CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Technique for Increasing Payload Capacity of RGB Images Steganography based on Mod Factor and Segmentation

by Mahmoud S. Abdelbar, Abdelmgeid A. Ali, M. Hasabala
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 13
Year of Publication: 2021
Authors: Mahmoud S. Abdelbar, Abdelmgeid A. Ali, M. Hasabala
10.5120/ijca2021921439

Mahmoud S. Abdelbar, Abdelmgeid A. Ali, M. Hasabala . A Technique for Increasing Payload Capacity of RGB Images Steganography based on Mod Factor and Segmentation. International Journal of Computer Applications. 183, 13 ( Jul 2021), 29-35. DOI=10.5120/ijca2021921439

@article{ 10.5120/ijca2021921439,
author = { Mahmoud S. Abdelbar, Abdelmgeid A. Ali, M. Hasabala },
title = { A Technique for Increasing Payload Capacity of RGB Images Steganography based on Mod Factor and Segmentation },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2021 },
volume = { 183 },
number = { 13 },
month = { Jul },
year = { 2021 },
issn = { 0975-8887 },
pages = { 29-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number13/31988-2021921439/ },
doi = { 10.5120/ijca2021921439 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:16:42.803776+05:30
%A Mahmoud S. Abdelbar
%A Abdelmgeid A. Ali
%A M. Hasabala
%T A Technique for Increasing Payload Capacity of RGB Images Steganography based on Mod Factor and Segmentation
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 13
%P 29-35
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the evolution of computer technologies and the internet, the security of information has become the most crucial challenges in communication to protect information, Steganography is one of the data hiding techniques which embed secret information in a media such as images, sounds, videos, and etc. in a way that it is not detectable by others. Focusing on the image, there are many methods which apply image steganography, with the increasing rate of unauthorized access and attacks, security of confidential data has an utmost importance. Steganography hides the confidential data in some cover image such that the existences of the data, which do not arouse suspicion regarding the communication taking place between two parties. In this paper, we proposed a technique to hide the secret message inside the cover image based on segmented the blue layer from the cover image, using initial threshold value, and we can change the value of the threshold according to the size of the secret message. Finally convert the secret message and embedding it in the segmented area. The results showed that the proposed technique gives better results of higher PSNR lower MSE.

References
  1. Hassaballah, M., Digital Media Steganography: Principles, Algorithms, and Advances, Elsevier, 2020, ISBN: 9780128194386.
  2. Alqadi, Z., Zahran, B., Jaber, Q., Ayyoub, B., & Al-Azzeh, J. (2019). Enhancing the Capacity of LSB Method by Introducing LSB2Z Method. International Journal of Computer Science and Mobile Computing, 8(3), 76-90. ‏
  3. Khan, S.; Khan, K.; Arif, A.; Hassaballah, M.; Ali, J.; Ta, Q.T.H.; Yu, L. (2020). A Modulo Function-Based Robust Asymmetric Variable Data Hiding Using DCT. Symmetry, 12, 1659.
  4. Hassaballah, M., Hameed, M. A., Awad, A. I., & Muhammad, K. (2021). A Novel Image Steganography Method for Industrial Internet of Things Security. IEEE Transactions on Industrial Informatics.
  5. Chung-Ming Wang, Nan-I-Wu, Chwei-Shyong Tsai, Min-Shiang Hwang (2008). A High Quality Steganographic Method with pixel value differencing and modulus function, The Jurnal of System and Software, 81(1), 150-158.
  6. Bohme. Rainer (2010), Advaced Statistical Steganalysis. Springer.
  7. A. Radwan, A. Swilem, and A.-H. Seddik, "A High Capacity SLDIP (Substitute Last Digit in Pixel) ", Fifth International Conference on Intelligent Computing and Information Systems, 30 June - 3 July, 2011, Cairo, Egypt.
  8. Hassaballah, M., Hameed, M. A., Aly, S., & AbdelRady, A. S. (2020). A color image steganography method based on ADPVD and HOG techniques. In Digital Media Steganography (pp. 17-40). Academic Press.
  9. Altaay, A. A. J., Sahib, S. B., & Zamani, M., “An Introduction to Image Steganography Techniques”, (2012) International Conference on Advanced Computer ScienceApplications and Technologies.
  10. Vaidya, K., Kargathara, A., & Kumbharana, C. K. (2021). Classification of Image Steganography in Substitution Technique. In Rising Threats in Expert Applications and Solutions (pp. 253-261). Springer, Singapore
  11. Almohammad, A. (2010). " Steganography-Based Secret and Reliable Communications: Improving Steganographic Capacity and Imperceptibility. PhD thesis, Brunel University.
  12. Hamid, N.; Yahya, A.; Ahmad, R. B.; Najim, D. and Kanaan, L. (2013). "Steganography in Image Files: A survey". Australian Journal of Basic and Applied Sciences, 7(1), pp. 35-55.
  13. Hemalatha, S., Acharya, D. U., Renuka, A., & Kamath, P. R. (2013). "A Secure and high capacity Image Stenography Technique". Signal & Image Processing: An International Journal (SIPIJ), 4(1), pp 83-89. ‏
  14. Cheddad, A. (2009). "Steganoflage: A New Image Steganography Algorithm", Doctor of Philosophy Thesis, School of Computing & Intelligent Systems, Faculty of Computing & Engineering, University of Ulster.
  15. Saini, R., &Yadav, R. (2012). "A New Data Hiding Method Using Pixel Position and Logical and Operation". International Journal of Computer and Electronics Research, 1(1), pp. 12-18.
  16. Nagaraj, V., Vijayalakshmi, V., &Zayaraz, G. (2013)." Color image steganography based on pixel value modification method using modulus Function". IERI Procedia, 4, pp.17-24.
  17. Abdelmged, A., et al. (2016). "Improving ZOH Image Steganography Method by using Braille Method." International Journal of Computer Applications 975: 8887.
  18. Dagar, S. (2014). "Highly Randomized Image Steganography Using Secret Keys". In Recent Advances and Innovations in Engineering, IEEE, 2014 pp. 1-5.
  19. Maurya, S., & Shrivastava, V. (2014). "An Improved Novel Steganographic Technique for RGB and YCbCr Colorspace". IOSR Journal of Computer Engineering, 16(2), pp.155-157. ‏
  20. Singh, S., & Datar, A. (2015). "Improved hash based approach for secure color image steganography using canny edge detection method". International Journal of Computer Science and Network Security, 15(7), pp.82-89.
  21. Singla, K., & Kaur, S. (2012). "A Hash Based Approach for Secure Image Stegnograpgy Using Canny Edge Detection Method". International journal of computer science and communication, 3(1), pp. 156-157.
  22. Nandani, D., & Yadav, R. (2015). "Assessment of Steganography using Image Edges for Enhancement in Security”. ‏International Journal of Modern Engineering Research, 5(8), pp. 36-46.
  23. Ali, A. A., & Saad, H. S. (2012). New Technique for Encoding the Secret Message to Enhance the Performance of MSLDIP Image Steganography Method (MPK Encoding). International Journal of Computer Applications, 59(15).
Index Terms

Computer Science
Information Sciences

Keywords

Steganography least-significant-bit modulus factor segmentation