A Password and Least Significant Bit Substitution Based Steganography Technique for Image Hiding
DOI:
https://doi.org/10.55524/ijircst.2023.11.5.1Keywords:
Cryptography, Steganography, Least Significant Bit Substitution, Image HidingAbstract
The proposed work introduces an image steganography technique using text-based password that acts as the symmetric key of encryption and decryption. It contains two components, an encoder, and a decoder. An encoder takes a secret image that needs to be hidden inside another cover image. The Combined image is encrypted with an eight characters’ password. The starting position of the cover image from where the secret image starts to hide depends on the password. Then the (Least Significant Bit) LSB Substitution technique is used to hide the entire secret image inside the cover image. The decoder takes the encrypted image and the password to retrieve the secret image back. The proposed work produces an encrypted image by keeping 99% information of the cover image and 100% information of the secret image, thus it provides lossless retrieval of the secret image. The proposed work includes dynamicity of position in steganography that ensures more security of image data over the network than the existing state of art methods.
Downloads
References
N. F. Johnson and S. Jajodia, "Exploring steganography: Seeing the unseen," in Computer, vol. 31, no. 2, pp. 26-34, Feb. 1998, https://doi.org/10.1109/MC.1998.4655281
Nashat, D., Mamdouh, L. An efficient steganographic technique for hiding data. J Egypt Math Soc 27, 57 (2019). https://doi.org/10.1186/s42787-019-0061-6
S. N. Kishor, G. N. K. Ramaiah and S. A. K. Jilani, "A review on steganography through multimedia," 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS), Bangalore, India, 2016, pp. 1-6, doi: https://doi.org/10.1109/RAINS.2016.7764373
F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, "Information hiding-a survey," in Proceedings of the IEEE, vol. 87, no. 7, pp. 1062-1078, July 1999, doi:https://doi.org/10.1109/5.771065
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt, Digital image steganography: Survey and analysis of current methods, Signal Processing, Volume 90, Issue 3, 2010, Pages 727-752, ISSN 0165-1684, https://doi.org/10.1016/j.sigpro.2009.08.010
X. Yu and N. Babaguchi, "An Improved Steganalysis Method of LSB Matching," 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, 2008, pp. 557-560, doi: https://doi.org/10.1109/IIH-MSP.2008.344
Emam, Marwa & Ali, Abdelmgeid & A., Fatma. (2016). An Improved Image Steganography Method Based on LSB Technique with Random Pixel Selection. International Journal of Advanced Computer Science and Applications. 7. http://dx.doi.org/10.14569/IJACSA.2016.070350
Rafik Hamza, A novel pseudo random sequence generator for image-cryptographic applications, Journal of Information Security and Applications, Volume 35, 2017, Pages 119-127, ISSN 2214-2126, https://doi.org/10.1016/j.jisa.2017.06.005
Gandharba Swain, A Steganographic Method Combining LSB Substitution and PVD in a Block, Procedia Computer Science, Volume 85, 2016, Pages 39-44, ISSN 1877-0509, https://doi.org/10.1016/j.procs.2016.05.174