Research Article
BibTex RIS Cite
Year 2018, Volume: 8 Issue: 2, 1543 - 1553, 16.04.2018

Abstract

References

  • References [1] R. J. Anderson and F. A. P. Petitcolas, "On the Limits of Steganography," IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 474 - 481, 1998. [2] Petitcolas, F. A. P. R. J. Anderson and M. G. Kuhn, "Information Hiding - A Survey," Proceedings of the IEEE, vol. 87, no. 7, pp. 1062 - 1078, 1999. [3] L. M. Marvel, C. G. Boncelet and C. T. Retter, "Spread Spectrum Image Steganography," IEEE Transactions on Image Processing, vol. 8, no. 8, pp. 1075 - 1083, 1999. [4] N. Nikolaidis and I. Pitas, "Digital Image Watermarking: an Overview," in Proceedings IEEE International Conference on Multimedia Computing and Systems, 1999. [5] N. F. Johnson and S. Jajodia, "Exploring Steganography: Seeing the Unseen," IEEE, Computer , vol. 31, no. 2, pp. 313 - 336, 1998. [6] W. Bender, D. Gruhl, N. Morimoto and A. Lu, "Techniques for data hiding," IBM Systems Journal, vol. 35, no. 3.4, pp. 313 - 336, 1996. [7] G. L. Smitha and E. Baburaj, "A Survey on Image Steganography Based on Least Significant Bit Matched Revisited (LSBMR) Algorithm," in International Conference on Emerging Technological Trends (ICETT) , 2016. [8] T. Shelare and V. Powar, "A Secure Data Transmission Approach Using B+trees In Steganography," in International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), 2016. [9] J. Kumar, "A Novel Approach to Image Steganography using Quadtree Partition," in 2nd International Conference on Next Generation Computing Technologies (NGCT), 2016. [10] A. Abuadbba and I. Khalil, "Walsh-Hadamard Based 3D Steganography for Protecting Sensitive Information in Point-of-Care," IEEE Transactions on Biomedical Engineering, vol. 64, no. 9, pp. 2186 - 2195, 2017. [11] V. Sharon, B. Karthikeyan, S. Chakravarthy and V. Vaithiyanathan, "Stego Pi : An Automated Security Module for Text and Image Steganography using Raspberry Pi," in International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), 2016. [12] A. A. J. Altaay, S. b. Sahib and M. Zamani, "An Introduction to Image Steganography Techniques," in International Conference on Advanced Computer Science Applications and Technologies (ACSAT), 2012. [13] M. Kude and M. Borse, "Skintone Detection Based Steganography Using Wavelet Transform," in International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), 2016. [14] J. Fridrich, M. Goljan and R. Du, "Detecting LSB Steganography in Color and Gray-Scale Images," IEEE MultiMedia, vol. 8, no. 4, pp. 22 - 28, 2001.

Least Significant Bit Gaped: A New Method for Image Steganography

Year 2018, Volume: 8 Issue: 2, 1543 - 1553, 16.04.2018

Abstract

Abstract - Steganography is an information security technique that provides a solution for hiding information. There are different
types of cover mediums that can be used in steganography such as text or image steganography. We chose image steganography
as our domain of work where the images are used as cover mediums to be our basis of experiments for the proposed LSBG method.
One of the main well-known steganography methods is the least significant bit (LSB), however it has its limitations and therefore
many approaches have been proposed to improve it. We propose a new improvement method defined as Least Significant Bit
Gaped (LSBG) where the aim is to improve steganography imperceptibility compared to LSB by comparing the histogram analysis
of LSB with LSBG methods and MSE measures. The proposed LSBG method will also offer a new key structure that will increase
the complexity in secret data extraction and the level of information security.

References

  • References [1] R. J. Anderson and F. A. P. Petitcolas, "On the Limits of Steganography," IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 474 - 481, 1998. [2] Petitcolas, F. A. P. R. J. Anderson and M. G. Kuhn, "Information Hiding - A Survey," Proceedings of the IEEE, vol. 87, no. 7, pp. 1062 - 1078, 1999. [3] L. M. Marvel, C. G. Boncelet and C. T. Retter, "Spread Spectrum Image Steganography," IEEE Transactions on Image Processing, vol. 8, no. 8, pp. 1075 - 1083, 1999. [4] N. Nikolaidis and I. Pitas, "Digital Image Watermarking: an Overview," in Proceedings IEEE International Conference on Multimedia Computing and Systems, 1999. [5] N. F. Johnson and S. Jajodia, "Exploring Steganography: Seeing the Unseen," IEEE, Computer , vol. 31, no. 2, pp. 313 - 336, 1998. [6] W. Bender, D. Gruhl, N. Morimoto and A. Lu, "Techniques for data hiding," IBM Systems Journal, vol. 35, no. 3.4, pp. 313 - 336, 1996. [7] G. L. Smitha and E. Baburaj, "A Survey on Image Steganography Based on Least Significant Bit Matched Revisited (LSBMR) Algorithm," in International Conference on Emerging Technological Trends (ICETT) , 2016. [8] T. Shelare and V. Powar, "A Secure Data Transmission Approach Using B+trees In Steganography," in International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), 2016. [9] J. Kumar, "A Novel Approach to Image Steganography using Quadtree Partition," in 2nd International Conference on Next Generation Computing Technologies (NGCT), 2016. [10] A. Abuadbba and I. Khalil, "Walsh-Hadamard Based 3D Steganography for Protecting Sensitive Information in Point-of-Care," IEEE Transactions on Biomedical Engineering, vol. 64, no. 9, pp. 2186 - 2195, 2017. [11] V. Sharon, B. Karthikeyan, S. Chakravarthy and V. Vaithiyanathan, "Stego Pi : An Automated Security Module for Text and Image Steganography using Raspberry Pi," in International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), 2016. [12] A. A. J. Altaay, S. b. Sahib and M. Zamani, "An Introduction to Image Steganography Techniques," in International Conference on Advanced Computer Science Applications and Technologies (ACSAT), 2012. [13] M. Kude and M. Borse, "Skintone Detection Based Steganography Using Wavelet Transform," in International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), 2016. [14] J. Fridrich, M. Goljan and R. Du, "Detecting LSB Steganography in Color and Gray-Scale Images," IEEE MultiMedia, vol. 8, no. 4, pp. 22 - 28, 2001.
There are 1 citations in total.

Details

Primary Language English
Journal Section Articles
Authors

Waleed Tuza This is me

N. Gökhan Kasapoğlu This is me

Publication Date April 16, 2018
Published in Issue Year 2018 Volume: 8 Issue: 2

Cite

APA Tuza, W., & Kasapoğlu, N. G. (2018). Least Significant Bit Gaped: A New Method for Image Steganography. International Journal of Electronics Mechanical and Mechatronics Engineering, 8(2), 1543-1553.