An Improved Image Steganography Method Based on LSB Technique with Random Pixel Selection

被引:0
|
作者
Emam, Marwa M. [1 ]
Aly, Abdelmgeid A. [1 ]
Omara, Fatma A. [2 ]
机构
[1] Menia Univ, Dept Comp Sci, Al Minya, Egypt
[2] Cairo Univ, Dept Comp Sci, Cairo, Egypt
关键词
Image Steganography; PRNG (Pseudorandom Number Generator); Peak Signal-to-Noise Rate (PSNR); Mean Square Error (MSE);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
with the rapid advance in digital network, information technology, digital libraries, and particularly World Wide Web services, many kinds of information could be retrieved any time. Thus, the security issue has become one of the most significant problems for distributing new information. It is necessary to protect this information while passing over insecure channels. Steganography introduces a strongly approach to hide the secret data in an appropriate media carriers such as images, audio files, text files, and video files. In this paper, a new image steganography method based on spatial domain is proposed. According to the proposed method, the secret message is embedded randomly in the pixel location of the cover image using Pseudo Random Number Generator (PRNG) of each pixel value of the cover image instead of embedding sequentially in the pixels of the cover image. This randomization is expected to increase the security of the system. The proposed method works with two layers (Blue and Green), as (2-1-2) layer, and the byte of the message will be embedded in three pixels only in this form (3-2-3). From the experimental results, it has found that the proposed method achieves a very high Maximum Hiding Capacity (MHC), and higher visual quality as indicated by the Peak Signal-to-Noise Ratio (PSNR).
引用
收藏
页码:361 / 366
页数:6
相关论文
共 50 条
  • [1] An Improved LSB Embedding Technique for Image Steganography
    Sugathan, Sherin
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 609 - 612
  • [2] An Improved LSB based Image Steganography Technique for RGB Images
    Singh, Amritpal
    Singh, Harpal
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES, 2015,
  • [3] Cover Image Selection Technique for Secured LSB-based Image Steganography
    Molato, Mark Rennel D.
    Gerardo, Bobby D.
    [J]. 2018 INTERNATIONAL CONFERENCE ON ALGORITHMS, COMPUTING AND ARTIFICIAL INTELLIGENCE (ACAI 2018), 2018,
  • [4] Chaotic map based random image steganography using LSB technique
    Rajendran S.
    Doraipandian M.
    [J]. International Journal of Network Security, 2017, 19 (04) : 593 - 598
  • [5] An Improved Method for LSB Based Color Image steganography Combined with Cryptography
    Zhou, Xinyi
    Gong, Wei
    Fu, WenLong
    Jin, LianJing
    [J]. 2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 1339 - 1342
  • [6] Detection of random LSB image Steganography
    Zhi, L
    Fen, SA
    [J]. VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 2113 - 2117
  • [7] An adaptive color image steganography method using adjacent pixel value differencing and LSB substitution technique
    Kalita, Manashee
    Tuithung, Themrichon
    Majumder, Swanirbhar
    [J]. CRYPTOLOGIA, 2019, 43 (05) : 414 - 437
  • [8] A Weighted Location Based LSB Image Steganography Technique
    Nag, Amitava
    Singh, Jyoti Prakash
    Khan, Srabani
    Ghosh, Saswati
    Biswas, Sushanta
    Sarkar, D.
    Sarkar, Partha Pratim
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 620 - 627
  • [9] An Improved Inverted LSB Image Steganography
    Akhtar, Nadeem
    Khan, Shahbaaz
    Johri, Pragati
    [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 749 - 755
  • [10] Adaptive Image Steganography Based on Pixel Selection
    Shen, Qingqing
    Liu, Guangjie
    Liu, Weiwei
    Dai, Yuewei
    [J]. PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATCS AND COMPUTING (IEEE PIC), 2015, : 623 - 627