Steganography and Hiding Data with Indicators-based LSB Using a Secret Key

被引:0
|
作者
Saqer, Wesam [1 ]
Barhoom, Tawfiq [1 ]
机构
[1] Islamic Univ Gaza, Fac Informat Technol, Gaza, Israel
关键词
Steganography; Steganographic; Least Significant Bit; LSB; Data Hiding; Data Concealing; Data Covering;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Steganography is the field of science concerned with hiding secret data inside other innocent-looking data, called the container, carrier or cover, in a way that no one apart from the meant parties can suspect the existence of the secret data. There are many algorithms and techniques of concealing data. Each of which has its own way of hiding and its own advantages and limitations. In our research we introduce a new algorithm of hiding data. The algorithm uses the same technique used by the Least Significant Bit (LSB) algorithm which is embedding secret data in the least significant bit(s) of the bytes of the carrier. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually it depends on indicators to determine where and how many bits to embed at a time. These indicators are two bits of each cover byte after the least two significant bits. The advantage of this algorithm over the LSB algorithm is the randomness used to confuse intruders as it does not use fixed sequential bytes and it does not always embed one bit at a time. This aims to increase the security of the technique. Also, the amount of cover data consumed is less because it sometimes embeds two bits at once.
引用
收藏
页码:1013 / 1017
页数:5
相关论文
共 50 条
  • [1] Hiding Secret Information Using LSB Based Audio Steganography
    Binny, Anu
    Koilakuntla, Maddulety
    2014 INTERNATIONAL CONFERENCE ON SOFT COMPUTING & MACHINE INTELLIGENCE ISCMI 2014, 2014, : 56 - 59
  • [2] A New Approach for Data Hiding with LSB Steganography
    Prashanti, G.
    Sandhyarani, K.
    EMERGING ICT FOR BRIDGING THE FUTURE, VOL 2, 2015, 338 : 423 - 430
  • [3] Efficient Implementation of Multi-image Secret Hiding Based on LSB and DWT Steganography Comparisons
    Adnan Gutub
    Faiza Al-Shaarani
    Arabian Journal for Science and Engineering, 2020, 45 : 2631 - 2644
  • [4] Secured Data Hiding and Sharing using Improved LSB-based Image Steganography Technique
    Molato, Mark Rennel D.
    Gerardo, Bobby D.
    Medina, Ruji P.
    2018 4TH INTERNATIONAL CONFERENCE ON INDUSTRIAL AND BUSINESS ENGINEERING (ICIBE 2018), 2018, : 238 - 243
  • [5] Secret Key Steganography: improve security level of LSB algorithm
    Al-Jarah, Ahmed Imad Hammoodi
    Arjona, Jorge Luis Ortega
    2021 IEEE 12TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2021, : 215 - 220
  • [6] Efficient Implementation of Multi-image Secret Hiding Based on LSB and DWT Steganography Comparisons
    Gutub, Adnan
    Al-Shaarani, Faiza
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) : 2631 - 2644
  • [7] Increasing the Security of LSB Steganography on the Base of Generated Secret Key
    Rasras, Rashad J.
    Abu Sara, Mutaz Rasmi
    Nader, Ajihad
    Alqadi, Ziad
    TRAITEMENT DU SIGNAL, 2024, 41 (06) : 3305 - 3311
  • [8] MPEG Surround Encoder with Steganography Feature for Data Hiding Based on LSB Method
    Elfitri, Ikhwana
    Nursyam, Doni
    Kurnia, Rahmadi
    Baharuddin
    146TH AES CONVENTION, 2019,
  • [9] MULTIPLE EMBEDDING SECRET KEY IMAGE STEGANOGRAPHY USING LSB SUBSTITUTION AND ARNOLD TRANSFORM
    Das, Pallavi
    Kushwaha, Satish Chandra
    Chakraborty, Madhuparna
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 845 - 849
  • [10] Employing LSB and VQ for Undetectable Secret Data Hiding
    Huang, Cheng-Ta
    Wang, Wei-Jen
    Tsai, Min-Yi
    Lee, Chin-Feng
    2012 9TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INTELLIGENCE & COMPUTING AND 9TH INTERNATIONAL CONFERENCE ON AUTONOMIC & TRUSTED COMPUTING (UIC/ATC), 2012, : 644 - 649