Image steganography based on LSB substitution and encryption method: adaptive LSB+3

被引:19
|
作者
Solak, Serdar [1 ]
Altinisik, Umut [1 ]
机构
[1] Kocaeli Univ, Informat Dept, Kocaeli, Turkey
关键词
steganography; LSB; adaptive LSB+3; security; data hiding; LEAST-SIGNIFICANT-BIT;
D O I
10.1117/1.JEI.28.4.043025
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The goals of image steganography are to simultaneously reach maximum embedding capacity, enhanced embedding efficiency, better image quality, and more security. We present a two-step data hiding method that improves image quality, capacity, and embedding efficiency, and also provides stego security. In the first step of the proposed method, the hidden data are encrypted with the key words and shifting method to provide security. In the second stage, we propose adaptive least-significant-bit (LSB)+3 type I and adaptive LSB+3 type II methods to hide encrypted data in the cover image. The image quality of the stego image obtained from the proposed adaptive LSB+3 method is better than the traditional three-bit LSB methods. When maximum data are embedded in the cover image, a peak signal-to-noise ratio (PSNR) greater than 41 dB is reached. Experimental studies show that adaptive LSB+3 type I and adaptive LSB+3 type II methods are higher PSNR values (3.48% and 5.73%) than the standard three-bit LSB substitution methods. (C) 2019 SPIE and IS&T
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Image Steganography Based on Modified LSB Substitution Method and Data Mapping
    Dhar, Pranab Kumar
    Kaium, Abdul
    Shimamura, Tetsuya
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (03): : 155 - 160
  • [2] CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method
    Khan Muhammad
    Jamil Ahmad
    Naeem Ur Rehman
    Zahoor Jan
    Muhammad Sajjad
    [J]. Multimedia Tools and Applications, 2017, 76 : 8597 - 8626
  • [3] CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method
    Muhammad, Khan
    Ahmad, Jamil
    Rehman, Naeem Ur
    Jan, Zahoor
    Sajjad, Muhammad
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (06) : 8597 - 8626
  • [4] Design of Image Steganography using LSB XOR Substitution Method
    Arun, Chandni
    Murugan, Senthil
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 674 - 677
  • [5] Secure RGB image steganography based on modified LSB substitution
    Almazaydeh, Laiali
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2020, 12 (04) : 453 - 457
  • [6] Image Steganography Using LSB and Hybrid Encryption Algorithms
    Alanzy, May
    Alomrani, Razan
    Alqarni, Bashayer
    Almutairi, Saad
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (21):
  • [7] A Novel Image Steganography Method Based on DCT and LSB
    Sheidaee, Ali
    Farzinvash, Leili
    [J]. 2017 9TH INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT 2017), 2017, : 116 - 123
  • [8] Dual Image based LSB Steganography
    Maji, Giridhar
    Mandal, Sharmistha
    Sen, Soumya
    Debnath, Narayan C.
    [J]. PROCEEDINGS OF 2018 2ND INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN SIGNAL PROCESSING, TELECOMMUNICATIONS & COMPUTING (SIGTELCOM 2018), 2018, : 61 - 66
  • [9] Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption
    Juneja, Mamta
    Sandhu, Parvinder Singh
    [J]. 2009 INTERNATIONAL CONFERENCE ON ADVANCES IN RECENT TECHNOLOGIES IN COMMUNICATION AND COMPUTING (ARTCOM 2009), 2009, : 302 - 305
  • [10] An LSB Substitution with Bit Inversion Steganography Method
    Akhtar, Nadeem
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS (ICACNI 2015), VOL 1, 2016, 43 : 515 - 521