CFP last date
20 May 2024
Reseach Article

A Novel Steganography Algorithm for Hiding Text in Image using Five Modulus Method

by Firas A. Jassim
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 72 - Number 17
Year of Publication: 2013
Authors: Firas A. Jassim
10.5120/12637-9448

Firas A. Jassim . A Novel Steganography Algorithm for Hiding Text in Image using Five Modulus Method. International Journal of Computer Applications. 72, 17 ( June 2013), 39-44. DOI=10.5120/12637-9448

@article{ 10.5120/12637-9448,
author = { Firas A. Jassim },
title = { A Novel Steganography Algorithm for Hiding Text in Image using Five Modulus Method },
journal = { International Journal of Computer Applications },
issue_date = { June 2013 },
volume = { 72 },
number = { 17 },
month = { June },
year = { 2013 },
issn = { 0975-8887 },
pages = { 39-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume72/number17/12637-9448/ },
doi = { 10.5120/12637-9448 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:38:12.379823+05:30
%A Firas A. Jassim
%T A Novel Steganography Algorithm for Hiding Text in Image using Five Modulus Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 72
%N 17
%P 39-44
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The needs for steganographic techniques for hiding secret message inside images have been arise. This paper is to create a practical steganographic implementation to hide text inside grey scale images. The secret message is hidden inside the cover image using Five Modulus Method. The novel algorithm is called (ST-FMM. FMM which consists of transforming all the pixels within the 5?5 window size into its corresponding multiples of 5. After that, the secret message is hidden inside the 5?5 window as a non-multiples of 5. Since the modulus of non-multiples of 5 are 1,2,3 and 4, therefore; if the reminder is one of these, then this pixel represents a secret character. The secret key that has to be sent is the window size. The main advantage of this novel algorithm is to keep the size of the cover image constant while the secret message increased in size. Peak signal-to-noise ratio is captured for each of the images tested. Based on the PSNR value of each images, the stego image has high PSNR value. Hence this new steganography algorithm is very efficient to hide the data inside the image.

References
  1. Al-Shatnawi A. M. , "A New Method in Image Steganography with Improved Image Quality", Applied Mathematical Sciences, vol. 6, no. 79, pp. 3907 – 3915, 2012.
  2. Anderson, R. J. & Petitcolas, F. A. P. , "On the limits of steganography", IEEE Journal of selected Areas in Communications, vol. 16, no. 4, pp. 474–481, 1998.
  3. Cachin C. , "An Information-Theoretic Model for Steganography", in Proceedings of the Second International Workshop on Information Hiding, D. Aucsmith, ed. vol. 1525 of Lecture Notes in Computer Science, Berlin, Springer-Verlag, pp. 306–318, 1998.
  4. Chan C. K. and Cheng L. M. , "Hiding data in images by simple LSB substitution," Pattern Recognition, vol. 37, pp. 469-474, 2004.
  5. Chandramouli R. , Kharrazi M. , and Memon N. , "Image Steganography and Steganalysis: Concepts and Practice", International Workshop on Digital Watermarking (IWDW), Seoul, pp. 35-49, October 2003.
  6. Chang C. C. , Hsiao J. Y. , and Chan C. S. , "Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy," Pattern Recognition, vol. 36, pp. 1583-1595, 2003.
  7. Chang C. C. , Tseng H. W. , "A steganographic method for digital image using side match", Pattern Recognition Letters, vol. 25, pp. 1431-1437, 2004.
  8. Channalli S. and Jadhav A. , "Steganography An Art of Hiding Data", International Journal on Computer Science and Engineering, vol. 1, no. 3, pp. 137-141, 2009.
  9. Chen P. Y. , Wu W. E. , "A modified side match scheme for image steganography", International Journal of Applied Science and Engineering, vol. 7, pp. 53-60, 2009.
  10. Dhanarasi G. and Prasad A. M. , "Image Steganography Using Block Complexity Analysis", International Journal of Engineering Science and Technology (IJEST), vol. 4, no. 07, pp. 3439- 3445, 2012.
  11. Hayati P. , Potdar V. , and Chang E. , "A Survey of Steganographic and Steganalytic Tools for the Digital Forensic Investigator", in Workshop of Information Hiding and Digital Watermarking to be held in conjunction with IFIPTM, Moncton, New Brunswick, Canada, 2007.
  12. Jassim F. A. , "Five Modulus Method for Image Compression", Signals and Image Processing: An International Journal (SIPIJ), vol. 3, no. 5, pp. , 2012.
  13. Johnson N. F. and Jajodia S. , Exploring steganography: Seeing the unseen, IEEE Computer, vol. 31, no. 2, pp. 26- 34, 1998.
  14. Moulin P. and Koetter R. , "Data-hiding codes", in Proceedings of the IEEE, vol. 93, no. 12, pp. 2083-2127, 2005.
  15. Reed T. R. , Digital Image Sequence Processing, Compression, and Analysis, CRC Press LLC, 2005.
  16. Rifa H. , Rifa J. and Ronquillo L. , "Perfect Z2Z4-linear codes in Steganography", 2010 International Symposium on Information Theory and Its Applications (ISITA), 2010.
  17. Robie D. L. and Mersereau, R. M. , "Video error correction using steganography", in Proceedings of the IEEE International Conference on Image Processing, vol. 1, pp. 930, 2001.
  18. Sharma V. K. and Shrivastava V. , "A Steganography Algorithm For Hiding Image In Image By Improved LSB Substitution By Minimize Detection", Journal of Theoretical and Applied Information Technology, vol. 36, no. 1, 2012.
  19. Swain G. and Lanka S. K. , "A Quick review of Network Security and Steganography", International Journal of Electronics and Computer Science Engineering, vol. 1, no. 2, pp. 426-435, 2012.
  20. Wang H and Wang S, "Cyber warfare: Steganography vs. Steganalysis", Communications of the ACM, vol. 47, no. 10, 2004.
  21. Westfeld A. , "F5-A Steganographic Algorithm High Capacity Despite Better Steganalysis", Lecture Notes in Computer Science, vol. 2137, pp. 289-302, 2001.
  22. Wu P. C. , Tsai W. H. , "A steganographic method for images by pixel-value differencing", Pattern Recognition Letters, vol. 24, pp. 1613-1626, 2003.
  23. Yang C. -H. And Wang S. -J. , "Transforming LSB Substitution for Image-based Steganography in Matching Algorithms", Journal of Information Science and Engineering, vol. 26, pp. 1199-1212, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Image processing steganography information hiding five modulus method