A SECRET-KEY IMAGE STEGANOGRAPHY TECHNIQUE USING RANDOM CHAIN CODES

被引:5
作者
Al-Husainy, Mohammed Abbas Fadhil [1 ]
Uliyan, Diaa Mohammed [2 ]
机构
[1] Middle East Univ, Fac Informat Technol, Dept Comp Sci, Amman 11831, Jordan
[2] Univ Hail, Fac Comp Sci & Engn, Dept Comp Sci, Hail 2440, Saudi Arabia
关键词
Chains of pixels; Hiding capacity; Image steganography; Information hiding; Information security; Secret key; SEGMENTATION; SECURITY;
D O I
10.14716/ijtech.v10i4.653
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the wide range use of digital communication technologies, the Internet has been commonly used as a channel for transmitting various images. Steganography practises have been implemented for achieving such secure transmission. The main focus of steganography is data hiding where, digital images are utilized as the cover image. One of the image steganography techniques is based on LSB method, where the secret message bits are embedded sequentially in LSB of the bytes of the carrier image. This makes the hidden message vulnerable to detection by attackers. Many secret key image steganography techniques have been developed as alternative techniques to achieve a high level of security for the hidden secret message. But, these techniques failed to use the full capacity of the carrier image. In this paper, a secret key image steganography technique has been implemented using chains of a random sequence of indices (codes) of the bytes in the carrier image. These chains have been constructed based on the secret key used. This makes the hidden message more secure and difficult to depict by attackers. Furthermore, the proposed technique uses the full capacity of the carrier image. Visual and numerical tests have been conducted for the performance of the proposed technique, the recorded results proved it can be used effectively in the field of information hiding.
引用
收藏
页码:731 / 740
页数:10
相关论文
共 18 条
  • [1] Al-Husainy MAF, 2017, INT J ADV COMPUT SC, V8, P260
  • [2] Al-Husainy MAF, 2012, INT J ADV COMPUT SC, V3, P57
  • [3] [Anonymous], P 2 INT C INF COMM T
  • [4] SVD-Based Universal Spatial Domain Image Steganalysis
    Gul, Gokhan
    Kurugollu, Fatih
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (02) : 349 - 353
  • [5] Hamid N., 2012, Int. J. Comput. Sci. Secur., V6, P168
  • [6] Kaur S, 2014, IJRECE INT J RES ELE, V2, P102
  • [7] Nilizadeh A. F., 2013, INT J MODERN ED COMP, V5, P8
  • [8] Pal A. K., 2013, PROC QUALITY RELIABI, P794
  • [9] An RGB colour image steganography scheme using overlapping block-based pixel-value differencing
    Prasad, Shiv
    Pal, Arup Kumar
    [J]. ROYAL SOCIETY OPEN SCIENCE, 2017, 4 (04):
  • [10] Purohit A., 2014, INT J COMPUTER SCI I, V5, P4891