A Novel Technique for Data Steganography
In this paper, a novel stego-method will be introduced, which can be used to hide any secret message in any holding color image. The proposed method will be implemented and tested and the calculated parameters will be compared with the LSB method parameters. It will be shown that the proposed method provides a high-security level by using two keys to extract the secret message from the holding image, making it very difficult to hack.
Keywords:steganography, hiding time, extracting time, MSE, PSNR
E. Zukerman, “Review: OpenPuff steganography tool hides confidential data in plain sigh”, PC World, available at: www.pcworld.com/article/2026357/review-openpuff-steganography-tool-hides-confidential-data-in-plain-sight.html
Encryption and steganography, available at: http://www.cis.upenn.edu/~cis110/13fa/hw/hw04/steganography.html#steganography
S. Channalli, A. Jadhav, “Steganography an art of hiding data’’, International Journal on Computer Science and Engineering, Vol. 1, No. 3, pp. 137-141, 2009
A. A. Z. Alqadi, M. K. A. Zalata, G. M. Qaryouti, “Comparative analysis of color image steganography”, International Journal of Computer Science and Mobile Computing, Vol. 5, No. 11, pp. 37-43, 2016
R. Z. Wang, C. F. Lin, J. C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm”, Pattern Recognition, Vol. 34, No. 3, pp. 671-683, 2000 DOI: https://doi.org/10.1016/S0031-3203(00)00015-7
C. K. Chan, L. M. Chen, “Hiding data in images by simple LSB substitution”, Pattern Recognition, Vol. 37, No. 3, pp. 469-474, 2004 DOI: https://doi.org/10.1016/j.patcog.2003.08.007
C. H. Yang, “Inverted pattern approach to improve image quality of information hiding by LSB substitution”, Pattern Recognition, Vol. 41, No. 8, pp. 2674-2683, 2008 DOI: https://doi.org/10.1016/j.patcog.2008.01.019
M. M. Emam, A. A. Aly, F. A. Omara, “An improved image steganography method based on LSB technique with random pixel selection”, International Journal of Advanced Computer Science & Applications, Vol. 7, No. 3, pp. 361-366, 2016 DOI: https://doi.org/10.14569/IJACSA.2016.070350
G. Kaur, A. Kochhar, “A steganography implementation based on LSB & DCT”, International Journal for Science and Emerging Technologies with Latest Trends, Vol. 4, No. 1, pp. 35-41, 2012
M. J. Thenmozhi, T. Menakadevi, “A new secure image steganography using Lsb and Spiht based compression method”, International Journal of Engineering Research & Science, Vol. 2, No. 3, pp. 80-85, 2016
S. Shabnam, K. Hemachandran, “LSB based steganography using bit masking method on RGB planes”, International Journal of Computer Science and Information Technologies, Vol. 7, No. 3, pp. 1169-1173, 2016
B. Datta, U. Mukherjee, S. K. Bandyopadhyay, “LSB layer independent robust steganography using binary addition”, Procedia Computer Science, Vol. 85, pp. 425-432, 2016 DOI: https://doi.org/10.1016/j.procs.2016.05.188
A. S. Pandit, S. R. Khope, “Review on image steganography”, International Journal of Engineering Science, Vol. 6, No. 5, pp. 6115-6117, 2016
D. Artz, “Digital steganography: Hiding data within data”, IEEE Internet Computing, Vol. 5, No. 3, pp. 75-80, 2001 DOI: https://doi.org/10.1109/4236.935180
A. M. A. Shatnawi, “A new method in image steganography with improved image quality”, Applied Mathematical Sciences, Vol. 6, No. 79, pp. 3907-3915, 2012
S. Gupta, A. Goyal, B. Bhushan, “Information hiding using least significant bit steganography and cryptography”, International Journal of Modern Education and Computer Science, Vol. 6, pp. 27-34, 2012 DOI: https://doi.org/10.5815/ijmecs.2012.06.04
J. K. Mandal, D. Das, “Color image steganography based on pixel value differencing in spatial domain”, International Journal of Information Sciences and Techniques, Vol. 2, No. 4, pp. 83-93, 2012 DOI: https://doi.org/10.5121/ijist.2012.2408
M. O. Al-Dwairi, A. Hendi, Z. AlQadi, “An efficient and highly secure technique to encrypt-decrypt color images”, Engineering, Technology & Applied Science Research, Vol. 9, No. 3, pp. 4165-4168, 2019 DOI: https://doi.org/10.48084/etasr.2525
A. Y. Hendi, M. O. Dwairi, Z. A. Al-Qadi, M. S. Soliman, “A novel simple and highly secure method for data encryption-decryption”, International Journal of Communication Networks and Information Security, Vol. 11, No. 1, pp. 232-238, 2012
G. Sonal, H. Mer, “A survey: Image Steganography using different method”, International Journal of Novel Research and Development, Vol. 2, No. 4, pp. 48-51, 2017
How to Cite
MetricsAbstract Views: 319
PDF Downloads: 233
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.