Improving Data Security Using Modified LSB-Based Image Steganography Technique

Maryam Juma AlSinani, Ahmad Kayed, Ghaliya Al Farsi

Abstract

This research improves the Savitha Bhallamudi technique by randomizing the hiding places of bits in the cover image. To enable the main quality characteristics of the image, the following steganography algorithms were used: hiding capacity, perceptual transparency, robustness, and resistance against attack. This method, using the Savitha technique, is based on the least significant bit (LSB) system. The LSB system involves sequentially hiding secret data in the LSB of the image. The main idea of the proposed method is to enhance security by embedding the bits in an image randomly, depending on the value of different bytes of the original (cover) image. This methodology was developed in stages, with the first process hiding data randomly in the images by checking the first byte of the original image only. The second process goes through some bytes in the cover image and hides data based on the value of these bytes. With this new method, results were tested on a sample of ten images. The evaluation of the effectiveness of this method’s experimental results was confirmed by using the calculations of two metrics: mean squared error (MSE) and peak signal-to-noise ratio (PSNR). The achievement of better outcomes from the proposed method could improve the results of MSE, provide better visual quality (PSNR), and be used for comparison to the original Savitha method. The new results reveal the improvement of the amount of randomness that can reduce the level of capacity and enhance security (MSE average is 27.8 using the Savitha technique; MSE is 21.1 using the first enhanced method). The new results further illustrate that steganography performed by random bits-hiding is less prone to attack compared to sequence embedding as it is difficult to recognize the pattern used in hiding the secret message.



Keywords: security, steganography, least significant bit, image, randomness


Full Text:

PDF


References


DAGAR E, DAGAR S. LSB based image steganography using X-Box mapping. [C]// Proceedings of the International Conference on Advances in Computing, Communications and Informatics. Piscataway NJ: Institute of Electrical and Electronics Engineers, 2014:351-355.

MOLATO M R D, GERARDO B D, MEDINA R P. Secured data hiding and sharing using improved LSB-based image steganography technique. [C]// Proceedings of the 4th International Conference on Industrial and Business Engineering. New York NY: Association for Computing Machinery, 2018:238-243.

SARRESHTEDARI S, GHOTBI M, GHAEMMAGHAMI S. On the effect of spatial to compressed domains transformation in LSB-based image steganography. [C]// Proceedings of theIEEE/ACS International Conference on Computer Systems and Applications. Piscataway NJ: Institute of Electrical and Electronics Engineers, 2009:260-264.

AL FARSI G, JABBAR J, TAWAFAK R M. A Review on models of human face verification techniques. [C]// Proceedings of the International Conference on Fourth Industrial Revolution. Piscataway NJ: Institute of Electrical and Electronics Engineers, 2019:1-5. ‏

CHIKOUCHE S L, CHIKOUCHE N. An improved approach for LSB-based image steganography using AES algorithm. [C]// Proceedings of the 5th International Conference on Electrical Engineering-Boumerdes. Piscataway NJ: Institute of Electrical and Electronics Engineers, 2017:1-6.


Refbacks

  • There are currently no refbacks.