Image Segmentation to Secure LSB2 Data Steganography
Received: 26 September 2020 | Revised: 7 November 2020 | Accepted: 9 November 2020 | Online: 6 February 2021
Corresponding author: H. G. Zaini
Abstract
A digital color image usually has a high resolution, thus its size is good enough and the image can be used as a covering (holding) image to hide secrete messages (short and long). The methods commonly used for data steganography, e.g. LSB and LSB2 are not secure, so in this paper, a method of securing the LSB2 method is proposed. The proposed method is based on wavelet packet decomposition. The levels of decomposition will be kept in secret and one of the resulting segments will be used as a covering segment. MSE, PSNR, hiding time, and extraction time will be experimentally analyzed to prove that the proposed method is capable of handling the process of hiding secret messages, either sort or long.
Keywords:
steganography, LSB2, MSE, PSNR, hiding time, extraction time, WPT, decomposition level, segment, securityDownloads
References
Z. Alqadi, B. Zahran, Q. Jaber, B. Ayyoub, and J. Al-Azzeh, "Enhancing the Capacity of LSB Method by Introducing LSB2Z Method," International Journal of Computer Science and Mobile Computing, vol. 8, no. 3, pp. 76-90, Mar. 2019.
Z. Alqadi, B. Zahran, Q. Jaber, B. Ayyoub, J. Al-Azzeh, and A. Sharadqh, "Proposed Implementation Method to Improve LSB Efficiency," International Journal of Computer Science and Mobile Computing, vol. 8, no. 3, pp. 306-319, Mar. 2019.
Z. Alqadi, R. J. Rasras, M. R. A. Sara, and B. Zahran, "Developing new Multilevel security algorithm for data encryption-decryption (MLS_ED)," International Journal of Advanced Trends in Computer Science and Engineering, vol. 8, no. 6, pp. 3228-3235, Nov. 2019. https://doi.org/10.30534/ijatcse/2019/90862019
A. Abu-Ein, A. Ziad, and J. Nader, "A Technique of Hiding Secrete Text in Wave File," International Journal of Computer Applications, vol. 151, no. 4, pp. 15-18, Oct. 2016. https://doi.org/10.5120/ijca2016911732
R. Abu Zneit, J. Al-Azzeh, Z. Alqadi, B. Ayyoub, and A. Sharadqh, "Using Color Image as a Stego-Media to Hide Short Secret Messages," International Journal of Computer Science & Mobile Computing, vol. 8, no. 6, pp. 106-123, Jun. 2019.
J. Al-Azzeh, Z. Alqadi, B. Ayyoub, and A. Sharadqh, "Improving the security of LSB image steganography," JOIV : International Journal on Informatics Visualization, vol. 3, no. 4, pp. 384-387, Nov. 2019. https://doi.org/10.30630/joiv.3.4.233
Z. Alqadi, A. Sharadqh, N. Asad, I. Shayeb, J. Al-Azzeh, and B. Ayyoub, "A highly secure method of secret message encoding," International Journal of Research in Advanced Engineering and Technology, vol. 5, no. 3, pp. 82-87, Jul. 2019.
R. J. Rasras, Z. A. AlQadi, and M. R. A. Sara, "A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages," Engineering, Technology & Applied Science Research, vol. 9, no. 1, pp. 3681-3684, Feb. 2019. https://doi.org/10.48084/etasr.2380
A. Y. Hendi, M. Dwairi, Z. A. Al-Qadi, and M. S. Soliman, "A Novel Simple and Highly Secure Method for Data Encryption-Decryption," International Journal of Communication Networks and Information Security, vol. 11, no. 1, pp. 232-238, Apr. 2019.
J. Azzeh, Z. Alqadi, and Q. Jaber, "A Simple, Accurate and Highly Secure Method to Encrypt-Decrypt Digital Images," JOIV : International Journal on Informatics Visualization, vol. 4, no. 1, pp. 40-44, Feb. 2020.
Z. Alqadi and J. Nader, "Classification of matrix multiplication methods used to encrypt-decrypt color image," International Journal of Computer and Information Technology, vol. 5, no. 5, pp. 469-464, Nov. 2016.
A. AlQaisi, M. AlTarawneh, Z. A. Alqadi, and A. A. Sharadqah, "Analysis of color image features extraction using texture methods," TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 17, no. 3, pp. 1220-1225, Jun. 2019. https://doi.org/10.12928/telkomnika.v17i3.9922
Z. Alqadi, B. Zahran, and J. Nader, "Estimation and Tuning of FIR Lowpass Digital Filter Parameters," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 7, no. 2, pp. 18-23, Feb. 2017. https://doi.org/10.23956/ijarcsse/V7I2/01209
Z. Alqadi, M. Aqel, and I. M. M. El Emary, "Performance Analysis and Evaluation of Parallel Matrix Multiplication Algorithms," World Applied Sciences Journal, vol. 5, no. 2, pp. 211-214, 2008.
A. A. Moustafa and Z. A. Alqadi, "A Practical Approach of Selecting the Edge Detector Parameters to Achieve a Good Edge Map of the Gray Image," Journal of Computer Science, vol. 5, no. 5, pp. 355-362, May 2009. https://doi.org/10.3844/jcssp.2009.355.362
M. Dwairi, Z. Alqadi, A. Abujazar, and R. Abu Zneit, "Optimized True-Color Image Processing," World Applied Sciences Journal, vol. 8, no. 10, pp. 1175-1182, Nov. 2010.
J. Al Azzeh, B. Zahran, Z. Alqadi, B. Ayyoub, and M. Abu zaher, "A novel zero-error method to create a secret tag for an image," Journal of Theoretical and Applied Information Technology, vol. 96, no. 13, pp. 4081-4091, Jul. 2018.
Z. A. A. Alqadi, M. K. A. Zalata, and G. M. Qaryouti, "Comparative analysis of color image Steganography," International Journal of Computer Science and Mobile Computing, vol. 5, no. 11, pp. 37-43, Nov. 2016.
Z. Alqadi, M. Khrisat, A. Hindi, O. Majed, and M. Dwairi, "Simple and Highly Secure, Efficient and Accurate Method (SSEAM) to Encrypt-Decrypt Color Image," International Journal of Advanced Research in Computer and Communication Engineering, vol. 9, no. 4, pp. 64-69, Apr. 2020. https://doi.org/10.17148/IJARCCE.2020.9413
R. Z. Rasras, M. R. A. Sara, Z. A. AlQadi, and R. A. Zneit, "Comparative Analysis of LSB, LSB2, PVD Methods of Data Steganography," International Journal of Advanced Trends in Computer Science and Engineering, vol. 8, no. 3, pp. 748-754, May 2019 https://doi.org/10.30534/ijatcse/2019/64832019
A. Hindi, M. Dwairi, and Z. Alqadi, "Analysis of Digital Signals using Wavelet Packet Tree," International Journal of Computer Science and Mobile Computing, vol. 9, no. 2, pp. 96-103, Feb. 2020.
M. Khrisat, A. Hindi, Z. Alqadi, and M. Dwairi, "Valuable Wavelet Packet Information to Analyze Color Images Features," International Journal of Current Advanced Research, vol. 9, no. 2, pp. 21252-21255, Mar. 2020.
M. J. Aqel, Z. ALQadi, and A. A. Abdullah, "RGB Color Image Encryption-Decryption Using Image Segmentation and Matrix Multiplication," International Journal of Engineering & Technology, vol. 7, no. 3.13, pp. 104-107, Jul. 2018. https://doi.org/10.14419/ijet.v7i3.13.16334
M. O. Al-Dwairi, A. Y. Hendi, and Z. A. AlQadi, "An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images," Engineering, Technology & Applied Science Research, vol. 9, no. 3, pp. 4165-4168, Jun. 2019. https://doi.org/10.48084/etasr.2525
A. Y. Hindi, M. O. Dwairi, and Z. A. AlQadi, "A Novel Technique for Data Steganography," Engineering, Technology & Applied Science Research, vol. 9, no. 6, pp. 4942-4945, Dec. 2019. https://doi.org/10.48084/etasr.2955
Downloads
How to Cite
License
Copyright (c) 2020 Author
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.