Call for Paper - October 2019 Edition
IJCA solicits original research papers for the October 2019 Edition. Last date of manuscript submission is September 20, 2019. Read More

A Technique of Image Steganography using Parity Checker and LSBraille

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Abdelmged A. A., Al-Hussien Seddik Saad, Nada Hussien
10.5120/ijca2016910323

Abdelmged A A., Al-Hussien Seddik Saad and Nada Hussien. A Technique of Image Steganography using Parity Checker and LSBraille. International Journal of Computer Applications 144(4):37-41, June 2016. BibTeX

@article{10.5120/ijca2016910323,
	author = {Abdelmged A. A. and Al-Hussien Seddik Saad and Nada Hussien},
	title = {A Technique of Image Steganography using Parity Checker and LSBraille},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2016},
	volume = {144},
	number = {4},
	month = {Jun},
	year = {2016},
	issn = {0975-8887},
	pages = {37-41},
	numpages = {5},
	url = {http://www.ijcaonline.org/archives/volume144/number4/25170-2016910323},
	doi = {10.5120/ijca2016910323},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Today, internet made it easier to send the data more accurately and faster to the destination with the increasing unauthorized access of confidential data. So that, the issue nowadays reduces detection of information during transmission. To hide the secret information during transmission, there are two methods cryptography and steganography. Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Steganography is a Greek origin word which means “hidden writing”. In this paper, a new image steganography method is proposed. The proposed method hides the secret message inside the cover image by representing the secret message characters using Braille method of reading and writing for blind people. Which all pixels of the cover image can be used and message bit is stored in LSB of one of the three color components Blue (B) only; based on the parity of three LSBs of R, G, and B components of 24-bit color image. From the experimental results it’s founded that the proposed method can hide a lot of data in single RGB image which a few pixels of image can be changed so that method can achieve higher value of (PSNR) and Maximum Hiding Capacity (MHC).

References

  1. Radwan, A. A., & Swilem, A. seddik AH," A high capacity SLDIP (substitute last digit in pixel) method. In fifth international conference on intelligent computing and information systems (ICICIS 2011) (Vol. 30).
  2. Abdelmgeid A.A., and Al - Hussien S. S., "Enhancing SMM Image Steganography Method by using LSBraille Image Steganography Method (SMMWB; Secret Message Matching With Braille)." International Journal of Computer Applications Vol. 70, No. 8, May 2013.
  3. Deepa S., Umarani R., " A Study on Digital Image Steganography ", International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3, Issue 1, January 2013.
  4. Abdelmgeid A. A., Al - Hussien S. S., " New Text Steganography Technique by using Mixed-Case Font ", International Journal of Computer Applications, Vol 62, No.3, January 2013.
  5. Rajani and Muhammed T. K. "Data Hiding In Digital Image Processing Using Steganography: A Review." International Journal of Engineering Development and Research. Vol. 2, No. 3, Sept 2014.
  6. Abdelmgeid A. A., Al – Hussien S. S., " Image Steganography Technique By Using Braille Method of Blind People (LSBraille) ", International Journal of Image Processing (IJIP), Vol 7, Issue 1, 2013.
  7. Tahir A. and Amit D.” A Novel Approach of LSB Based Steganography Using Parity Checker” International Journal of Advanced Research in Computer Science and Software Engineering, Vol 5, Issue 1, January 2015.
  8. Vijaypal D., Ramesh C. P., Yash V. S. “A Novel Algorithm for Image Steganography Based on Effective Channel Selection Technique” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 8, August 2013.
  9. Abdelmgeid A. A., Al – Hussien S. S., " New Image Steganography Method By Matching Secret Message With Pixels Of Cover Image (SMM) ", International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR), Vol. 3, Issue 2, Jun 2013.
  10. Kamal D. "Relative Antropy Based Analysis of Image Steganography Techniques". International Journal of P2P Network Trends and Technology (IJPTT).Vol 1, Issue 3 - 2011.
  11. Arun R. , Nitin S. , Eep K. "Image steganography method based on kohonen neural network." International Journal of Engineering Research and Applications (IJERA) Vol. 2, Issue 3, May-Jun 2012.
  12. Marwa M. E., Abdelmgeid A. A., Fatma A. O. "A Modified Image Steganography Method based on LSB Technique." International Journal of Computer Applications,Vol. 125, No. 5, September 2015.
  13. S. K. Muttoo , Sushil K. "Data Hiding In JPEG Images",BVICAM'S International Journal of Information Technology Bharati Vidyapeeth's Institute of Computer Applications and Management, New Delhi, Vol. 1, No. 1 January – June, 2009.
  14. A. I. Abdul-Sada. "Hiding Data Using LSB-3". J. Basrah Researches (Sciences), vol. 33, No. 4, DEC. 2007.
  15. Sara N., Amir M. E., Mohammad S. M., " Secure Information Transmission using Steganography and Morphological Associative Memory ", International Journal of Computer Applications, Vol 61, No 7, January 2013.

Keywords

Steganography, Peak Signal-to-Noise Ratio (PSNR), Least Significant Bit (LSB), even odd Parity.