAGING SCIENCE JOURNAL, 2017, 65 (08) : 457 - 467
  • [32] A New Method for Text Hiding in the Image by Using LSB
    Tavoli, Reza
    Bakhshi, Maryam
    Salehian, Fatemeh
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (04) : 126 - 132
  • [33] Artificial bee colony approach for enhancing LSB based image steganography
    Banharnsakun, Anan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (20) : 27491 - 27504
  • [34] An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and PVD-LSB Techniques
    Hameed, Mohamed Abdel
    Hassaballah, M.
    Aly, Saleh
    Awad, Ali Ismail
    IEEE ACCESS, 2019, 7 : 185189 - 185204
  • [35] Artificial bee colony approach for enhancing LSB based image steganography
    Anan Banharnsakun
    Multimedia Tools and Applications, 2018, 77 : 27491 - 27504
  • [36] An Image Authentication Method for Secure Internet-Based Communication in Human-Centric Computing
    Chen, Yung-Yao
    Hsia, Chih-Hsien
    Kao, Hsiang-Yun
    Wang, You-An
    Hu, Yu-Chen
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (07): : 1893 - 1903
  • [37] A review on image steganographic techniques based on optimization algorithms for secret communication
    Gnanalakshmi, V
    Indumathi, G.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (28) : 44245 - 44258
  • [38] New Image Steganographic Method Using RLC & Modular Arithmetic
    Naimi, Hossein Miar
    Ramazannia, Bagher
    ICSPC: 2007 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2007, : 744 - 747
  • [39] A review on image steganographic techniques based on optimization algorithms for secret communication
    Gnanalakshmi V
    Indumathi G
    Multimedia Tools and Applications, 2023, 82 : 44245 - 44258
  • [40] A New Steganographic Method Based on Information Sharing via PNG Images
    Lee, Che-Wei
    Tsai, Wen-Hsiang
    2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 5, 2010, : 807 - 811