Academia.eduAcademia.edu

Outline

A New Steganography Method for Hiding Text into RGB Image

Abstract

Now-a-days, the network has significant roles in transferring data and knowledge quickly and accurately from sender to receiver. However, the data is still not secure enough to transfer quite confidentially. Data protection is considered as one of the principal challenges in information sharing over communication. So, steganography techniques were proposed which are the art of hiding information that prevents secret text message detection from intruders. Nevertheless, most steganography methods use low bits number of secret messages. Moreover, these methods applied a single logic gate for encrypting the secret message. Therefore, this paper proposes a new method for the encryption of secret messages based on the Huffman technique to reduce the secret message dimensions. In addition, the proposed method uses two different logic gates namely XOR and XNOR for increasing the message security. The RGB Lena image is used as the cover image of the secret message. There are six different experiments conducted with respect to various lengths of the secret messages in bits. The experimental results show that when using the highest number of bits (i.e., 66288), the proposed method achieved 0.0233 MSE, 64.4589 PSNR, 0.9999998 SSIM, and 8.2383 encryption time. The proposed method has the ability to encrypt the secret message with a high number of bits.

References (37)

  1. T. Limbasiya and D. Das, "Lightweight secure message broadcasting protocol for vehicle-to-vehicle communication," IEEE Systems Journal, vol. 14, no. 1, pp. 520-529, 2019.
  2. M. Elhoseny et al., "Security and privacy issues in medical internet of things: overview, countermeasures, challenges and future directions," Sustainability, vol. 13, no. 21, p. 11645, 2021. www.ijacsa.thesai.org
  3. T. Naqash, A. Iqbal, and S. H. Shah, "Review on Safe Reversible Image Data Hiding," in 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), 2019: IEEE, pp. 0929-0932.
  4. B. Swathi, K. Shalini, and K. N. Prasanthi, "A review on steganography using images," Asian Journal of Computer Science and Information Technology, vol. 2, no. 8, 2012.
  5. M. K. I. Rahmani, K. Arora, and N. Pal, "A crypto-steganography: A survey," International Journal of Advanced computer science and applications, vol. 5, no. 7, 2014.
  6. M. Mittal, S. Gupta, P. K. Keserwani, and M. C. Govil, "Security Enhancement using Vectoring, Cryptography and Steganography," in 2023 International Conference on Intelligent Systems, Advanced Computing and Communication (ISACC), 2023: IEEE, pp. 1-8.
  7. J. Kour and D. Verma, "Steganography techniques-A review paper," International Journal of Emerging Research in Management & Technology, vol. 3, no. 5, pp. 132-135, 2014.
  8. F. Sharmin and M. I. Khan, "Image steganography using combined nearest and farthest neighbors methods," International Journal of Advanced Computer Science and Applications, vol. 10, no. 11, 2019.
  9. N. Singh, "Survey paper on steganography," International Refereed Journal of Engineering and Science (IRJES), vol. 6, no. 1, pp. 68-71, 2017.
  10. M. K. Abed, M. M. Kareem, R. K. Ibrahim, M. M. Hashim, S. Kurnaz, and A. H. Ali, "Secure medical image steganography method based on pixels variance value and eight neighbors," in 2021 International Conference on Advanced Computer Applications (ACA), 2021: IEEE, pp. 199-205.
  11. P. W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE transactions on image processing, vol. 10, no. 10, pp. 1593-1601, 2001.
  12. F. Q. A. Alyousuf, R. Din, and A. J. Qasim, "Analysis review on spatial and transform domain technique in digital steganography," Bulletin of Electrical Engineering and Informatics, vol. 9, no. 2, pp. 573-581, 2020.
  13. A. O. Modupe, A. E. Adedoyin, and A. O. Titilayo, "A Comparative Analysis of LSB, MSB and PVD Based Image Steganography," Int. J. Res. Rev, vol. 8, no. 9, pp. 373-377, 2021.
  14. S. Rustad, P. N. Andono, and G. F. Shidik, "Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)," Signal Processing, p. 108908, 2022.
  15. S. Rahman et al., "A Comprehensive Study of Digital Image Steganographic Techniques," IEEE Access, vol. 11, pp. 6770-6791, 2023.
  16. R. A. Watheq, F. Almasalha, and M. H. Qutqut, "A new steganography technique using JPEG images," International Journal of Advanced Computer Science and Applications, vol. 9, no. 11, 2018.
  17. V. Lakshminarayanan and I. Bhattacharya, "Advances in Optical Science and Engineering," Springer Proceedings in Physics, vol. 166, pp. 533-539, 2014.
  18. G. Paul, I. Davidson, I. Mukherjee, and S. Ravi, "Keyless dynamic optimal multi-bit image steganography using energetic pixels," Multimedia tools and applications, vol. 76, no. 5, pp. 7445-7471, 2017.
  19. O. I. I. Al-Farraji, "New technique of steganography based on locations of LSB," International Journal of Information Research and Review, vol. 4, no. 01, pp. 3549-3553, 2017.
  20. M. M. Hashim, M. S. M. Rahim, F. A. Johi, M. S. Taha, and H. S. Hamad, "Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats," International Journal of Engineering & Technology, vol. 7, no. 4, pp. 3505-3514, 2018.
  21. H. L. Hussein, A. Abbass, S. Naji, S. Alaugby, and J. Lafta, "Hiding text in gray image using mapping technique," in Journal of Physics: Conference Series, 2018, vol. 1003, p. 012032.
  22. Y. P. Astuti, E. H. Rachmawanto, and C. A. Sari, "Simple and secure image steganography using LSB and triple XOR operation on MSB," in 2018 International Conference on Information and Communications Technology (ICOIACT), 2018: IEEE, pp. 191-195.
  23. D. R. I. M. Setiadi, S. Rustad, P. N. Andono, and G. F. Shidik, "Graded fuzzy edge detection for imperceptibility optimization of image steganography," The Imaging Science Journal, pp. 1-13, 2023.
  24. H. Hiary, K. E. Sabri, M. S. Mohammed, and A. Al-Dhamari, "A hybrid steganography system based on LSB matching and replacement," International Journal of Advanced Computer Science and Applications, vol. 7, no. 9, 2016.
  25. C. A. Sari, G. Ardiansyah, and E. H. Rachmawanto, "An improved security and message capacity using AES and Huffman coding on image steganography," TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 17, no. 5, pp. 2400-2409, 2019.
  26. S. Ghoul, R. Sulaiman, and Z. Shukur, "A Review on Security Techniques in Image Steganography," International Journal of Advanced Computer Science and Applications, vol. 14, no. 6, 2023.
  27. R. M. Neamah, J. A. Abed, and E. A. Abbood, "Hide text depending on the three channels of pixels in color images using the modified LSB algorithm," International Journal of Electrical and Computer Engineering, vol. 10, no. 1, p. 809, 2020.
  28. H. R. Kareem, H. H. Madhi, and K. A.-A. Mutlaq, "Hiding encrypted text in image steganography," Periodicals of Engineering and Natural Sciences, vol. 8, no. 2, pp. 703-707, 2020.
  29. D. Ratnasari and A. S. Aji, "Text to Color Image Steganography Using LSB Technique and XOR Operations," International Journal of Applied Business and Information Systems, vol. 3, no. 2, pp. 59-65, 2019.
  30. A. Setyono, "Securing and hiding secret message in image using xor transposition encryption and LSB method," in Journal of Physics: Conference Series, 2019, vol. 1196, no. 1: IOP Publishing, p. 012039.
  31. M. Ulker and B. Arslan, "A novel secure model: Image steganography with logistic map and secret key," in 2018 6th International Symposium on Digital Forensic and Security (ISDFS), 2018: IEEE, pp. 1-5.
  32. E. Emad, A. Safey, A. Refaat, Z. Osama, E. Sayed, and E. Mohamed, "A secure image steganography algorithm based on least significant bit and integer wavelet transform," Journal of Systems Engineering and Electronics, vol. 29, no. 3, pp. 639-649, 2018.
  33. E. A. Abbood, R. M. Neamah, and S. Abdulkadhm, "Text in Image Hiding using Developed LSB and Random Method," International Journal of Electrical & Computer Engineering (2088-8708), vol. 8, no. 4, 2018.
  34. S. N. Abd-Alwahab, M. K. WAli, and M. F. Bonneya, "Text Hiding in Coded Image Based on Quantization Level Modification and Chaotic Function," International Journal of Integrated Engineering, vol. 13, no. 1, pp. 148-158, 2021.
  35. Ö. Çataltaş and K. Tütüncü, "Comparison of LSB image steganography technique in different color spaces," in 2017 international artificial intelligence and data processing symposium (IDAP), 2017: IEEE, pp. 1- 6.
  36. S. A. Mahdi and A. K. Maisa'a, "An Improved Method for Combine (LSB and MSB) Based on Color Image RGB," Engineering and Technology Journal, vol. 39, no. 1B, pp. 231-242, 2021.
  37. S. N. Mali, P. M. Patil, and R. M. Jalnekar, "Robust and secured image- adaptive data hiding," Digital Signal Processing, vol. 22, no. 2, pp. 314- 323, 2012.