110 research outputs found

    Text in Image Hiding using Developed LSB and Random Method

    Get PDF
    Information Hiding is a task that face difficult challenges in current time. The reason for these challenges is the rapid development of methods of detection of hidden information. So, researchers have been interested in developing methods of concealment, making it difficult for attackers to access hidden information using new methods of concealment. Such as the introducing a complex algorithms, use a random methods and invent more complicated and difficult steps. This paper presents a new method of hiding information within the image. This method creates a new sequence of mysterious and difficult steps by dividing the secret text on all image and random distributing of bits to each row. Then using a special reverse method to hide the bits in that row. The LSB method has also been developed to make it more difficult to hide the pixel. The results presented illustrate the strength and security of the method and provide greater protection for hidden information. Also, the result illustrate the quality of the stego image compared with the original image using PSNR and SSIM quality measures

    Improved Deep Hiding/Extraction Algorithm to Enhance the Payload Capacity and Security Level of Hidden Information

    Get PDF
    Steganography algorithms have become a significant technique for preventing illegal users from obtaining secret data. In this paper, a deep hiding/extraction algorithm has been improved (IDHEA) to hide a secret message in colour images. The proposed algorithm has been applied to enhance the payload capacity and reduce the time complexity. Modified LSB (MLSB) is based on disseminating secret data randomly on a cover-image and has been proposed to replace a number of bits per byte (Nbpb), up to 4 bits, to increase payload capacity and make it difficult to access the hiding data. The number of levels of the IDHEA algorithm has been specified randomly; each level uses a colour image, and from one level to the next, the image size is expanded, where this algorithm starts with a small size of a cover-image and increases the size of the image gradually or suddenly at the next level, according to an enlargement ratio. Lossless image compression based on the run-length encoding algorithm and Gzip has been applied to enable the size of the data that is hiding at the next level, and data encryption using the Advanced Encryption Standard algorithm (AES) has been introduced at each level to enhance the security level. Thus, the effectiveness of the proposed IDHEA algorithm has been measured at the last level, and the performance of the proposed hiding algorithm has been checked by many statistical and visual measures in terms of the embedding capacity and imperceptibility. Comparisons between the proposed approach and previous work have been implemented; it appears that the intended approach is better than the previously modified LSB algorithms, and it works against visual and statistical attacks with excellent performance achieved by using the detection error (PE). Furthermore, the results confirmed that the stego-image with high imperceptibility has reached even a payload capacity that is large and replaces twelve bits per pixel (12-bpp). Moreover, testing is confirmed in that the proposed algorithm can embed secret data efficiently with better visual quality

    Edge-based image steganography

    Get PDF

    Hide text depending on the three channels of pixels in color images using the modified LSB algorithm

    Get PDF
    At the moment, with the great development of information and communications technology, the transfer of confidential and sensitive data through public communications such as the Internet is very difficult to keep them from hackers and attackers. Therefore, it is necessary to work on the development of new and innovative ways to transfer such information and protect it to ensure that it reaches the desired goal. The goal of a new technique to hide information design not only hides the secret message behind the center cover, but it also provides increased security. The most common way to transfer important and confidential data is through embedding it into cover medium files in a way that does not affect the accuracy of the carrier file, which is known as hiding. In this paper, encryption and concealment techniques were used to protect data transferred from attackers. The proposed method relied on encryption of confidential information using the encryption key and the Xnor gate, after which the encrypted information was hidden in a color image using the LSB algorithm. The method of concealment depends on the extraction of chromatic channels of three RGB for each pixel and specifying the channel in which the bit of the encryption message will be hidden. Some metrics have been adopted to measure the quality of the resulting picture after hiding as PSNR and MSE, and achieve good results

    An Enhanced Reversible Data Hiding Technique for Coloured Images

    Get PDF
    To maintain image contents confidentiality and to recover original image, there is a need of Reversible Data Hiding scheme. This paper proposes an enhanced reversible data hiding technique for the coloured image. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction or image restoration. The proposed method embeds data by reserving room before encryption with a traditional RDH algorithm. It is easy for the data hider to reversibly embed data in the encrypted image. This paper also concerns with a method that embeds the data invisibly into an image. The transmission and exchange of image also needs a high security. To achieve a security, Visual Cryptography is used. Visual cryptography maintains security of a cover media and also it will not make a use of encryption key. Hence, it is less prone to attack. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error

    Hiding text in speech signal using K-means, LSB techniques and chaotic maps

    Get PDF
    In this paper, a new technique that hides a secret text inside a speech signal without any apparent noise is presented. The technique for encoding the secret text is through first scrambling the text using Chaotic Map, then encoding the scraped text using the Zaslavsky map, and finally hiding the text by breaking the speech signal into blocks and using only half of each block with the LSB, K-means algorithms. The measures (SNR, PSNR, Correlation, SSIM, and MSE) are used on various speech files (“.WAV”), and various secret texts. We observed that the suggested technique offers high security (SNR, PSNR, Correlation, and SSIM) of an encrypted text with low error (MSE). This indicates that the noise level in the speech signal is very low and the speech purity is high, so the suggested method is effective for embedding encrypted text into speech files

    Hybrid Approach to Steganography System Based on Quantum Encryption and Chaos Algorithms

    Get PDF
    This paper proposes a hybrid system for secretly embedding images into the dithered multilevelimage. Confident hybridizations between steganography and quantum encryptions are either rare inliterature or suffer a poor effectiveness in secure communication. This paper scrambles and divides thesecret image into groups to be embedded in the blocks of the cover image using three chaos algorithms.These are Lorenz map, Henon map, and Logistic map algorithms. The encryption of embedded imagesconducted using the quantum one-time pad. Results showed that the proposed hybrid system succeeded inembedding and combining images with quantum cryptography algorithms
    corecore