CFP last date
20 May 2024
Reseach Article

A Modified Image Steganography Method based on LSB Technique

by Marwa M. Emam, Abdelmgeid A. Aly, Fatma A. Omara
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 125 - Number 5
Year of Publication: 2015
Authors: Marwa M. Emam, Abdelmgeid A. Aly, Fatma A. Omara
10.5120/ijca2015905908

Marwa M. Emam, Abdelmgeid A. Aly, Fatma A. Omara . A Modified Image Steganography Method based on LSB Technique. International Journal of Computer Applications. 125, 5 ( September 2015), 12-17. DOI=10.5120/ijca2015905908

@article{ 10.5120/ijca2015905908,
author = { Marwa M. Emam, Abdelmgeid A. Aly, Fatma A. Omara },
title = { A Modified Image Steganography Method based on LSB Technique },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 125 },
number = { 5 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 12-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume125/number5/22427-2015905908/ },
doi = { 10.5120/ijca2015905908 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:15:13.207031+05:30
%A Marwa M. Emam
%A Abdelmgeid A. Aly
%A Fatma A. Omara
%T A Modified Image Steganography Method based on LSB Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 125
%N 5
%P 12-17
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data hiding techniques are considered very important roles with the rapid growth of intensive transfer of multimedia contents and secret communications. On the other hand, steganography is one of the most important information hiding techniques. By using steganography, information is hidden in carriers such as images, audio files, text files, and video files. In this paper, a modified steganography method based on the spatial domain is proposed. Our proposed method represents the message by six binary bits by using LSBraille method (Braille method of reading and writing for blind people) instead of using the ASCII encoding format. In this method, three bits of the message are hidden in a single pixel, and a true image is composed of three layers (Red, Green, and Blue) layer. Two bits are embedded in the Blue layer, and one bit is embedded in the green layer of the same pixel. In the Blue layer, the message is not only embedded in the least significant bit (LSB), but also the second and the third LSB may be changed. However, during each process of embedding, only one bit of the Blue layer is changed. From the experimental results, it is found that the proposed method achieves a very high Maximum Hiding Capacity (MHC), and higher visual quality as indicated by the Peak Signal-to- Noise Ratio (PSNR).

References
  1. S. Deepa and R. Umarani, “A Study on Digital Image Steganography”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue 1, PP. 54-57, January 2013.
  2. K.Nitin K and N. Ashish V, “Comparison of Various Images Steganography Techniques”, International Journal of Computer Science and Management Research, Vol. 2, Issue 1, PP. 1213-1217, January 2013.
  3. A. Nag, S. Ghosh, S. Biswas, D. Sakar, and P.P. Sakar, “An Image Steganography Technique using X-Box Mapping”, IEEE- International Conference On Advances In Engineering, Science and Management(ICAESM-2012), Vol. 3, Issue 12, PP. 709-713, March 2012.
  4. A. A. Ali and A. H. Seddik, “New Image Steganography Method By Matching Secret Message With Pixels Of Cover Image (SMM)”, International Journal of Computer Science Engineering and Information Technology Research (IJCSITR), Vol. 3, Issue 2 ,PP. 1-10, Jun 2013.
  5. A. A. Radwan, A. Swilem, and A.H. Seddik, "A High Capacity SLDIP (Substitute Last Digit In Pixel) ", Fifth International Conference on Intelligent Computing and Information Systems (ICICIS 2011), Ain Shams University, Egypt, 30 June - 3 July,PP . 156 – 160, 2011.
  6. S. Nazari, A-M. Eftekhari, and M. Sh. Moin, “Secure Information Transmission using Steganography and Morphological Associative Memory”, International Journal of Computer Applications, Vol. 61, No. 7, PP. 23-29, January 2013.
  7. S. Arora and S. Anand, “A Proposed Method for Image Steganography using Edge Detection”, International Journal of Emerging Technology and Advanced Engineering, Vol. 3, Issue 2, PP. 296-297, February 2013.
  8. C. Vanmathi and S. Prabu, “A Survey of State of The Art Technique of Steganography”, International Journal of Engineering and Technology (IJET), Vol. 5, No. 1, PP. 376-379, Feb-Mar 2013.
  9. Y. K. Jain and R. R. Ahirwal, “A Novel Image Steganography Method with Adaptive Number of Least Significant Bits Modification Based on Private Stego-Key”, International Journal of Computer Science and Security, Vol. 4, Issue 1, PP. 40-94, March 2010.
  10. S. Sharda and S. Budhiraja, “Image Steganography: A Review”, International Journal of Emerging Technology and Advanced Engineering (IJETAE), Vol.4, Issue 1, PP. 707-710, January 2013.
  11. A. A. Ali and A. H. Seddik, “New Text Steganography Technique by using Mixed-Case Font”, International Journal of Computer Applications, Vol. 62, No. 3, PP. 6-9, January 2013.
  12. J. Jasril, I. Marzuki, and F. Rahmat, “Modification Four Bits of Uncompressed Steganography using Least Significant Bit (LSB) Method”, Advanced Computer Science and Information Systems (ICACSIS), IEEE, PP. 287-292, 2012.
  13. G. Swain and S. K. Lenka, “A Novel Approach to RGB Channel Based Image Steganography Technique”, International Arab Journal of e-Technology, Vol. 2, No. 4, PP. 181-186, June 2012.
  14. A. A. Ali and A. H. Seddik, “Image Steganography Technique By Using Braille Method of Blind People (LSBraille)”, International Journal of Image Processing (IJIP), Vol. 7, Issue 1,PP. 81-89, 2013.
  15. A. Daneshkhah, H. Aghaeinia, and S. H. Seydi, “A more Secure Steganography method in Spatial Domain”, Second International Conference on Intelligent System, Modelling and Simulation, IEEE, PP. 189-194, 2011.
  16. S. A. Raj and T. Soumya, “A Youthful Procedure for Spatial Domain Steganography”, Third International Conference on Advances in Computing and Communications, IEEE, PP. 300-303, 2013.
  17. S. M. M. Karim, M. S. Rahman, and M. I. Hossain, "A New Approach for LSB Based Image Steganography using Secret Key", Proceedings of 14th International Conference on Computer and Information Technology (ICCIT 201 I) , Dhaka, Bangladesh, PP. 286-291, December -2011.
  18. A. H. Seddik, “Enhancing the (MSLDIP) Image Steganographic method (ESLDIP Method)”, International Conference on Graphic and Image Processing (ICGIP), Vol. 8285, 2011.
  19. A. Rana, N. Sharma, and A. Kaur, “Image Steganography Method based On KOHONNEN Neural Network”, International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 3, PP. 2234-2236, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Peak Signal-to-Noise Rate (PSNR) Mean Square Error (MSE) LSBraille Maximum Hiding Capacity (MHC).