DLSB- The distanced least significant bit steganography

被引:0
|
作者
Baysan, Burak [1 ]
Ozekes, Serhat [2 ]
机构
[1] Uskudar Univ, Inst Dependence & Forens Sci, Dept Forens Sci, TR-34662 Istanbul, Turkiye
[2] Uskudar Univ, Engn Fac, Dept Comp Engn, TR-34662 Istanbul, Turkiye
关键词
Steganography; lsb; dlsb; secret;
D O I
10.17341/gazimmfd.1058824
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Today, LSB (Least Significant Bit) method is still used in many corporate, commercial and personal steganography tools that hide messages in 24-bit, 8-bit color and gray-scale images. The reason why this method is often preferred is that it can be applied very easily and it allows a very large message storage capacity. However, Pixel Attack, which can be easily applied against the LSB method and visualizes the traces of the embedded message, maintains its place in the literature and in the steganalist's toolbox. In this study, instead of continuous message bit placement used in LSB method, DLSB (Distanced Least Significant Bit) - Removed Most Significant Bit Steganography, which is a basic method that uses proportional distance message bit placement and is resistant to Pixel Attack, is proposed. Theory and Methods: With DLSB, it is used to place the message in the image with a proportional distribution / spacing, depending on the size of the message and the image. of the picture is replaced with the binary equivalent of the.((SIC))value. This is different from the LSB method, in which the distance between each message bit and the previous / next message bit is placed in the picture instead of the message size. Conclusion: Steganography performed on Bitmap image files with LSB method cannot resist Pixel Attack. Other steganography methods, which rely on compressing the message with various compression methods, are also affected by this attack. The DLSB method presented in this study applies a simple proportional distribution of message bits into the image. In the Pixel Attack, it was observed that the message was not piled up in a certain area in the image. DLSB is the first method to protect against Pixel Attack against LSB method. In addition, when DSLB and a compression method are used together, it has been observed that successful results are obtained in Peak Signal-to-Noise Ratio, R.S., Chi-Square, Sample of Pairs and Primary Sets analyzes.
引用
收藏
页码:1725 / 1735
页数:11
相关论文
共 50 条
  • [31] An Improved Approach of Image Steganography Based on Least Significant Bit Technique for Secure Communication in Cloud
    Alam, Md. Khorshed
    Nushrat, Samia
    Patwary, Md. Amir Hamza
    Ullah, Ahsan
    Robin, Kazi Hassan
    ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2022, PT I, 2023, 1797 : 215 - 233
  • [32] High Security Data Hiding Using Image Cropping and LSB Least Significant Bit Steganography
    Al-Afandy, Khalid A.
    El-Rabaie, El-Sayed
    Faragallah, Osama S.
    Elmhalawy, Ahmed
    El-Banby, Gh. M.
    2016 4TH IEEE INTERNATIONAL COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST), 2016, : 400 - 404
  • [34] Steganography for Inserting Message on Digital Image Using Least Significant Bit and AES Cryptographic Algorithm
    Nurhavati
    Ahmad, Syukri Sayyid
    2016 4TH INTERNATIONAL CONFERENCE ON CYBER AND IT SERVICE MANAGEMENT, 2016, : 25 - 30
  • [35] Steganography Based on Least Significant Bit Method was designed for Digital Image with Lossless Compression Technique
    Wiryawan, I. Gede
    Sariyasa
    Gunadi, I. Gede Aris
    2018 INTERNATIONAL CONFERENCE ON SIGNALS AND SYSTEMS (ICSIGSYS), 2018, : 98 - 102
  • [36] Robust Method for Embedding an Image Inside Cover Image Based on Least Significant Bit Steganography
    Almola S.A.S.
    Qasim N.H.
    Ali Abed Alasadi H.
    Informatica (Slovenia), 2022, 46 (09): : 53 - 60
  • [37] Cross correlation feature mining for steganalysis of hash based least significant bit substitution video steganography
    Fan, MingQuan
    Liu, PeiPei
    Wang, HongXia
    Sun, XingMing
    TELECOMMUNICATION SYSTEMS, 2016, 63 (04) : 523 - 529
  • [38] Enhanced Least Significant Bit Replacement Algorithm in Spatial Domain of Steganography Using Character Sequence Optimization
    Jayapandiyan, Jagan Raj
    Kavitha, C.
    Sakthivel, K.
    IEEE ACCESS, 2020, 8 : 136537 - 136545
  • [39] A New Method to Estimate Peak Signal to Noise Ratio for Least Significant Bit Modification Audio Steganography
    Azam, Muhammad Harith Noor
    Ridzuan, Farida
    Sayuti, M. Norazizi Sham Mohd
    PERTANIKA JOURNAL OF SCIENCE AND TECHNOLOGY, 2022, 30 (01): : 497 - 511
  • [40] An Improved Steganography Method Based on Least-Significant-Bit Substitution and Pixel-Value Differencing
    Liu, Hsing-Han
    Su, Pin-Chang
    Hsu, Meng-Hua
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (11) : 4537 - 4556