A Secure Steganography Technique Using MSB

Aditi Sharma, Monika Poriye, Vinod Kumar

Abstract


Steganography is the process of hiding secret message into a cover medium to conceal the existence of the message. The redundant nature of image pixels make them suitable medium to hide secret information. In this paper, a new improved technique that uses pixel indicator method to hide secret data bits in most significant bits (MSBs) of the cover image is proposed. Moreover, a central portion of image is selected to hide secret message for more security. Here, red channel is used as an indicator to hide secret message in 5th and 6th bits of either green channel or blue channel of RGB image. If the number of 1’s in red channel are even, green channel is used for embedding otherwise blue channel is used. The experimental results obtained by implementation of the proposed algorithm in MATLAB showed that the stego-images images are of high quality having high PSNR values. It provides better security and imperceptibility.

Full Text:

PDF

References


J. Condell, K. Curran, P. Kevitt A. Cheddad, "Biometric Inspired Digital Image Steganography," in 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, 2008, pp. 159-167.

M. Jamzad H. Sajedi, "Cover Selection Steganography Method based on Similarity of Image Blocks ," in IEEE 8th International Conference on Computer and Information Technology Workshops, 2008, pp. 379-384.

G. Sudha K. Thangadurai, "An analysis of LSB Based Image Steganography Techniques," in 2014 International Conference on Computer Communication and Inforatics(ICCI-2014), Coimbatore,India , 2014.

S. Ghaemmaghami, S. Khosravi K. Ghazanfari, "LSB++ : An Improvement to LSB+ Steganography," in TENCON 2011- IEEE, pp. 364-368.

Madhusudan Vipul Sharma, "Two new approaches for Image Steganography using Cruyptography," in International Conference on image information processing, 2015, pp. 202-207.

A. Nilchi Amirfarhad Nilizadeh, "A novel Steganography method on Matrix Pattern and LSB algorithms in RGB Images," 2016.

Themrichin Tuithung, Kh. Manglem Singh Yambern Jina Chanu, "A short survey on Image Steganography and Steganalysis Techniques," 2012.

Tejaswini A. Jois, "Survey on LSB Data Hiding Techniques," in IEEE WiSPNET 2016 Conference, pp. 656-660.

S. Aravind Kumar, J.Ramesh, K. Gunavathi S. Ahwin, "Novel and Secure Encoding and Hiding Techniques using Image Steganography:A Survey," in International Conference on Emerging Trends in Electrical Engineering and Energy Management, Coimbatore,India, 2012, pp. 171-177.

Md. Saifur Rahman, Md. Ismail Hossain S.M. Masud Karim, "A new approach for LSB based Image Steganography using secret key," in Proceedin), Dhaka, Bangladesh, 2011.

M. Sharma K.Gupta, "Signature Hiding Standard(Hiding Binary Image into RGB Based Image)," 2014.

W. Gong , WenLong Fu, LianJing Jin Xinyi Zhou, "An improved method for LSB based color image steganography combined with cryptography," 2016.

F. Khalid,M. Shah, Z. Khan ,T. Mahmood,A. Khan A. Islam, "An Improved Image Steganography Technique Based On MSB using Bit Differencing," IEEE, pp. 265-269, 2016.

Madhusudan GN, Bharatesh S, K Suresh Babu, K raj, Venugopal N Sathisha, "Chaos Based Spatial Domain Steganograpghy using MSB," in 5th International Conference on Industrial and Information Systems, ICIIs, 2010, pp. 177-182.

Dr. Ban N. Dhannoon, "An Indirect MSB Data Hiding Technique," Life Science Journal , pp. 263-266, 2013.

R. Roy, S. Changder P. Gupta, "A secure Image Steganography Technique with Moderately Higher Significant Bit Embedding," in 2014 International Conference on Computer Communication Informatics(ICCCI-2014).

D. Trinel, W. Puech P. Puteaux, "High Capacity Data Hiding in Encrypted Images using MSB Prediction," IEEE.

S. Hossain, Md. Shariful T. Mahjabin, "A Block Based Data Hiding Method in Images Using Pixel Value Differencing and LSB Substitution Method," IEEE, pp. 168-72, 2012.

Savina Bansal, R.K. Bansal Sumeet Kaur, "Steganography and classification of Image Stegangraphy Techniques," IEEE, pp. 870-875, 2014.




DOI: https://doi.org/10.23956/ijermt.v6i6.270

Refbacks

  • There are currently no refbacks.