Extended Method of Least Significant Bits on Colour Images in Steganography

Authors

  • Alaa Jabbar Qasim School of Computing, College of Arts and Sciences, University Utara Malaysia, 06010 Sintok, Kedah, Malaysia
  • Roshidi Din School of Computing, College of Arts and Sciences, University Utara Malaysia, 06010 Sintok, Kedah, Malaysia
  • Farah Qasim Ahmed Alyousuf Department of Information Technology, College of Engineering and Computer Science, Lebanese French University, Erbil, Kurdistan Region, Iraq

DOI:

https://doi.org/10.25212/lfu.qzj.9.3.45

Keywords:

LSB, Image Steganography, PSNR, Security Aspect, Data Hiding.

Abstract

The rapid developments in the field of information technology have led to communication between people taking place in the virtual environment. It is of great importance to protect, hide, and secure this information, particularly in the virtual environment. Steganography is the science that ensures secure and confidential transmission of data to the intended recipient. In this field, data is sent by concealing it within various files. This paper focuses on improving the performance of image steganography through a method that involves altering the least significant three bits to hide data in colored images. Experimental studies were conducted using overlay images from standard databases with dimensions of 512 x 512. In these studies, eight-bit data was concealed within a one-pixel area, and the similarity ratios between the cover image and the stego image quality were examined.

Downloads

Download data is not yet available.

References

Ahmed Laskar, S. (2012). High Capacity data hiding using LSB Steganography and Encryption. International Journal of Database Management Systems, 4(6), 57-68. doi:10.5121/ijdms.2012.4605

ALabaichi, A., Al-Dabbas, M. a. A. A. K., Salih, A. J. I. j. o. e., & engineering, c. (2020). Image steganography using least significant bit and secret map techniques. 10(1).

Altaay, A. A. J., Sahib, S. B., & Zamani, M. (2012). An introduction to image steganography techniques. Paper presented at the 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).

Altaay, A. A. J. S., Shahrin Bin Zamani, Mazdak. (2012). An introduction to image steganography techniques. Paper presented at the 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).

Alwan, Z. A., Farhan, H. M., Mahdi, S. Q. J. I. J. o. E., & Engineering, C. (2020). Color image steganography in YCbCr space. 10(1).

Alyousuf, F. Q. A., Din, R., Qasim, A. J. J. B. o. E. E., & Informatics. (2020). Analysis review on spatial and transform domain technique in digital steganography. 9(2), 573-581.

Chan, C.-K., & Cheng, L. M. (2004). Hiding data in images by simple LSB substitution. Pattern Recognition, 37(3), 469-474. doi:10.1016/j.patcog.2003.08.007

Cvejic, N., & Seppanen, T. (2004). Increasing robustness of LSB audio steganography using a novel embedding method. Paper presented at the Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. International Conference on.

Cvejic, N., & Seppänen, T. (2005). Increasing Robustness of LSB Audio Steganography by Reduced Distortion LSB Coding. J. UCS, 11(1), 56-65.

Din, R., Mahmuddin, M., Qasim, A. J. J. I. J. o. E., & Technology. (2019). Review on steganography methods in multi-media domain. 8(1.7), 288-292.

Din, R., Qasim, A. J. J. B. o. E. E., & Informatics. (2019). Steganography analysis techniques applied to audio and image files. 8(4), 1297–1302.

Eskandari, A. R. J. I. J. o. E., & Engineering, C. (2013). A robust steganography method using adjustable parameters. 3(2), 207.

Hameed, M.A., Abdel-Aleem, O.A. & Hassaballah, M. A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. J Ambient Intell Human Comput 14, 4639–4657 (2023). https://doi.org/10.1007/s12652-022-04366-y

Jung, K.-H., & Yoo, K.-Y. (2015). Steganographic method based on interpolation and LSB substitution of digital images. Multimedia Tools and Applications, 74(6), 2143-2155.

Ker, A. D. (2005). Steganalysis of LSB matching in grayscale images. IEEE signal processing letters, 12(6), 441-444.

Khudher, I. M. J. E.-E. J. o. E. T. (2021). LSB Steganography Strengthen Footprint Biometric Template. 1(9), 109.

Liao, X., Wen, Q.-y., & Zhang, J. (2011). A steganographic method for digital images with four-pixel differencing and modified LSB substitution. Journal of Visual Communication and Image Representation, 22(1), 1-8.

Mitra, S., Roy, T., Mazumdar, D., & Saha, A. (2004). Steganalysis of LSB encoding in uncompressed images by close colour pair analysis. Paper presented at the IIT Kanpur Hacher’s Workshop.

Neeta, D., Snehal, K., & Jacobs, D. (2006). Implementation of LSB steganography and its evaluation for various bits. Paper presented at the 2006 1st International Conference on Digital Information Management.

Parthasarathy, C., & Srivatsa, S. (2005). Increased robustness of LSB audio steganography by reduced distortion LSB coding. Journal of Theoretical and Applied Information Technology, 7(1), 080-086.

Qasim, A. J., & Alyousuf, F. Q. A. J. Q. Z. S. J. (2021). History of Image Digital Formats Using in Information Technology. 6(2), 1098-1112.

Qasim, A. J., Din, R., Alyousuf, F. Q. A. J. B. o. E. E., & Informatics. (2020). Review on techniques and file formats of image compression. 9(2), 602–610.

QASSIM, A. J., & SUDHAKAR, Y. (2015). Information Security with Image through Reversible Room by using Advanced Encryption Standard and Least Significant Bit Algorithm.

Raja, K., Chowdary, C., Venugopal, K., & Patnaik, L. (2005). A secure image steganography using LSB, DCT and compression techniques on raw images. Paper presented at the 2005 3rd international conference on intelligent sensing and information processing.

Rasmi.A, D. M. M. (2017). HIGH DATA EMBEDDING USING LSB AND PIXEL INTENSITY BASED METHODS. International Journal of Advanced Research in Computer Science and Software Engineering, 8(7).

Roshidi Din, O. G., Alaa Jabbar Qasim. (2018). Analytical Review on Graphical Formats Used in Image Steganographic Compression. Indonesian Journal of Electrical Engineering and Computer Science, Vol 12, No 2, pp. 441~446. doi: 10.11591

Satyavathy, G., & Punithavalli, M. (2011). LSB, 3D-DCT and Huffman Encoding based Steganography in Safe Message Routing and Delivery for Structured Peer-to-Peer Systems. IJCA Special Issue on Artificial Intelligence Techniques, 1-5.

Shamim Ahmed Laskar, K. H. (2012). High Capacity data hiding using LSB Steganography and Encryption. International Journal of Database Management Systems ( IJDMS ), 4(6).

Taouil, Y., Ameur, E. B. J. I. J. o. E., & Engineering, C. (2018). Steganographic Scheme Based on Message-Cover matching. 8(5).

Tayel, M., Shawky, H., & Hafez, A. E.-D. S. (2012). A new chaos steganography algorithm for hiding multimedia data. Paper presented at the Advanced Communication Technology (ICACT), 2012 14th International Conference on.

Thangadurai, K., & Devi, G. S. (2014). An analysis of LSB based image steganography techniques. Paper presented at the Computer Communication and Informatics (ICCCI), 2014 International Conference on.

Zaidan, B., Zaidan, A., Taqa, A., & Othman, F. (2009). Stego-Image Vs Stego-Analysis System. International Journal of Computer and Electrical Engineering, 1(5), 572.

Downloads

Published

2024-10-06

How to Cite

Alaa Jabbar Qasim, Roshidi Din, & Farah Qasim Ahmed Alyousuf. (2024). Extended Method of Least Significant Bits on Colour Images in Steganography. QALAAI ZANIST JOURNAL, 9(3), 1146–1158. https://doi.org/10.25212/lfu.qzj.9.3.45

Issue

Section

Articles

Most read articles by the same author(s)