Call for Paper - September 2022 Edition
IJCA solicits original research papers for the September 2022 Edition. Last date of manuscript submission is August 22, 2022. Read More

Image in image Steganography Technique based on Arnold Transform and LSB Algorithms

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2018
Authors:
Sadik Ali Al-Taweel, Mohammed Husain Al-Hada, Ahmed Mahmoud Nasser
10.5120/ijca2018917652

Sadik Ali Al-Taweel, Mohammed Husain Al-Hada and Ahmed Mahmoud Nasser. Image in image Steganography Technique based on Arnold Transform and LSB Algorithms. International Journal of Computer Applications 181(10):32-39, August 2018. BibTeX

@article{10.5120/ijca2018917652,
	author = {Sadik Ali Al-Taweel and Mohammed Husain Al-Hada and Ahmed Mahmoud Nasser},
	title = {Image in image Steganography Technique based on Arnold Transform and LSB Algorithms},
	journal = {International Journal of Computer Applications},
	issue_date = {August 2018},
	volume = {181},
	number = {10},
	month = {Aug},
	year = {2018},
	issn = {0975-8887},
	pages = {32-39},
	numpages = {8},
	url = {http://www.ijcaonline.org/archives/volume181/number10/29811-2018917652},
	doi = {10.5120/ijca2018917652},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Computer security, for quite a long time, was almost a limited field of study which was mainly the concern of theoretical computer scientists, electrical engineers, and applied mathematicians. The techniques of concealing data have taken an important role with the rapid growth of intensive transfer of multimedia content and secret communications. There are many techniques used for data hiding and the well-known technique is the Steganography. Steganography is the art of concealing information in ways that prevent detection. For hiding secret information in images, there exists a large variety of Steganography techniques, some are more complex than others and all of them have respective strong and weak points. This paper deals with encrypt and hiding an image in another gray image file using Least Significant Bit (LSB) based Steganography and Arnold's transformation algorithm based Cryptography. This algorithm will be against Noise, Sharpening and Contrast Attacks. Experimental results indicate that the algorithm has good security and imperceptibility in grayscale images.

References

  1. E. Cole. 2003. Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indiana, John Wiley & Sons Inc.
  2. M.E. Whitman & H.J. Mattord. 2007. Principles of information security. Thomson course technology.
  3. Yinglan Fang, Lin Tian, "An Improved Blind Watermarking Algorithm for Image Based on DWT Domain", Journal of Theoretical and Applied Information Technology, 15th November 2012. Vol. 45 No.1.
  4. M. Mishra, A. Ranjan, s. Kumar, " High Security Image Steganography with Modified Arnold’s Cat Map", International Journal of Computer Applications (0975 – 8887) Volume 37– No.9, January 2012
  5. P.Das, S.C.Kushwaha, M. Chakraborty. 2015. Multiple Embedding Secret Key Image Steganography Using Lsb Substitution And Arnold Transform. IEEE Sponsored 2nd International Conference On Electronics And Communication System (ICECS 2015)
  6. S. Shankar, A. Rengarajan, "Data Hiding In Encrypted Images Using Arnold Transform ", ICTACT Journal On Image And Video Processing, August 2016, Volume: 07, ISSUE: 01
  7. M. Mahdavi, Sh. Samavi, N. Zaker and M. Modarres-Hashemi, "Steganalysis Method for LSB Replacement Based on Local Gradient of Image Histogram", Iranian Journal of Electrical & Electronic Engineering, Vol. 4, No. 3, July 2008.
  8. C.C. Chang, H.W. Tseng. A Steganographic method for digital images using side match. Pattern Recognition Letters 25, 1431–1437, 2004.
  9. H.C. Wu, N. I. Wu, C.S. Tsai, M.S. Hwang. 2004. An Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods. IEEE Proceedings of visual image signal Process, November 7, 2004.
  10. Y. K. Jain and R. R. Ahirwal, “A Novel Image Steganography Method With Adaptive Number of Least Significant Bits Modification Based on Private Stego-Keys” International Journal of Computer Science and Security (IJCSS), vol. 4, 2010 March 1.
  11. H. Yang, X. Sun and G. Sun, “A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution”, Journal: Radioengineering, vol. 18, no. 4, 2009, pp. 509-516.
  12. C.H. Yang, C.Y. Weng, S.J. Wang and H.M. Sun, “Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems”, IEEE Transactions on Information Forensics and Security, vol. 3, no. ( 2008, September 3, pp. 488-497.
  13. K.H. Jung, K. J. Ha and K.Y. Yoo. 2008. Image data hiding method based on multi-pixel differencing and LSB substitution methods. Proc. 2008. International Conference on Convergence and Hybrid Information Technology (ICHIT '08), Daejeon (Korea), (2008) August 28-30, pp. 355-358.
  14. H. Zhang, G. Geng and C. Xiong. 2009. Image Steganography Using Pixel-Value Differencing. Electronic Commerce and Security, ISECS '09. Second International Symposium on 2009, May.
  15. W. J. Chen, C. C. Chang and T. H. N. Le, “High Payload Steganography Mechanism Using Hybrid Edge Detector” , Expert Systems with Applications (ESWA 2010), vol. 37, pp. 3292-3301, 2010, April.
  16. V. Madhu Viswanatham and J. Manikonda, “A Novel Technique for Embedding Data in Spatial Domain”, International Journal on Computer Science and Engineering, IJCSE, vol. 2, 2010.
  17. Sadik. A. Al-Taweel, M. A-Hadam, A.M.Naser, M.Al-Thamary.2015. Hide Image in Image Based on LSB Replacement and Arnold Transform. The 7th International Conference on Information Technology (ICIT).
  18. John Miano. Compressed image file formats: JPEG, PNG, GIF, XBM, BMP. First printing, July (1999), Copyright© 1999 by the ACM Press.
  19. Chang, C.C., Tseng, H.W.: "A Steganographic method for digital images using side match", Pattern Recognition Letters 25, 1431–1437 (2004).

Keywords

Image processing, Steganography, information hiding, Arnold Transform