Dual Image based LSB Steganography

被引:0
|
作者
Maji, Giridhar [1 ]
Mandal, Sharmistha [2 ]
Sen, Soumya [3 ]
Debnath, Narayan C. [4 ]
机构
[1] Asansol Polytech, Dept Elect Engn, Asansol, India
[2] Univ Calcutta, Dept Comp Sci & Engn, Kolkata, India
[3] Univ Calcutta, AK Choudhury Sch Informat Technol, Kolkata, India
[4] Int Soc Comp & Their Applicat, Winona, MN 55987 USA
关键词
dual image; lsb steganography; reference image; dictionary word indexing; block code based encoding; SUBSTITUTION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A new steganographic model using dual image has been proposed to increase the obscurity of the secret as well as to make it more secure. It uses two different images namely reference image and cover image along with a secret embed key ( stego key). Reference image is divided into blocks with assigned block-codes. Total number of blocks and other embedding parameters(block traversing direction, starting block etc.) are stored in the embed key. Secret message converted to binary and bit pairs are made. Bit pairs of secret message are encoded using the bit pairs of different blocks of reference image and sometimes updating a few LSB bits in the reference image. As an optional capacity enhancement module for text only secret messages dictionary word indexing based encoding is applied. Finally encoded bit stream is embedded into the cover image using any standard LSB technique with its own merits and demerits. LSB changes in the reference image are almost negligible. Embedding key is encrypted using public key of the receiver hence even if someone gets the encoded message it is not possible to get the secret message. As this model can use any existing LSB replacement scheme to embed encoded message into the cover image the state of the art security and other quality features are by default available to it. This is made more secure by using different dictionary word indexing scheme every time based on a random secret key that is appended in the embed key.
引用
收藏
页码:61 / 66
页数:6
相关论文
共 50 条
  • [1] An analysis of LSB Based Image Steganography Techniques
    Thangadurai, K.
    Devi, G. Sudha
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,
  • [2] LSB Based Quantum Image Steganography Algorithm
    Jiang, Nan
    Zhao, Na
    Wang, Luo
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2016, 55 (01) : 107 - 123
  • [3] Detection of LSB steganography based on image smoothness*
    Zhang, Tao
    Zhang, Yan
    Ping, Xijian
    Song, Mingwu
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO - ICME 2006, VOLS 1-5, PROCEEDINGS, 2006, : 1377 - +
  • [4] Analysis of LSB based image steganography techniques
    Chandramouli, R
    Memon, N
    [J]. 2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2001, : 1019 - 1022
  • [5] LSB Based Quantum Image Steganography Algorithm
    Nan Jiang
    Na Zhao
    Luo Wang
    [J]. International Journal of Theoretical Physics, 2016, 55 : 107 - 123
  • [6] Image and audio steganography based on indirect LSB
    Sultani, Zainab N.
    Dhannoon, Ban N.
    [J]. KUWAIT JOURNAL OF SCIENCE, 2021, 48 (04)
  • [7] LSB Technique-Based Dual-Image Steganography Using COS Function
    Jan, Aiman
    Parah, Shabir A.
    Hussan, Muzamil
    Malik, Bilal A.
    [J]. PROCEEDINGS OF EMERGING TRENDS AND TECHNOLOGIES ON INTELLIGENT SYSTEMS (ETTIS 2021), 2022, 1371 : 243 - 249
  • [8] A Novel Quantum Image Steganography Scheme Based on LSB
    Zhou, Ri-Gui
    Luo, Jia
    Liu, XingAo
    Zhu, Changming
    Wei, Lai
    Zhang, Xiafen
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2018, 57 (06) : 1848 - 1863
  • [9] A Novel Quantum Image Steganography Scheme Based on LSB
    Ri-Gui Zhou
    Jia Luo
    XingAo Liu
    Changming Zhu
    Lai Wei
    Xiafen Zhang
    [J]. International Journal of Theoretical Physics, 2018, 57 : 1848 - 1863
  • [10] A Novel Image Steganography Method Based on DCT and LSB
    Sheidaee, Ali
    Farzinvash, Leili
    [J]. 2017 9TH INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT 2017), 2017, : 116 - 123