Image Segmentation to Secure LSB2 Data Steganography

Authors

  • H. G. Zaini Department of Computer Engineering, Taif University, Saudi Arabia
Volume: 11 | Issue: 1 | Pages: 6632-6636 | February 2021 | https://doi.org/10.48084/etasr.3859

Abstract

A digital color image usually has a high resolution, thus its size is good enough and the image can be used as a covering (holding) image to hide secrete messages (short and long). The methods commonly used for data steganography, e.g. LSB and LSB2 are not secure, so in this paper, a method of securing the LSB2 method is proposed. The proposed method is based on wavelet packet decomposition. The levels of decomposition will be kept in secret and one of the resulting segments will be used as a covering segment. MSE, PSNR, hiding time, and extraction time will be experimentally analyzed to prove that the proposed method is capable of handling the process of hiding secret messages, either sort or long.

Keywords:

steganography, LSB2, MSE, PSNR, hiding time, extraction time, WPT, decomposition level, segment, security

Downloads

Download data is not yet available.

References

Z. Alqadi, B. Zahran, Q. Jaber, B. Ayyoub, and J. Al-Azzeh, "Enhancing the Capacity of LSB Method by Introducing LSB2Z Method," International Journal of Computer Science and Mobile Computing, vol. 8, no. 3, pp. 76-90, Mar. 2019.

Z. Alqadi, B. Zahran, Q. Jaber, B. Ayyoub, J. Al-Azzeh, and A. Sharadqh, "Proposed Implementation Method to Improve LSB Efficiency," International Journal of Computer Science and Mobile Computing, vol. 8, no. 3, pp. 306-319, Mar. 2019.

Z. Alqadi, R. J. Rasras, M. R. A. Sara, and B. Zahran, "Developing new Multilevel security algorithm for data encryption-decryption (MLS_ED)," International Journal of Advanced Trends in Computer Science and Engineering, vol. 8, no. 6, pp. 3228-3235, Nov. 2019. https://doi.org/10.30534/ijatcse/2019/90862019

A. Abu-Ein, A. Ziad, and J. Nader, "A Technique of Hiding Secrete Text in Wave File," International Journal of Computer Applications, vol. 151, no. 4, pp. 15-18, Oct. 2016. https://doi.org/10.5120/ijca2016911732

R. Abu Zneit, J. Al-Azzeh, Z. Alqadi, B. Ayyoub, and A. Sharadqh, "Using Color Image as a Stego-Media to Hide Short Secret Messages," International Journal of Computer Science & Mobile Computing, vol. 8, no. 6, pp. 106-123, Jun. 2019.

J. Al-Azzeh, Z. Alqadi, B. Ayyoub, and A. Sharadqh, "Improving the security of LSB image steganography," JOIV : International Journal on Informatics Visualization, vol. 3, no. 4, pp. 384-387, Nov. 2019. https://doi.org/10.30630/joiv.3.4.233

Z. Alqadi, A. Sharadqh, N. Asad, I. Shayeb, J. Al-Azzeh, and B. Ayyoub, "A highly secure method of secret message encoding," International Journal of Research in Advanced Engineering and Technology, vol. 5, no. 3, pp. 82-87, Jul. 2019.

R. J. Rasras, Z. A. AlQadi, and M. R. A. Sara, "A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages," Engineering, Technology & Applied Science Research, vol. 9, no. 1, pp. 3681-3684, Feb. 2019. https://doi.org/10.48084/etasr.2380

A. Y. Hendi, M. Dwairi, Z. A. Al-Qadi, and M. S. Soliman, "A Novel Simple and Highly Secure Method for Data Encryption-Decryption," International Journal of Communication Networks and Information Security, vol. 11, no. 1, pp. 232-238, Apr. 2019.

J. Azzeh, Z. Alqadi, and Q. Jaber, "A Simple, Accurate and Highly Secure Method to Encrypt-Decrypt Digital Images," JOIV : International Journal on Informatics Visualization, vol. 4, no. 1, pp. 40-44, Feb. 2020.

Z. Alqadi and J. Nader, "Classification of matrix multiplication methods used to encrypt-decrypt color image," International Journal of Computer and Information Technology, vol. 5, no. 5, pp. 469-464, Nov. 2016.

A. AlQaisi, M. AlTarawneh, Z. A. Alqadi, and A. A. Sharadqah, "Analysis of color image features extraction using texture methods," TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 17, no. 3, pp. 1220-1225, Jun. 2019. https://doi.org/10.12928/telkomnika.v17i3.9922

Z. Alqadi, B. Zahran, and J. Nader, "Estimation and Tuning of FIR Lowpass Digital Filter Parameters," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 7, no. 2, pp. 18-23, Feb. 2017. https://doi.org/10.23956/ijarcsse/V7I2/01209

Z. Alqadi, M. Aqel, and I. M. M. El Emary, "Performance Analysis and Evaluation of Parallel Matrix Multiplication Algorithms," World Applied Sciences Journal, vol. 5, no. 2, pp. 211-214, 2008.

A. A. Moustafa and Z. A. Alqadi, "A Practical Approach of Selecting the Edge Detector Parameters to Achieve a Good Edge Map of the Gray Image," Journal of Computer Science, vol. 5, no. 5, pp. 355-362, May 2009. https://doi.org/10.3844/jcssp.2009.355.362

M. Dwairi, Z. Alqadi, A. Abujazar, and R. Abu Zneit, "Optimized True-Color Image Processing," World Applied Sciences Journal, vol. 8, no. 10, pp. 1175-1182, Nov. 2010.

J. Al Azzeh, B. Zahran, Z. Alqadi, B. Ayyoub, and M. Abu zaher, "A novel zero-error method to create a secret tag for an image," Journal of Theoretical and Applied Information Technology, vol. 96, no. 13, pp. 4081-4091, Jul. 2018.

Z. A. A. Alqadi, M. K. A. Zalata, and G. M. Qaryouti, "Comparative analysis of color image Steganography," International Journal of Computer Science and Mobile Computing, vol. 5, no. 11, pp. 37-43, Nov. 2016.

Z. Alqadi, M. Khrisat, A. Hindi, O. Majed, and M. Dwairi, "Simple and Highly Secure, Efficient and Accurate Method (SSEAM) to Encrypt-Decrypt Color Image," International Journal of Advanced Research in Computer and Communication Engineering, vol. 9, no. 4, pp. 64-69, Apr. 2020. https://doi.org/10.17148/IJARCCE.2020.9413

R. Z. Rasras, M. R. A. Sara, Z. A. AlQadi, and R. A. Zneit, "Comparative Analysis of LSB, LSB2, PVD Methods of Data Steganography," International Journal of Advanced Trends in Computer Science and Engineering, vol. 8, no. 3, pp. 748-754, May 2019 https://doi.org/10.30534/ijatcse/2019/64832019

A. Hindi, M. Dwairi, and Z. Alqadi, "Analysis of Digital Signals using Wavelet Packet Tree," International Journal of Computer Science and Mobile Computing, vol. 9, no. 2, pp. 96-103, Feb. 2020.

M. Khrisat, A. Hindi, Z. Alqadi, and M. Dwairi, "Valuable Wavelet Packet Information to Analyze Color Images Features," International Journal of Current Advanced Research, vol. 9, no. 2, pp. 21252-21255, Mar. 2020.

M. J. Aqel, Z. ALQadi, and A. A. Abdullah, "RGB Color Image Encryption-Decryption Using Image Segmentation and Matrix Multiplication," International Journal of Engineering & Technology, vol. 7, no. 3.13, pp. 104-107, Jul. 2018. https://doi.org/10.14419/ijet.v7i3.13.16334

M. O. Al-Dwairi, A. Y. Hendi, and Z. A. AlQadi, "An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images," Engineering, Technology & Applied Science Research, vol. 9, no. 3, pp. 4165-4168, Jun. 2019. https://doi.org/10.48084/etasr.2525

A. Y. Hindi, M. O. Dwairi, and Z. A. AlQadi, "A Novel Technique for Data Steganography," Engineering, Technology & Applied Science Research, vol. 9, no. 6, pp. 4942-4945, Dec. 2019. https://doi.org/10.48084/etasr.2955

Downloads

How to Cite

[1]
H. G. Zaini, “Image Segmentation to Secure LSB2 Data Steganography”, Eng. Technol. Appl. Sci. Res., vol. 11, no. 1, pp. 6632–6636, Feb. 2021.

Metrics

Abstract Views: 461
PDF Downloads: 473

Metrics Information