TY - JOUR TT - İmge İçine Bilgi Gizlemede Kullanılan LSB Yöntemlerinin Karşılaştırması AU - Saran, Nurdan AU - Olcay, Cem PY - 2013 DA - May JF - Cankaya University Journal of Science and Engineering JO - CUJSE PB - Cankaya University WT - DergiPark SN - 2564-7954 VL - 10 IS - 1 KW - LSB technique KW - steganography KW - information hiding KW - digital image steganography N2 - Digital image steganography techniques deal with three subjects lossy/losslesscompressed images, uncompressed images. Steganography techniques embed secret datapixel directly into uncompressed and lossless compressed cover images. The most populardata hiding method is, changing pixels’ left most digits or last two, known as LeastSignificant Bit (LSB). Lossless image formats like .bmp, .png, and 8-bit gray-scale .gif areusable for LSB methods. LSB embedding method is not usable for palette images becauseof changing just last bit of a pixel causes a big difference on image. After embedding all ofsecret message to palette image, Human Visual System (HVS) can detect manipulationson image. In this study, we compare some of the most popular LSB techniques; Chan’salgorithm [3], 2/3 efficient embedding [4], matrix embedding for large payloads [5], imageblocks method [6] and pixel-value differencing method [7]-[8]. CR - 1] N. F. Johnson and S. Katzenbeisser, A survey of steganographic techniques, in: Information Hiding Techniques for Steganography and Digital Watermarking (eds. S. Katzenbeisser and F. A. P. Petitcolas), Artech House Books (2000), 43–78. CR - [2] J. Mielikainen, LSB matching revisited, IEEE Signal Processing Letters 13 (2006), 285–287. CR - [3] C. S. Chan, On using LSB matching function for data hiding in pixels, Fundamenta Informaticae 96 (2009), 49–59. CR - [4] A. D. Ker, Information hiding and covert communication, www.sti.uniurb.it/events/ fosad08/slides/ker-slides-part2.pdf. Online; accessed 26-February-2013. CR - [5] J. Fridrich and D. Soukal, Matrix embedding for large payloads, Proceedings of the SPIE 6072 (2006), 727–738. CR - [6] O. Kurtuldu ve N. Arıca, ¨ ˙Imge kareleri kullanan yeni bir steganografi y¨ontemi, Journal of Naval Science and Engineering 5 (2009), 107–118. CR - [7] D. C. Wu and W. H. Tsai, A steganographic method for images by pixel-value differencing, Pattern Recognition Letters 24 (2003), 1613–1626. CR - [8] C. M. Wang, N. I. Wu, C. S. Tsaib and M. S. Hwang, A high quality steganographic method with pixel-value differencing and modulus function, Journal of Systems and Software 81 (2008), 150–158. CR - [9] B. Li, J. He, J. Huang and Y. Q. Shi, A survey on image steganography and steganalysis, Journal of Information Hiding and Multimedia Signal Processing 2 (2011), 142–172. CR - [10] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, Information hiding: A survey, Proceedings of the IEEE 87 (1999), 1062–78. CR - [11] H. K. Pan, Y. Y. Chen and Y. C. Tseng, A secure data hiding scheme for two-color images, Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 750–755. CR - [12] N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding: Steganography and Watermarking - Attacks and Countermeasures, Kluwer Academic Publishers, 2000. CR - [13] D. Artz, Digital steganography: hiding data within data, Internet Computing 5 (2001), 75–80. CR - [14] A. S¸ahin, G¨or¨unt¨u Steganografide Kullanılan Yeni Metodlar ve Bu Metodların G¨uvenilirlikleri, Doktora Tezi, Trakya Universitesi, Edirne 2007. CR - [15] ShantalaSureh and Vishvanath, Edge-steganography for secure communication, TENCON 2006, IEEE Region 10 Conference (2006), 1–4. CR - [16] Kh. M. Singh, L. S. Singh, A. B. Singh and Kh. S. Devi, Hiding secret message in edges of the images, International Conference on Information and Communication Technology (ICICT 2007) (2007), 238–241. CR - [17] A. D. Ker, Quantitative evaluation of pairs and RS steganalysis, Proceedings of the SPIE 5306 (2004), 83–95. UR - https://dergipark.org.tr/en/pub/cankujse/article/368988 L1 - https://dergipark.org.tr/en/download/article-file/387475 ER -