DLSB- The distanced least significant bit steganography

被引:0
|
作者
Baysan, Burak [1 ]
Ozekes, Serhat [2 ]
机构
[1] Uskudar Univ, Inst Dependence & Forens Sci, Dept Forens Sci, TR-34662 Istanbul, Turkiye
[2] Uskudar Univ, Engn Fac, Dept Comp Engn, TR-34662 Istanbul, Turkiye
关键词
Steganography; lsb; dlsb; secret;
D O I
10.17341/gazimmfd.1058824
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Today, LSB (Least Significant Bit) method is still used in many corporate, commercial and personal steganography tools that hide messages in 24-bit, 8-bit color and gray-scale images. The reason why this method is often preferred is that it can be applied very easily and it allows a very large message storage capacity. However, Pixel Attack, which can be easily applied against the LSB method and visualizes the traces of the embedded message, maintains its place in the literature and in the steganalist's toolbox. In this study, instead of continuous message bit placement used in LSB method, DLSB (Distanced Least Significant Bit) - Removed Most Significant Bit Steganography, which is a basic method that uses proportional distance message bit placement and is resistant to Pixel Attack, is proposed. Theory and Methods: With DLSB, it is used to place the message in the image with a proportional distribution / spacing, depending on the size of the message and the image. of the picture is replaced with the binary equivalent of the.((SIC))value. This is different from the LSB method, in which the distance between each message bit and the previous / next message bit is placed in the picture instead of the message size. Conclusion: Steganography performed on Bitmap image files with LSB method cannot resist Pixel Attack. Other steganography methods, which rely on compressing the message with various compression methods, are also affected by this attack. The DLSB method presented in this study applies a simple proportional distribution of message bits into the image. In the Pixel Attack, it was observed that the message was not piled up in a certain area in the image. DLSB is the first method to protect against Pixel Attack against LSB method. In addition, when DSLB and a compression method are used together, it has been observed that successful results are obtained in Peak Signal-to-Noise Ratio, R.S., Chi-Square, Sample of Pairs and Primary Sets analyzes.
引用
收藏
页码:1725 / 1735
页数:11
相关论文
共 50 条
  • [1] Least significant bit-steganography detection using least significant bit plane smoothness
    Munirajan, VK
    Cole, E
    Ring, S
    PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, 2004, : 666 - 671
  • [2] Undetectable least significant bit replacement steganography
    Shreelekshmi, R.
    Wilscy, M.
    Madhavan, C. E. Veni
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (08) : 10565 - 10582
  • [3] Undetectable least significant bit replacement steganography
    R. Shreelekshmi
    M. Wilscy
    C. E. Veni Madhavan
    Multimedia Tools and Applications, 2019, 78 : 10565 - 10582
  • [4] Mobile Base Least Significant Bit Method for Steganography
    Malo, Fransiskus Xaverius Kurniawan
    Santoso, Albertus Joko
    Pranowo
    ADVANCED SCIENCE LETTERS, 2017, 23 (03) : 2223 - 2227
  • [5] Image Steganography - Least Significant Bit with Multiple Progressions
    Goel, Savita
    Gupta, Shilpi
    Kaushik, Nisha
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 105 - 112
  • [6] Efficient steganography using least significant bit And encryption technique
    Sugandhi, G.
    Subha, C. P.
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [7] Image Steganography and Steganalysis Based on Least Significant Bit (LSB)
    Rachael, Olomo
    Misra, Sanjay
    Ahuja, Ravin
    Adewumi, Adewole
    Ayeni, Foluso
    Mmaskeliunas, Rytis
    PROCEEDINGS OF ICETIT 2019: EMERGING TRENDS IN INFORMATION TECHNOLOGY, 2020, 605 : 1100 - 1111
  • [8] Hybrid curvelet transform and least significant bit for image steganography
    Mostafa, Reba
    Ali, Ahmed Fouad
    El Taweal, Ghada
    2015 IEEE SEVENTH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INFORMATION SYSTEMS (ICICIS), 2015, : 300 - 305
  • [9] Implementation of Least Significant Bit Image Steganography with Advanced Encryption Standard
    Pabbi, Adit
    Malhotra, Rakshit
    Manikandan, K.
    2021 INTERNATIONAL CONFERENCE ON EMERGING SMART COMPUTING AND INFORMATICS (ESCI), 2021, : 363 - 366
  • [10] Multibit Least Significant Bit Matching: A Novel Approach to Image Steganography
    Essa, Almabrok
    Wu, Ian
    MULTIMODAL IMAGE EXPLOITATION AND LEARNING 2024, 2024, 13033