A Novel Steganography Method Based on Matrix Pattern and LSB Algorithms in RGB Images

被引:0
作者
Nilizadeh, Amirfarhad [1 ]
Nilchi, Ahmad Reza Naghsh [2 ]
机构
[1] Islamic Azad Univ, Najafabad Branch, Dept Comp Engn, Najafabad, Iran
[2] Univ Isfahan, Dept Artificial Intelligence Engn, Esfahan, Iran
来源
2016 1ST CONFERENCE ON SWARM INTELLIGENCE AND EVOLUTIONARY COMPUTATION (CSIEC 2016) | 2016年
关键词
image processing; information security; data hiding; steganography; watermarking; least significant bit (LSB); matrix pattern (MP);
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, a new steganography algorithm that combines two different steganography methods, namely Matrix Pattern (MP) and Least Significant Bit (LSB), is presented for RGB images. These two methods use the spatial domain of images for hiding secret messages; however, they differ from each other, fundamentally. The MP method is an algorithm which, firstly, divides the "Cover-Image" into non-overlapping BxB blocks. Then, it hides the data in the 4th through 7th bit layers of the blue layer of the "Cover-Image", by generating unique t(1)xt(2) matrix patterns for each character in each block. The LSB method is an algorithm that hides data in the least significant bit of the "Cover-Image" pixels, which has the least visible effect on the transparency of the "Stego-Image". In the proposed algorithm, the first three bit layers, and the 4th to 7th bit layers of the blue layer of the RGB "Cover-Image" is used for hiding the "Message", with LSB and MP methods, respectively. This algorithm has two entrances for the "Message"; one of them can be only text, "Text Message", which is hidden with the MP method. The other one, "Binary Message", can be any digital media, and is hidden with the LSB method. Our simulation and evaluation results show that this new method has a better capacity than the LSB and MP methods, by more than 1.265 and 4.77 times, correspondingly. Our results also indicate that the final "Stego-Image" has a high quality PSNR.
引用
收藏
页码:154 / 159
页数:6
相关论文
共 14 条
[11]  
Solanki K, 2007, LECT NOTES COMPUT SC, V4567, P16
[12]   Steganography of capacity required using modulo operator for embedding secret image [J].
Wang, SJ .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 164 (01) :99-116
[13]   Image steganographic scheme based on pixel-value differencing and LSB replacement methods [J].
Wu, HC ;
Wu, N ;
Tsai, CS ;
Hwang, MS .
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2005, 152 (05) :611-615
[14]   Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security [J].
Zhang, XP ;
Wang, SZ .
PATTERN RECOGNITION LETTERS, 2004, 25 (03) :331-339