Adaptive Bit Rotation and Inversion Scoring: A Novel Approach to LSB Image Steganography

被引:0
作者
Subong, Ryan A. [1 ]
Fajardo, Arnel C. [2 ]
Kim, Yoon Joong [3 ]
机构
[1] Technol Inst Philippines, Grad Programs, Quezon City, Philippines
[2] Manuel L Quezon Univ, Sch Engn & IT, Quezon City, Philippines
[3] Hanbat Natl Univ, Dept Comp Engn, Daejeon, South Korea
来源
2018 IEEE 10TH INTERNATIONAL CONFERENCE ON HUMANOID, NANOTECHNOLOGY, INFORMATION TECHNOLOGY, COMMUNICATION AND CONTROL, ENVIRONMENT AND MANAGEMENT (HNICEM) | 2018年
关键词
Bit Rotation and Inversion; Cryptography; Image Steganography; LSB Substitution; Spatial Domain; SPATIAL DOMAIN; HIDING DATA;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In image steganography, the direct trade-off between the aspects of image's imperceptibility and payload capacity has always been a long-time challenge wherein the improvement of one aspect degrades the other. The more secret data is embedded into an image, the more it begins to look different from the original image. The more the image looks altered, the more it will be suspected of hiding something else other than the visible picture that it is displaying. This study proposes a novel image steganographic approach that produces secret-embedded images with payload capacity comparable with other late variations of spatial domain steganography techniques but with a better imperceptibility level. The nature of the approach is similar to classic LSB (Least Significant Bit) substitution steganography techniques wherein the bit information of the secret message is embedded into the image by replacing the LSB value of its pixel, except that this approach had the embedding bits undergo a series of evaluated and scored bit rotation and inversion operations prior bit replacement in its attempt to embed secret bits into an image with minimal pixel distortion as possible. This study however does not explore the security aspect of the generated image against its resistance to geometric and steganalysis attacks.
引用
收藏
页数:6
相关论文
共 14 条
[1]   A steganography embedding method based on edge identification and XOR coding [J].
Al-Dmour, Hayat ;
Al-Ani, Ahmed .
EXPERT SYSTEMS WITH APPLICATIONS, 2016, 46 :293-306
[2]  
[Anonymous], 2016, COMPUT ELECTR ENG, DOI DOI 10.1016/J.COMPELECENG.2016.09.001
[3]   A high payload steganographic algorithm based on edge detection [J].
Bai, Junlan ;
Chang, Chin-Chen ;
Thai-Son Nguyen ;
Zhu, Ce ;
Liu, Yanjun .
DISPLAYS, 2017, 46 :42-51
[4]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[5]   New image steganographic methods using run-length approach [J].
Chang, Chin-Chen ;
Lin, Chih-Yang ;
Wang, Yu-Zheng .
INFORMATION SCIENCES, 2006, 176 (22) :3393-3408
[6]   Image steganography based on Canny edge detection, dilation operator and hybrid coding [J].
Gaurav, Kumar ;
Ghanekar, Umesh .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 :41-51
[7]   Wavelet transform based steganography technique to hide audio signals in image [J].
Hemalatha, S. ;
Acharya, U. Dinesh ;
Renuka, A. .
GRAPH ALGORITHMS, HIGH PERFORMANCE IMPLEMENTATIONS AND ITS APPLICATIONS (ICGHIA 2014), 2015, 47 :272-281
[8]   Image steganography in spatial domain: A survey [J].
Hussain, Mehdi ;
Wahab, Ainuddin Wahid Abdul ;
Bin Idris, Yamani Idna ;
Ho, Anthony T. S. ;
Jung, Ki-Hyun .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018, 65 :46-66
[9]   A review of image steganalysis techniques for digital forensics [J].
Karampidis, Konstantinos ;
Kavallieratou, Ergina ;
Papadourakis, Giorgos .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 40 :217-235
[10]  
Kumar S., 2018, DEF TECHNOL