CFP last date
20 January 2025
Reseach Article

Experimental Review of Steganography Method that uses 5th, 6th and 7th Bit of a Pixel

by Aqsa Rashid, Muhammad Khurrum Rahim
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 121 - Number 1
Year of Publication: 2015
Authors: Aqsa Rashid, Muhammad Khurrum Rahim
10.5120/21508-4447

Aqsa Rashid, Muhammad Khurrum Rahim . Experimental Review of Steganography Method that uses 5th, 6th and 7th Bit of a Pixel. International Journal of Computer Applications. 121, 1 ( July 2015), 41-45. DOI=10.5120/21508-4447

@article{ 10.5120/21508-4447,
author = { Aqsa Rashid, Muhammad Khurrum Rahim },
title = { Experimental Review of Steganography Method that uses 5th, 6th and 7th Bit of a Pixel },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 121 },
number = { 1 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 41-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume121/number1/21508-4447/ },
doi = { 10.5120/21508-4447 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:07:21.956413+05:30
%A Aqsa Rashid
%A Muhammad Khurrum Rahim
%T Experimental Review of Steganography Method that uses 5th, 6th and 7th Bit of a Pixel
%J International Journal of Computer Applications
%@ 0975-8887
%V 121
%N 1
%P 41-45
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper is the detailed experimental analysis and review of the steganography method "A New Image Steganograpgy Approach for Information Secrity Using Gray Level Images in Spatial Domain" that uses 5th, 6th and 7th bit of the pixel for hiding message bit. In this paper it is implemented and analyzed for both, color and grayscale, images. For analysis and critical review, well known image quality measures, security analysis and some steganalysis method are used. The focal motivation of this paper is to provide in depth analysis of the selected method and test it with important measures for evaluating the distortion, performance, robustness and security.

References
  1. M. Steinebach, J. Dittmann, "Watermark Based Digital Audio Data Authentication" , EURASIP Journal of Applied Signal Processing, vol. 10, pp. 1001-1015, 2003.
  2. Rajkumar Yadav, RaviSaini, Kamaldeep, A Novel Image Steganography Approach for Information Security Using Gray Level Images in Spatial Domain, International Journal on Computer Science and Engineering, Vol. 3 No. 7 July 2011
  3. M. Khurrum Rahim Rashid, Nadeem Salamat, Saad Missen and Aqsa Rashid. "Robust Increased Capacity Image Steganographic Scheme" International Journal of Advanced Computer Science and Applications (IJACSA), 5(11). , 2014
  4. Ismail Avcibas, Bulent Sankur, Khalid Sayood, Statistical Evaluation of Image Quality Measure, Journal of Electronic Imaging, 11(2), 206-223, 2002
  5. Zhou Wang, Member,Hamid R. Sheikh, Image Quality Assessment: From Error Visibility to Structural Similarity, IEEE Transactions On Image Processing, (VOL. 13, NO. 4), 2004
  6. Yousra A. Y. Al. Najjar, Dr. D. C. Soong, Comparison of image quality assessment: PSNR, HVS, UIQI, SSIM, IJSER, (Vol. 3, Issue8). ISSN2229-5518 ,2012
  7. Amhamed Saffor, Abdul Rahman Ramli, Kwan-Hoong Ng, A Comparative Study Of Image Compression Between Jpeg And Wavelet, Malaysian Journal of Computer Science, (Vol. 14 No. 1), pp. 39-45 , 2001
  8. Hamid Rahim Sheikh, Muhammad Farooq Sabir, Alan C. Bovik, A Statistical Evaluation of Recent Full Reference Image Quality Assessment Algorithms, IEEE TRANS. IMAGE PROCESSING, 2006
  9. V. Asha, P. Nagabhushan, N. U. Bhajantri, Similarity Measures for Automatic Defct Detection on Patterned Texture, International Journal of Image Processing and Vision Science, Volume-1, 2012
  10. N. F. Johnson, Sushil Jojadia George Mason University, Exploring Steganography: Seeing the Unseen, 0018-916/98/$10. 00© IEEE 1998
  11. Muhammad Khurrum Rahim, Aqsa Rashid, Nadeem Slamat and Saad Missen, Experimental Analysis of Matching Technique of Steganography for Grayscale and Color Images, International Journal of Computer Science and Information Technology, Vol 6, No6, December 2014
  12. Aqsa Rashid, Experimental Analysis and Comparison of LSB Substitution and LSB Matching Method of Information Security, IJCSI,Volume 12, Issue1, No,1, 2015
Index Terms

Computer Science
Information Sciences

Keywords

Bit Plane Analysis IQM LSB Steganography Security Analysis