Enhanced LSB Steganography with People Detection as Stego Key Generator

被引:0
|
作者
Jaya, Pande Gede Pradnya S. T. [1 ]
Hidayat, Bambang [1 ]
Suratman, Fiky Y. [1 ]
机构
[1] Telkom Univ, Fac Engn, Grad Studies Program, Bandung, Indonesia
来源
2017 INTERNATIONAL CONFERENCE ON SIGNALS AND SYSTEMS (ICSIGSYS) | 2017年
关键词
Steganography; LSB; People Detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Technology used to hide secret message in a communication called Steganography. Secret message can be text, image or any file that can be converted into binary. This secret message inserted into cover file which can be in form of image, sound or video, basiccaly cover file must be bigger than the secret message in size. Many methods have been proposed on how to hide secret messages in a cover file. These method include spatial domain which work on bit instead of statistically on cover file. Least Significant Bit have been long known as the simplest steganography embedding method. In this research we proposed a method of LSB with enhanced technique to increase security. To extract secret message from cover file one should have particular stego key that describe the location of the message and how to reconstruct them. We utilize a people detection method as a stego key since most of video footage involving human figure, from personal video footage, movie video or security camera recording. While maintaining the appearance of the cover video from arousing suspiciousness, the size of secret message that can be embedded to be one point of consideration.
引用
收藏
页码:99 / 104
页数:6
相关论文
共 30 条
  • [1] Stego key estimation in LSB steganography
    Liu, Jing
    Tang, Guangming
    Journal of Multimedia, 2012, 7 (04): : 309 - 324
  • [2] CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method
    Muhammad, Khan
    Ahmad, Jamil
    Rehman, Naeem Ur
    Jan, Zahoor
    Sajjad, Muhammad
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (06) : 8597 - 8626
  • [3] CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method
    Khan Muhammad
    Jamil Ahmad
    Naeem Ur Rehman
    Zahoor Jan
    Muhammad Sajjad
    Multimedia Tools and Applications, 2017, 76 : 8597 - 8626
  • [4] Enhanced LSB technique for Audio Steganography
    Kumar, Harish
    Anuradha
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [5] Image Steganography Using Enhanced LSB Substitution Technique
    Arora, Arran
    Singh, Manish Pratap
    Thakral, Prateek
    Jarwal, Naveen
    2016 FOURTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2016, : 386 - 389
  • [6] Improved LSB image steganography with high imperceptibility based on cover-stego matching
    Al-Faydi, Sama N. M.
    Ahmed, Sahar Khalid
    Al-Talb, Heba N. Y.
    IET IMAGE PROCESSING, 2023, 17 (07) : 2072 - 2082
  • [7] GRADIENT ENERGY DETECTION OF LSB STEGANOGRAPHY
    Li Zhi Sui Aifen Niu Xinxin Yang Yixian(Institute of Electronic Information
    Journal of Electronics(China), 2005, (01) : 47 - 52
  • [8] Stego-Image Generator (SIG) - Building Steganography Image Database
    Thiyagarajan, P.
    Aghila, G.
    Venkatesan, V. Prasanna
    ADVANCES IN DIGITAL IMAGE PROCESSING AND INFORMATION TECHNOLOGY, 2011, 205 : 257 - 267
  • [9] A new approach to reliable detection of LSB steganography in natural images
    Zhang, T
    Ping, XJ
    SIGNAL PROCESSING, 2003, 83 (10) : 2085 - 2093
  • [10] Enhanced Efficiency and Security in LSB2 Steganography: Burst Embedding and Private Key Integration
    Rasras, Rashad J.
    Abu Sara, Mutaz Rasmi
    Alqadi, Ziad
    TRAITEMENT DU SIGNAL, 2023, 40 (05) : 1795 - 1805