CFP last date
20 December 2024
Reseach Article

A Novel Approach for Image Steganography using LCG

by Mohammed J. Bawaneh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 102 - Number 10
Year of Publication: 2014
Authors: Mohammed J. Bawaneh
10.5120/17853-8826

Mohammed J. Bawaneh . A Novel Approach for Image Steganography using LCG. International Journal of Computer Applications. 102, 10 ( September 2014), 34-38. DOI=10.5120/17853-8826

@article{ 10.5120/17853-8826,
author = { Mohammed J. Bawaneh },
title = { A Novel Approach for Image Steganography using LCG },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 102 },
number = { 10 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 34-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume102/number10/17853-8826/ },
doi = { 10.5120/17853-8826 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:32:46.802052+05:30
%A Mohammed J. Bawaneh
%T A Novel Approach for Image Steganography using LCG
%J International Journal of Computer Applications
%@ 0975-8887
%V 102
%N 10
%P 34-38
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Internet is a public channel and security issues, such as modification, interception and sniffing normally exist. Steganography is a common security technique that is utilized to solve or reduce those problems. A large number of methods is used for implementing steganography; as least significant bits (LSB), discrete cosine transform (DCT), discrete Fourier transform (DFT), Spread Spectrum coding and Perceptual Masking. This paper proposes a random and sequential LSB to embed the secret message inside the color image. The linear congruent generator (LCG) is a random generator that is used with LSB to hide a stream of bits in a bitmap image (cover image) to give a new image (stego-image) comparable to the cover image. Secret key for random LSB is a combination of four parameters (Seed, Multiplier, Non-common factor, and Cycle length). The proposed method employees red, green or blue channel to hide the secret message. Selection of channel based on the modification rate for each channel. The minimum modified channel in cover image is utilized to embed the secret message. Results show that random LSB is better than Sequential LSB in term of visual effect while the worst in term of execution time. Random LSB satisfies sufficient security to secret message due to requirements for random function parameters in the extraction process.

References
  1. William . P, "Digital Image processing", 3rd edition, 2001
  2. Stefan Katzenbeisser,Fabien A. P. Petitcolas, "Information Hiding Techniques for Steganography and Digital Watermarking", 2000
  3. Jessica Fridrich, Miroslav Goljan, and Rui Du , " Detecting LSB Steganography in Color and Gray-Scale Images", State University of New York, Binghamton, 2002
  4. Sviatoslav Voloshynovskiy, Oleksiy Koval and Emre Topak, "On reversibility of random binning based data-hiding techniques", Thierry Pun September 2006 , Proceeding of the 8th workshop on Multimedia and security MM&Sec '06, Publisher: ACM Press
  5. Jeremiah J. Harmsen , William A. Pearlman, " Stegano-graphy and steganalysis: Capacity of steganographic channels", August 2005 Proceedings of the 7th workshop on Multimedia and security MM&Sec '05 Publisher: ACM Press
  6. A. Francia, Tyler S. Gomez, " Practice:Stegano- graphy obliterator: an attack on the least significant bits", September 2006 Proceedings of the 3rd annual conference on Information security curriculum development InfoSecCD '06, Publisher: ACM Press
  7. Elke Franz, Antje Schneidewind, "Steganography II: Adaptive steganography based on dithering", September 2004 Proceedings of the 2004 workshop on Multimedia and security MM&Sec '04 Publisher: ACM Press
  8. Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu, "Steganography and steganalysis: Digital invisible ink and its applications in steganography", September 2006 Proceeding of the 8th workshop on Multimedia and security MM&Sec '06 , Publisher: ACM Press
  9. Raghava, Ashish Kumar, Aishwarya Deep and AbhilashaChahal, "Improved LSB method for Image Steganography using H´enon Chaotic Map", OPEN JOURNAL OF INFORMATION SECURITY AND PPLICATIONS, VOLUME 1, NUMBER 1, JUNE 2014
  10. Sanjeev Manchanda,, "Pseudo random numbers Based Methods for Customized and Secure Image Steganography" , International Journal of Network Security, Vol. 16, No. 4, PP. 366-376, July 2014 366
  11. Mamta Juneja and Parvinder Singh Sandhu, "Improved LSB based Steganography Techniques for Color Images in Spatial Domain" , Received Apr. 9, 2013; revised and accepted June 10, 2013)
  12. Amir Farhad Nilizadeh, "Steganography on RGB Images Based on a Matrix Pattern" using Random Blocks", I. J. Modern Education and Computer Science, 2013, 4, 8-18, DOI: 10. 5815/ijmecs. 2013. 04. 02
  13. Agrawal, D," Random image steganography in spatial domain", Emerging Trends in VLSI, Embedded System, Nano Electronics and Telecommunication System (ICEVENT), 2013 International Conference on Tiruvannamalai
  14. Morgan J. T. Byron, "Elements of Simulation", 1984, published in USA by Chapman and Hall, ISBN 0412245809
Index Terms

Computer Science
Information Sciences

Keywords

Steganography LCG LSB