Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33093
A Robust Data Hiding Technique based on LSB Matching
Authors: Emad T. Khalaf, Norrozila Sulaiman
Abstract:
Many researchers are working on information hiding techniques using different ideas and areas to hide their secrete data. This paper introduces a robust technique of hiding secret data in image based on LSB insertion and RSA encryption technique. The key of the proposed technique is to encrypt the secret data. Then the encrypted data will be converted into a bit stream and divided it into number of segments. However, the cover image will also be divided into the same number of segments. Each segment of data will be compared with each segment of image to find the best match segment, in order to create a new random sequence of segments to be inserted then in a cover image. Experimental results show that the proposed technique has a high security level and produced better stego-image quality.Keywords: steganography; LSB Matching; RSA Encryption; data segments
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1056362
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2219References:
[1] Zahra Toony and Mansour Jamzad "A Novel Image Hiding Scheme Using Content Aware Seam Carving Method" International Conference on Availability, Reliability and Security , 2010
[2] Peticolas FAP, Anderson RJ, and Kuhn MG, "Information hiding-A survey," Proc. of the IEEE, Vol. 87, No. 7, pp.1062-1078,1999.
[3] Niels Provos and Peter Honeyman, "Hide and Seek: An Introduction to Steganography", IEEE 1540-7993, June 2003
[4] M.M Amin, M. Salleh, S. Ibrahim, M.R. Katmin, and M.Z. I. Shamsuddin " Information hiding using Steganography" IEEE 0-7803- 7773-March 7, 2003.
[5] P. Tsai, etal. "Reversible image hiding scheme using predictive coding and histogram shifting", Signal Processing, vol. 89. pp. 1129-1143, 2009.
[6] Emad T. Khalaf, Norrozila Sulaiman "Segmenting and Hiding Data Randomly Based on Index Channel" IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 ISSN (Online): 1694-0814
[7] Neil F. Johnson. Steganography tools. Available from: http://www.jjtc.com /Security /stegtools.htm 2005.
[8] J. Daemen and V. Rijmen, AES Proposal: Rijndael,version 2, 1999. Available from URL: http://www.esat. kuleuven.ac. be/vijmen/rijndael.
[9] Daemen J. and Rijmen V. Aes proposal: Rijndael,aes algorithm submission. Technical report, http://www.nist.gov/ CryptoToolkit, September 1999.
[10] M. M Amin, M. Salleh, S. Ibrahim, M.R.K atmin, and M.Z.I. Shamsuddin "Information Hiding using Steganography" 4* National Conference on Telecommunication Technology Proceedings, Shah Alam, Malaysia, 2003.
[11] Peter Wayner,Disappearing Cryptography -Information Hiding: Steganography & Watermarking-Second Edition. San Fransisco, California, U.S.A.: Elsevier Science, 2002, ISBN 1558607692.
[12] Neil F. Johnson and Sushil Jajodia, Exploring Steganography: Seeing the unseen IEEE transaction on Computer Practices. 1998.
[13] Ross Anderson, Roger Needham, Adi Shamir, The Steganographic File System, 2nd Information Hiding Workshop, 1998.
[14] Emad T. Khalaf and Norrozila Sulaiman " A New Method of Image Watermarking Based on Lowest Effective Bits" 2011 3rd International Conference on Machine Learning and Computing (ICMLC 2011) February 26-28, 2011, Singapore ,V5-504
[15] A. Sverdlov, S. Dexter, and A. M. Eskicioglu, "RobustDCT-SVD domain image watermarking for copyright protection: Embedding data in all frequencies," Proc.European Signal Processing Conference, Turkey, 2005.