We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

ILSB: Indexing with Least Significant Bit Algorithm for Effective Data Hiding

by A. N. Senarathne, Kasun De Zoysa
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 161 - Number 5
Year of Publication: 2017
Authors: A. N. Senarathne, Kasun De Zoysa
10.5120/ijca2017913201

A. N. Senarathne, Kasun De Zoysa . ILSB: Indexing with Least Significant Bit Algorithm for Effective Data Hiding. International Journal of Computer Applications. 161, 5 ( Mar 2017), 28-42. DOI=10.5120/ijca2017913201

@article{ 10.5120/ijca2017913201,
author = { A. N. Senarathne, Kasun De Zoysa },
title = { ILSB: Indexing with Least Significant Bit Algorithm for Effective Data Hiding },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2017 },
volume = { 161 },
number = { 5 },
month = { Mar },
year = { 2017 },
issn = { 0975-8887 },
pages = { 28-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume161/number5/27147-2017913201/ },
doi = { 10.5120/ijca2017913201 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:07:42.094213+05:30
%A A. N. Senarathne
%A Kasun De Zoysa
%T ILSB: Indexing with Least Significant Bit Algorithm for Effective Data Hiding
%J International Journal of Computer Applications
%@ 0975-8887
%V 161
%N 5
%P 28-42
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data transmission is frequently face intrusions issues. Different data hiding methods are there to address this problem. Steganography being one; intends on writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. Moreover, cryptography is a tool used in protecting information using cipher text. However, these methods are subjected to suspicion and prone to visual and statistical attacks. While trying to overcome such problems, researchers need to compromise with imperceptibility and hiding capacity. Any basic algorithms including traditional Least Significant Bit algorithm are simpler and faster processing although they are highly vulnerable to these visual and statistical attacks. Once the algorithm is known extracting the hidden information is fairly simple using steganalysis tools. Thus, these are having relatively low data hiding capacity, security compared to the algorithms with enhancements. These enhancements use complex mathematical functions with existing algorithms using cryptography as a method of improving security. The employing cryptography involves complex mathematical calculations requiring advanced processing capabilities leading to slow performance. As a result; it’s difficult to work in low processing environments. This research focuses on developing a system that adapts to the enhanced security without using complex mathematical functions with ways in which to improve data hiding capacity. Having less complexity intern provides the user with lower processing environment. The system uses an indexing technique in hiding data inside the cover image providing high security. The proposed system will have an additional step residing outside the traditional Least Significant Bit algorithm which provides hiding data with less vulnerability to intrusion. The requirement of an indexing image will provide the user with high security because the extraction process will totally depend on the bit patterns of the indexing image. This enhancement will be an attempt to overcome threats and weaknesses in the traditional Least Significant Bit algorithm and enhance the security of data hiding.

References
  1. N. F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen”, Computer Journal, February 1998
  2. N. Provos and P. Honeyman, “Detecting Steganographic Content on the Internet”, Center for Information Technology Integration, University of Michigan, August 2001
  3. A. Westfeldand and A. Pfitzmann, “Attacks on Steganographic Systems: Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools—and Some Lessons Learned”, Dresden University of Technology, Department of Computer Science, Germany
  4. J. Fridrich and M. Goljan, “Practical Steganalysis of Digital Images – State of the Art”, SUNY Binghamton, Department of Electrical Engineering, Binghamton
  5. N. N. EL-Emam, “Hiding a Large Amount of Data with High Security Using Steganography Algorithm”, Journal of Computer Science, Applied Computer Science Department, Faculty of Information Technology, Philadelphia University, Jordan, 2007
  6. G. M. Kamau, S. Kimani and W. Mwangi, “An enhanced Least Significant Bit Steganographic Method for Information Hiding”, Journal of Information Engineering and Applications, Vol 2, No.9, 2012
  7. J. J. Roque and J. M. Minguet, “SLSB: Improving the Steganographic Algorithm LSB”, Universidad Nacional de Educación a Distancia (Spain)
  8. C. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution”, The Journal of Pattern Recognition Society, Department of Computer Engineering and Information Technology, City University of Hong Kong, Hong Kong, 2003
  9. L. M. Marvel, C. G. Boncelet Jr and C. Retter, “Spread Spectrum Steganography”, IEEE Transactions on image processing, 8:08, 1999
  10. S. K. Muttoo and S. Kumar, “Data Hiding in JPEG Images”, BVICAM’S International Journal of Information Technology, BharatiVidyapeeth’s Institute of Computer Applications and Management, New Delhi, 2008
  11. P. Hayati, V. Potdar and E. Chang, “A Survey of Steganographic and Steganalytic Tools for the Digital Forensic Investigator”, Institute for Advanced Studies in Basic Science of Zanjan, Iran
  12. M. A. B. Younes and A. Jantan, “A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion”, International Journal of Computer Science and Network Security, VOL.8 No.6, June 2008
  13. Y. K. Lee, G. Bell, S. Y. Huang, R. Z. Wang and S. J. Shyu, “An Advanced Least-Significant-Bit Embedding Scheme for Steganographic Encoding” in Advances in Image and Video Technology, vol. 5414, Berlin, Heidelberg: Springer, 2009, pp. 349-360.
  14. S. Wang, B. Yang and X. Niu, “A Secure Steganography Method based on Genetic Algorithm”, Journal of Information Hiding and Multimedia Signal Processing, VOL.1 No.8, January 2010
  15. A. D. Ker, “Improved Detection of LSB Steganography in Grayscale Images” Oxford University Computing Laboratory, Parks Road, Oxford OX1 3QD, England, 2004
  16. X. Zhang and S. Wang, “Efficient Steganographic Embedding by Exploiting Modification Direction”, IEEE COMMUNICATIONS LETTERS, VOL. 10, NO. 11, NOVEMBER 2006
  17. S. Katzenbeisser and F. Petitcolas, “Information hiding techniques for steganography and digital watermarking.”,Artech House Books, 1999. E. E. Elgabar, “Comparison of LSB Steganography in BMP and JPEG Images”,International Journal of Soft Computing and Engineering ,pp.91-95.2013.
  18. A. Miller,“LEAST SIGNIFICANT BIT EMBEDDINGS:IMPLEMENTATION AND DETECTION”. Retrieved December 22, 2013, from aaronmiller.in: aaronmiller.in/thesis, 2012, May
  19. T. Moerland, “Steganography and Steganalysis”. 2003, Retrieved December 23, 2013, from www.liacs.nl/home/ tmoerl/privtech.pdf
  20. M. O. Owens, “A discussion of covert channels and steganography”.SANS Institute.2002
  21. M. S. Rana, B. S. Sangwan and J. S. Jangir, “Art of Hiding: An Introduction to Steganography”,International Journal Of Engineering And Computer Science ,Vol.1 I. 1, pp:11-22.
  22. Z. Wang, H. R. Sheikh and A. C. Bovik, “No-reference perceptual quality assessment of JPEG compressed images”. Proceedings of the International Conference on Image Processing,2002, Vol.1,pp. 477-480.
  23. Z. Wang, A. C. Bovik, H. R. Sheikh and E. P. Simoncelli, "Image quality assessment: From error visibility to structural similarity" IEEE Transactions on Image Processing, vol. 13, no. 4, pp.600-612, Apr. 2004
  24. H. R. Sheikh and A. C. Bovik, "Image Information and Visual Quality"., IEEE Transactions on Image Processing.
  25. J. Mannos and D. Sakrison, "The effects of a visual fidelity criterion on the encoding of images", IEEE Trans. Inf. Theory, IT-20(4), pp. 525-535, July 1974.
  26. T. Mitsa and K. Varkur, "Evaluation of contrast sensitivity functions for the formulation of quality measures incorporated in halftoning algorithms", ICASSP '93-V, pp. 301-304.
  27. W. W. Zin, “Message Embedding In PNG File Using LSBSteganographic Technique”, International Journal of Science and Research, Vol. 2 No..1, 2013
  28. V. Tyagi, A. Kumar, R. Patel, S. Tyagi and S. S. Gangwar, “IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT WITH CRYPTOGRAPHY”, Journal of Global Research in Computer Science, Vol. 3, I. 3, 2012
  29. M. Mohamed, F. Al-Afari, and M. Bamatraf, “Data Hiding by LSB Substitution Using GeneticOptimal Key-Permutation”, International Arab Journal of e-Technology, Vol. 2, No. 1, 2011
  30. S. Gupta, A. Goyal, and B. Bhushan, “Information Hiding Using Least Significant Bit Steganography and Cryptography”, I.J.Modern Education and Computer Science,Vol. 6, pp. 27-34, 2012
Index Terms

Computer Science
Information Sciences

Keywords

Indexed Least Significant Bit Information security Steganography Data Hiding Intrusion prevention