Research Article
BibTex RIS Cite

İmge İçine Bilgi Gizlemede Kullanılan LSB Yöntemlerinin Karşılaştırması

Year 2013, Volume: 10 Issue: 1, - , 01.05.2013

Abstract

Digital image steganography techniques deal with three subjects lossy/lossless
compressed images, uncompressed images. Steganography techniques embed secret data
pixel directly into uncompressed and lossless compressed cover images. The most popular
data hiding method is, changing pixels’ left most digits or last two, known as Least
Significant Bit (LSB). Lossless image formats like .bmp, .png, and 8-bit gray-scale .gif are
usable for LSB methods. LSB embedding method is not usable for palette images because
of changing just last bit of a pixel causes a big difference on image. After embedding all of
secret message to palette image, Human Visual System (HVS) can detect manipulations
on image. In this study, we compare some of the most popular LSB techniques; Chan’s
algorithm [3], 2/3 efficient embedding [4], matrix embedding for large payloads [5], image
blocks method [6] and pixel-value differencing method [7]-[8].

References

  • 1] N. F. Johnson and S. Katzenbeisser, A survey of steganographic techniques, in: Information Hiding Techniques for Steganography and Digital Watermarking (eds. S. Katzenbeisser and F. A. P. Petitcolas), Artech House Books (2000), 43–78.
  • [2] J. Mielikainen, LSB matching revisited, IEEE Signal Processing Letters 13 (2006), 285–287.
  • [3] C. S. Chan, On using LSB matching function for data hiding in pixels, Fundamenta Informaticae 96 (2009), 49–59.
  • [4] A. D. Ker, Information hiding and covert communication, www.sti.uniurb.it/events/ fosad08/slides/ker-slides-part2.pdf. Online; accessed 26-February-2013.
  • [5] J. Fridrich and D. Soukal, Matrix embedding for large payloads, Proceedings of the SPIE 6072 (2006), 727–738.
  • [6] O. Kurtuldu ve N. Arıca, ¨ ˙Imge kareleri kullanan yeni bir steganografi y¨ontemi, Journal of Naval Science and Engineering 5 (2009), 107–118.
  • [7] D. C. Wu and W. H. Tsai, A steganographic method for images by pixel-value differencing, Pattern Recognition Letters 24 (2003), 1613–1626.
  • [8] C. M. Wang, N. I. Wu, C. S. Tsaib and M. S. Hwang, A high quality steganographic method with pixel-value differencing and modulus function, Journal of Systems and Software 81 (2008), 150–158.
  • [9] B. Li, J. He, J. Huang and Y. Q. Shi, A survey on image steganography and steganalysis, Journal of Information Hiding and Multimedia Signal Processing 2 (2011), 142–172.
  • [10] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, Information hiding: A survey, Proceedings of the IEEE 87 (1999), 1062–78.
  • [11] H. K. Pan, Y. Y. Chen and Y. C. Tseng, A secure data hiding scheme for two-color images, Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 750–755.
  • [12] N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding: Steganography and Watermarking - Attacks and Countermeasures, Kluwer Academic Publishers, 2000.
  • [13] D. Artz, Digital steganography: hiding data within data, Internet Computing 5 (2001), 75–80.
  • [14] A. S¸ahin, G¨or¨unt¨u Steganografide Kullanılan Yeni Metodlar ve Bu Metodların G¨uvenilirlikleri, Doktora Tezi, Trakya Universitesi, Edirne 2007.
  • [15] ShantalaSureh and Vishvanath, Edge-steganography for secure communication, TENCON 2006, IEEE Region 10 Conference (2006), 1–4.
  • [16] Kh. M. Singh, L. S. Singh, A. B. Singh and Kh. S. Devi, Hiding secret message in edges of the images, International Conference on Information and Communication Technology (ICICT 2007) (2007), 238–241.
  • [17] A. D. Ker, Quantitative evaluation of pairs and RS steganalysis, Proceedings of the SPIE 5306 (2004), 83–95.
Year 2013, Volume: 10 Issue: 1, - , 01.05.2013

Abstract

References

  • 1] N. F. Johnson and S. Katzenbeisser, A survey of steganographic techniques, in: Information Hiding Techniques for Steganography and Digital Watermarking (eds. S. Katzenbeisser and F. A. P. Petitcolas), Artech House Books (2000), 43–78.
  • [2] J. Mielikainen, LSB matching revisited, IEEE Signal Processing Letters 13 (2006), 285–287.
  • [3] C. S. Chan, On using LSB matching function for data hiding in pixels, Fundamenta Informaticae 96 (2009), 49–59.
  • [4] A. D. Ker, Information hiding and covert communication, www.sti.uniurb.it/events/ fosad08/slides/ker-slides-part2.pdf. Online; accessed 26-February-2013.
  • [5] J. Fridrich and D. Soukal, Matrix embedding for large payloads, Proceedings of the SPIE 6072 (2006), 727–738.
  • [6] O. Kurtuldu ve N. Arıca, ¨ ˙Imge kareleri kullanan yeni bir steganografi y¨ontemi, Journal of Naval Science and Engineering 5 (2009), 107–118.
  • [7] D. C. Wu and W. H. Tsai, A steganographic method for images by pixel-value differencing, Pattern Recognition Letters 24 (2003), 1613–1626.
  • [8] C. M. Wang, N. I. Wu, C. S. Tsaib and M. S. Hwang, A high quality steganographic method with pixel-value differencing and modulus function, Journal of Systems and Software 81 (2008), 150–158.
  • [9] B. Li, J. He, J. Huang and Y. Q. Shi, A survey on image steganography and steganalysis, Journal of Information Hiding and Multimedia Signal Processing 2 (2011), 142–172.
  • [10] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, Information hiding: A survey, Proceedings of the IEEE 87 (1999), 1062–78.
  • [11] H. K. Pan, Y. Y. Chen and Y. C. Tseng, A secure data hiding scheme for two-color images, Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 750–755.
  • [12] N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding: Steganography and Watermarking - Attacks and Countermeasures, Kluwer Academic Publishers, 2000.
  • [13] D. Artz, Digital steganography: hiding data within data, Internet Computing 5 (2001), 75–80.
  • [14] A. S¸ahin, G¨or¨unt¨u Steganografide Kullanılan Yeni Metodlar ve Bu Metodların G¨uvenilirlikleri, Doktora Tezi, Trakya Universitesi, Edirne 2007.
  • [15] ShantalaSureh and Vishvanath, Edge-steganography for secure communication, TENCON 2006, IEEE Region 10 Conference (2006), 1–4.
  • [16] Kh. M. Singh, L. S. Singh, A. B. Singh and Kh. S. Devi, Hiding secret message in edges of the images, International Conference on Information and Communication Technology (ICICT 2007) (2007), 238–241.
  • [17] A. D. Ker, Quantitative evaluation of pairs and RS steganalysis, Proceedings of the SPIE 5306 (2004), 83–95.
There are 17 citations in total.

Details

Subjects Engineering
Journal Section Articles
Authors

Nurdan Saran

Cem Olcay This is me

Publication Date May 1, 2013
Published in Issue Year 2013 Volume: 10 Issue: 1

Cite

APA Saran, N., & Olcay, C. (2013). İmge İçine Bilgi Gizlemede Kullanılan LSB Yöntemlerinin Karşılaştırması. Cankaya University Journal of Science and Engineering, 10(1).
AMA Saran N, Olcay C. İmge İçine Bilgi Gizlemede Kullanılan LSB Yöntemlerinin Karşılaştırması. CUJSE. May 2013;10(1).
Chicago Saran, Nurdan, and Cem Olcay. “İmge İçine Bilgi Gizlemede Kullanılan LSB Yöntemlerinin Karşılaştırması”. Cankaya University Journal of Science and Engineering 10, no. 1 (May 2013).
EndNote Saran N, Olcay C (May 1, 2013) İmge İçine Bilgi Gizlemede Kullanılan LSB Yöntemlerinin Karşılaştırması. Cankaya University Journal of Science and Engineering 10 1
IEEE N. Saran and C. Olcay, “İmge İçine Bilgi Gizlemede Kullanılan LSB Yöntemlerinin Karşılaştırması”, CUJSE, vol. 10, no. 1, 2013.
ISNAD Saran, Nurdan - Olcay, Cem. “İmge İçine Bilgi Gizlemede Kullanılan LSB Yöntemlerinin Karşılaştırması”. Cankaya University Journal of Science and Engineering 10/1 (May 2013).
JAMA Saran N, Olcay C. İmge İçine Bilgi Gizlemede Kullanılan LSB Yöntemlerinin Karşılaştırması. CUJSE. 2013;10.
MLA Saran, Nurdan and Cem Olcay. “İmge İçine Bilgi Gizlemede Kullanılan LSB Yöntemlerinin Karşılaştırması”. Cankaya University Journal of Science and Engineering, vol. 10, no. 1, 2013.
Vancouver Saran N, Olcay C. İmge İçine Bilgi Gizlemede Kullanılan LSB Yöntemlerinin Karşılaştırması. CUJSE. 2013;10(1).