Steganography and Hiding Data with Indicators-based LSB Using a Secret Key

Authors

  • W. Saqer Faculty of Information Technology, Islamic University of Gaza, Palestine
  • T. Barhoom Faculty of Information Technology, Islamic University of Gaza, Palestine
Volume: 6 | Issue: 3 | Pages: 1013-1017 | June 2016 | https://doi.org/10.48084/etasr.649

Abstract

Steganography is the field of science concerned with hiding secret data inside other innocent-looking data, called the container, carrier or cover, in a way that no one apart from the meant parties can suspect the existence of the secret data. There are many algorithms and techniques of concealing data. Each of which has its own way of hiding and its own advantages and limitations. In our research we introduce a new algorithm of hiding data. The algorithm uses the same technique used by the Least Significant Bit (LSB) algorithm which is embedding secret data in the least significant bit(s) of the bytes of the carrier. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually it depends on indicators to determine where and how many bits to embed at a time. These indicators are two bits of each cover byte after the least two significant bits. The advantage of this algorithm over the LSB algorithm is the randomness used to confuse intruders as it does not use fixed sequential bytes and it does not always embed one bit at a time. This aims to increase the security of the technique. Also, the amount of cover data consumed is less because it sometimes embeds two bits at once.

Keywords:

Steganography, Steganographic, Least Significant Bit, LSB, Data Hiding, Data Concealing, Data Covering

Downloads

Download data is not yet available.

References

B. Dunbar, “A detailed look at Steganographic Techniques and their use in an Open-Systems Environment”, Sans Institute, Vol. 2002, pp. 1-9, 2002

T. Morkel, J. H. Eloff, M. S. Olivier, “An overview of image steganography”, ISSA, pp. 1-11, 2005

R. Krenn, “Steganography and steganalysis”, available at http://www.krenn.nl/univ/cry/steg/article.pdf

N. F. Johnson, S. Jajodia, “Exploring steganography: Seeing the unseen”, Computer, Vol. 31, No. 2, pp. 26-34, 1998 DOI: https://doi.org/10.1109/MC.1998.4655281

K. Thangadurai, G. Sudha Devi, “An analysis of LSB based image steganography techniques”, International Conference on Computer Communication and Informatics (ICCCI), pp. 1-4, India, January 3-5, 2014 DOI: https://doi.org/10.1109/ICCCI.2014.6921751

H. Wang, S. Wang, “Cyber warfare: steganography vs. steganalysis”, Communications of the ACM, Vol. 47, No. 10, pp. 76-82, 2004 DOI: https://doi.org/10.1145/1022594.1022597

J. Silman, “Steganography and steganalysis: an overview”, Sans Institute, available at https://www.researchgate.net/publication/

_Steganography_and_Steganalysis_An_Overview

D. Neeta, K. Snehal, D. Jacobs, “Implementation of LSB steganography and its evaluation for various bits”, 1st International Conference on Digital Information Management, pp. 173-178, Portugal, September 19-21, 2006

S. M. Karim, M. S. Rahman, M. I. Hossain, “A new approach for LSB based image steganography using secret key”, 14th International Conference on Computer and Information Technology (ICCIT), pp. 286-291, Bangladesh, December 22-24, 2014

N. Akhtar, P. Johri, S. Khan, “Enhancing the security and quality of LSB based image steganography”, 5th International Conference on Computational Intelligence and Communication Networks (CICN), pp. 385-390, India, September 27-29, 2013 DOI: https://doi.org/10.1109/CICN.2013.85

M. R. Islam, A. Siddiqa, M. P. Uddin, A. K. Mandal, M. D. Hossain, “An efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography”, 3rd International Conference on Informatics, Electronics & Vision (ICIEV), pp. 1-6, Bangladesh, May 23-24, 2014 DOI: https://doi.org/10.1109/ICIEV.2014.6850714

M. Asad, J. Gilani, A. Khalid, “An enhanced least significant bit modification technique for audio steganography”, International Conference on Computer Networks and Information Technology (ICCNIT), pp. 143-147, Pakistan, July 11-13, 2011 DOI: https://doi.org/10.1109/ICCNIT.2011.6020921

P. Yadav, N. Mishra, S. Sharma, “A secure video steganography with encryption based on LSB technique”, IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1-5, India, December 26-28, 2013 DOI: https://doi.org/10.1109/ICCIC.2013.6724212

R. Balaji, G. Naveen, “Secure data transmission using video Steganography”, IEEE International Conference on Electro/Information Technology (EIT), pp. 1-5, USA, May 15-17, 2011 DOI: https://doi.org/10.1109/EIT.2011.5978601

J. Lubacz, W. Mazurczyk, K. Szczypiorski, “Principles and overview of network steganography”, IEEE Communications Magazine,Vol. 52, No. 5, pp. 225-229, 2014 DOI: https://doi.org/10.1109/MCOM.2014.6815916

Downloads

How to Cite

[1]
W. Saqer and T. Barhoom, “Steganography and Hiding Data with Indicators-based LSB Using a Secret Key”, Eng. Technol. Appl. Sci. Res., vol. 6, no. 3, pp. 1013–1017, Jun. 2016.

Metrics

Abstract Views: 953
PDF Downloads: 500

Metrics Information